Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs