EN ES PT
Back to Stats

Visual Capture

Screenshot of codestudiocore-source.github.io

Detection Info

https://codestudiocore-source.github.io/Clone-web-project/
Detected Brand
Netflix
Country
International
Confidence
95%
HTTP Status
200
Report ID
187b0775-0bb…
Analyzed
2026-02-14 00:05

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T160B1AEF06052AB2B4293C2E11733ABAF33E6D68DCAD6171256FC539A0BE7C52FC15095
CONTENT ssdeep
96:noYzDnfAeHnWnWn7ETnenynin/4nG6nMnnrwqEGnfAe+lBpk:oYPnf0e6FGnf6fpk

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ce4071398ce7b336
VISUAL aHash
4010a07c3f89a0b8
VISUAL dHash
88a129e1755b4371
VISUAL wHash
60d0b0fc3fb9a8b8
VISUAL colorHash
39401008000
VISUAL cropResistant
88a129e1755b4371

Code Analysis

Threat Level ALTO
⚠️ Phishing Confirmed

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Netflix users
• Method: Impersonation via a look-alike website on free hosting.
• Exfil: Email addresses
• Indicators: Free hosting, brand logo, form.
• Risk: High

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting + Brand Logo
The use of free hosting with a Netflix logo is a strong indicator of phishing.
Form for Email Collection
Requests for email addresses are often a sign of credential harvesting.

🔬 Comprehensive Threat Analysis

Threat Type
Netflix Phishing Landing Page
Target
Netflix users (International)
Attack Method
Brand impersonation
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Brand Impersonation Analysis

Impersonated Brand
Netflix
Official Website
https://www.netflix.com/
Fake Service
Netflix Membership

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker attempts to collect the user's email address under the guise of Netflix using a landing page to create a subscription or restart an existing one.

Secondary Method: Social Engineering

The website uses Netflix branding to deceive the user into providing personal information.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
codestudiocore-source.github.io
Registered
Unknown
Registrar
Unknown
Status
Active

🔬 JavaScript Deep Analysis

Operator Language
English (1%)
Total Code Size
772 bytes

🔐 Obfuscation Detected

  • : None

🤖 AI-Extracted Threat Intelligence

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

Scan History for codestudiocore-source.github.io

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.