EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

http://x.pzfdyx.com
Detected Brand
Unknown
Country
International
Confidence
100%
HTTP Status
200
Report ID
074949e5-04c…
Analyzed
2026-01-03 02:31
Final URL (after redirects)
http://x.pzfdyx.com/#/index

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T110C3FBB19690213B42338AE4A8612F4F76D7F35ECA968D00A3FC47EE6FD7C90B504586
CONTENT ssdeep
3072:nOGn7YhEHcdpFIaKXwoP7WQFqgoRCw2vJ2:nOGn7YhEHcdpFIaKXwoP7WQFqgoRCw2k

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
eaa195ac66f5491a
VISUAL aHash
f7ff01010171ff00
VISUAL dHash
882943a7a5c3252d
VISUAL wHash
e5ffc14101f1ff00
VISUAL colorHash
03000030000
VISUAL cropResistant
093943a7a5c12535,0000009393820080,6a6a723731113434,6759a4d494962153,3535253d3db9edec

Code Analysis

Risk Score 95/100
Threat Level BAJO
šŸŽ£ Credential Harvester šŸŽ£ OTP Stealer šŸŽ£ Card Stealer šŸŽ£ Banking šŸŽ£ Personal Info

šŸ”¬ Threat Analysis Report

• Threat: Potential product promotion with suspicious domain.
• Target: Online shoppers.
• Method: Website promoting Prime Day discounts.
• Exfil: No data exfiltration detected in the screenshot.
• Indicators: Non-standard domain, generic e-commerce layout.
• Risk: LOW - Potential for misleading promotions, but no immediate data theft risk.

šŸ”’ Obfuscation Detected

  • atob
  • fromCharCode
  • unescape
  • document.write
  • unicode_escape
  • base64_strings

šŸ“” API Calls Detected

  • /api/localuser!get.action
  • /api/localuser!registerWithVerifcode.action
  • api/newOnlinechat!unread.action
  • /public/userOnlineChatController!unread.action
  • /api/credit!config.action
  • /api/category!tree.action
  • /api/credit!pay.action
  • /api/category!sellerTree.action
  • /api/localuser!registerNoVerifcode.action
  • post
  • /api/credit!bill.action
  • /api/credit!beforereapply.action
  • /api/credit!histroy.action
  • /api/activity/lottery!getCurrentActivity.action
  • /api/credit!apply.action
  • /api/credit!beforepay.action
  • GET
  • /api/credit!check.action
  • /api/jscode!execute.action
  • api/syspara!getSyspara.action

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.