Four steps to a registrar-grade abuse email. Paste the lookalike domain, we RDAP-harvest the abuse contact, you check the evidence, we compose a pre-filled report you can copy or open in your mail client.
Enter the malicious lookalike domain (the one impersonating you) plus your real brand domain. We need both to compose the report.