Latest news of the domain name industry

Recent Posts

XYZ acquires .storage, its 10th gTLD said today that it has acquired the half-launched new gTLD .storage from its original owner.

The terms of the deal were not disclosed, but CEO Daniel Negari said in a blog post that it has been funded using some of the “excess of cash flow” from sales of .xyz domains.

The original .storage registry was Extra Space Storage, which rents out physical storage units in the US.

It started its protracted launch period a little over a year ago but had not planned to go to general availability until July this year.

Having apparently passed through its sunrise period and a special landrush for the storage industry, which ended in January, it has fewer than 800 domains in its zone file.

It looks like XYZ will be essentially relaunching the gTLD from scratch, with a new sunrise period penciled in for November and an early access period and GA slated for December.

Pre-launch pricing is around the $80 mark at the few registrars I checked today, and it looks like that will remain under the new management.

That’s despite XYZ talking today about .storage as a “premium” vertically-focused TLD along the lines of its $3,000 .cars or $750 .theatre.

The company said that it will not hold back reserved names at higher, premium pricing. Even nice-looking domains such as will be available at the base fee, it said.

The new acquisition becomes the 10th that XYZ has a hand in running, if you count the three car-related gTLDs it manages in a joint venture with Uniregistry. The others are .security, .rent, .protection, .theatre, and .college.

China approves more Donuts, Afilias gTLDs

Donuts and Afilias have had two batches of new gTLDs approved for use in China.

The Ministry of Industry and Information Technology approved five Afilias TLDs and six Donuts TLDs last month. This means customers of Chinese registrars will now be able to legally use those names in China.

Afilias was approved for .info, .mobi and .pro, which were delegated following the 2000 and 2003 new gTLD application rounds and .kim and .red from the 2012 round.

Donuts simultaneously was cleared for .ltd, .group, .游戏 (“game”), .企业 (“business”), .娱乐 (“entertainment) and .商店 (“store”).

The approvals more than double the number of new gTLDs in Latin script to get the nod from MIIT, in what now appears to be a monthly occurrence.

In February, .ink and four Chinese-script TLDs passed the regulatory process, following .site and .shop in January and .vip, .club and .xyz in December.

MIIT approval means the chance of usage by Chinese registrants should go up, but it also ties these Western registries to relatively Draconian government policies when it comes to Chinese registrations.

CentralNic says revenue more than doubled in 2016

CentralNic’s revenue was up 110% in 2016, according to the company.

The registry today released its unaudited results for last year, showing EBITDA up 65% at £5.5 million ($6.7 million) on revenue of £22.1 million ($26.9 million)

The company, which has expanded into registrar services via acquisition in the last few years, said its recurring revenue — mainly domain registrations — now account for about 80% of revenue.

CentralNic has about a third of the new gTLD back-end market, primarily because it’s the provider for .xyz’s millions of cheapo registrations.

In its statement, it said it hopes to focus on growing more in China, where clients including .xyz were recently licensed.

It also intends to make more acquisitions, where the deals “meet clear strategic criteria including being earnings accretive in the short term with a strong recurring revenues base”.

How .com became a restricted TLD

Verisign has been given approval to start restricting who can and cannot register .com and .net domain names in various countries.

Customers of Chinese registrars are the first to be affected by the change to the registry’s back-end system, which was made last year.

ICANN last week gave Verisign a “free to deploy” notice for a new “Verification Code Extension” system that enables the company to stop domains registered via selected registrars from resolving unless the registrant’s identity has been verified and the name is not on China’s banned list.

It appears to be the system Verisign deployed in order to receive its Chinese government license to operate in China.

Under Verification Code Extension, Verisign uses ICANN records to identify which registrars are based in countries that have governmental restrictions. I believe China is currently the only affected country.

Those registrars are able to register domains normally, but Verisign will prevent the names from resolving (placing them in serverHold status and keeping them out of the zone file) unless the registration is accompanied by a verification code.

These codes are distributed to the affected registrars by at least two verification service providers. Verisign, in response to DI questions, declined to name them.

Under its “free to deploy” agreement with ICANN (pdf), Verisign is unable to offer verification services itself. It must use third parties.

