EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

http://ai22.hgva.net
Detected Brand
Discord
Country
International
Confidence
100%
HTTP Status
200
Report ID
09a40f50-a40…
Analyzed
2025-12-20 18:22
Final URL (after redirects)
https://ai22.hgva.net/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T128A3953BE8444017252349F1F7A07F0D5ACAD18FCE878C86ABB887463BD6CE2D85596D
CONTENT ssdeep
1536:XT4PUwPfBMgxPjncPjncPjncPjnS4MF/ahRyrM9sP3/HlxElnf:j4PUwPf+gVahAgf

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
83737e1c3cce6388
VISUAL aHash
01006b731f1f3931
VISUAL dHash
6ddacbc7f6ffe3e3
VISUAL wHash
01006b7b1f1f3f71
VISUAL colorHash
30000000180
VISUAL cropResistant
a280c0260d4280a2,6ddacbc7f6ffe3e3

Code Analysis

Risk Score 70/100
Threat Level ALTO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Discord phishing landing page.
• Target: Discord users.
• Method: The attacker uses a fake Discord landing page to potentially trick users into downloading malware or giving up credentials.
• Exfil: No form is visible, but the page could lead to malware downloads or social engineering attacks for credential harvesting.
• Indicators: Domain mismatch (ai22.hgva.net vs discord.com).
• Risk: HIGH - Potential for malware distribution or credential theft via social engineering.

🎯 Kit Endpoints

  • /blog
  • /login
  • https://discord.com/blog
  • https://discord.com/login

📡 API Calls Detected

  • https://hubspotonwebflow.com/assets/js/blockedDomains.json
  • POST
  • GET
  • https://www.google.com/ccm/geo

Scan History for ai22.hgva.net

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.