...
Phishing often uses URL Obfuscation techniques to make that link you click on
all that more real. Ed Skoudis compiled a list of techniques often used by
phishers and it is hosted here at the ISC. The page is here and the source code
of the attack techniques here
...