The company added the functionality to its .com and .net registry as an option in February 2016, according to ICANN records. It seems to have been implemented last July.

A Verisign spokesperson said the company “has implemented” the system.

The Verification Code Extension — technically, it’s an extension to the EPP protocol pretty much all registries use — was outlined in a Registry Services Evaluation Process request (pdf) last May, and approved by ICANN not long after.

Verisign was approved to operate in China last August in the first wave of gTLD registries to obtain government licenses.

Under Chinese regulations, domain names registered in TLDs not approved by the government may not resolve. Registrars are obliged to verify the identities of their registrants and names containing certain sensitive terms are not permitted.

Other gTLDs, including .vip, .club, .xyz .site and .shop have been granted approval over the last few months.

Some have chosen to work with registration gateway providers in China to comply with the local rules.

Apart from and Verisign, no registry has sought ICANN approval for their particular implementation of Chinese law.

Because Chinese influence over ICANN is a politically sensitive issue right now, it should be pointed out that the Verification Code Extension is not something that ICANN came up with in response to Chinese demands.

Rather, it’s something Verisign came up with in response to Chinese market realities. ICANN has merely rubber-stamped a service requested by Verisign.

This, in other words, is a case of China flexing market muscle, not political muscle. Verisign, like many other gTLD registries, is over-exposed to the Chinese market.

It should also be pointed out for avoidance of doubt that the Chinese restrictions do not apply to customers of non-Chinese registrars.

However, it appears that Verisign now has a mechanism baked into its .com and .net registries that would make it much easier to implement .com restrictions that other governments might choose to put into their own legislation in future.

Phishing in new gTLDs up 1,000% but .com still the worst

Kevin Murphy, February 20, 2017, Domain Registries

The .com domain is still the runaway leader TLD for phishing, with new gTLDs still being used for a tiny minority of attacks, according to new research.

.com domains accounted for 51% of all phishing in 2016, despite only having 48% of the domains in the “general population”, according to the 2017 Phishing Trends & Intelligence Report
from security outfit PhishLabs.

But new gTLDs accounted for just 2% of attacks, despite separate research showing they have about 8% of the market.

New gTLDs saw a 1,000% increase in attacks on 2015, the report states.

The statistics are based on PhishLabs’ analysis of nearly one million phishing sites discovered over the course of the year and include domains that have been compromised, rather than registered, by attackers.

The company said:

Although the .COM top-level domain (TLD) was associated with more than half of all phishing sites in 2016, new generic TLDs are becoming a more popular option for phishing because they are low cost and can be used to create convincing phishing domains.

There are a few reasons new gTLDs are gaining traction in the phishing ecosystem. For one, some new gTLDs are incredibly cheap to register and may be an inexpensive option for phishers who want to have more control over their infrastructure than they would with a compromised website. Secondly, phishers can use some of the newly developed gTLDs to create websites that appear to be more legitimate to potential victims.

Indeed, the cheapest new gTLDs are among the worst for phishing — .top, .xyz, .online, .club, .website, .link, .space, .site, .win and .support — according to the report.

But the numbers show that new gTLDs are significantly under-represented in phishing attacks.

According to separate research from CENTR, there were 309.4 million domains in existence at the end of 2016, of which about 25 million (8%) were new gTLDs.

Yet PhishLabs reports that new gTLD domains were used for only about 2% of attacks.

CENTR statistics have .com with a 40% share of the global domain market, with PhishLabs saying that .com is used in 51% of attacks.

The difference in the market share statistics between the two sets of research is likely due to the fact that CENTR excludes .tk from its numbers.

Again, because PhishLabs counts hacked sites — in fact it says the “vast majority” were hacked — we should probably exercise caution before attributing blame to registries.

But PhishLabs said in its report:

When we see a TLD that is over-represented among phishing sites compared to the general population, it may be an indication that it is more apt to being used by phishers to maliciously register domains for the purposes of hosting phishing content. Some TLDs that met these criteria in 2016 included .COM, .BR, .CL, .TK, .CF, .ML, and .VE.

By far the worst ccTLD for phishing was Brazil’s .br, with 6% of the total, according to the report.

Also notable were .uk, .ru, .au, .pl, and .in, each with about 2% of the total, PhishLabs said.