EN ES PT
Back to Stats

Visual Capture

Screenshot of ansh632.github.io

Detection Info

https://ansh632.github.io/ecommerce-clone-js-project/
Detected Brand
Amazon
Country
Unknown
Confidence
95%
HTTP Status
200
Report ID
6e699fc6-8cf…
Analyzed
2026-03-22 06:29

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E2230A60E836CC3740FB54E862B61E9D39A46B01D992068DE6D5D3E52BB3C9CCF2346D
CONTENT ssdeep
192:mCMCWMclKuMpMqSMlrMzMFQMCMYKAMCHpMMxM0MffMGb7M0MW9MrRKNMiEMCRKrd:6SATY9bXJ+kALAF3W4

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
921b1f534fcd404f
VISUAL aHash
0081ffff6644ffff
VISUAL dHash
6909d9228c9c6a98
VISUAL wHash
00007f5e6640ffef
VISUAL colorHash
06200038000
VISUAL cropResistant
6909d9228c8c6a94,96696169696169e0,274b652523331313,1ce146ce4f4dcf4e,33799cfcf89c6933,93c14d2503938e12

Code Analysis

Threat Level ALTO
⚠️ Phishing Confirmed

📡 API Calls Detected

  • https://supersimplebackend.dev/products

📊 Risk Score Breakdown

Total Risk Score
40/100

🔬 Comprehensive Threat Analysis

Threat Type
Amazon Phishing Landing Page
Target
Amazon users
Attack Method
Phishing webpage
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Brand Impersonation Analysis

Impersonated Brand
Amazon
Official Website
https://www.amazon.com
Fake Service
Credential harvesting service

⚔️ Attack Methodology

Primary Method: Brand Impersonation Redirect

Impersonates Amazon to build victim trust through search engine manipulation or malicious advertisements. Often redirects to credential theft pages or serves malware disguised as legitimate software.

Secondary Method: Standard Phishing Techniques

Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
ansh632.github.io
Registered
Unknown
Registrar
Unknown
Status
Hosting platform (subdomain)

Hosting Information

Provider
Unknown
ASN

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.