EN ES PT
Back to Stats

Visual Capture

Screenshot of mohammadsalem-8.github.io

Detection Info

https://mohammadsalem-8.github.io/gdfgdfg
Detected Brand
Discord
Country
International
Confidence
95%
HTTP Status
200
Report ID
6ec40544-677…
Analyzed
2025-12-29 03:59
Final URL (after redirects)
https://mohammadsalem-8.github.io/gdfgdfg/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T140727430816C5CFB85C68A1C524BF1F6F29B038CCBD15264058E866E71CEDEAA973779
CONTENT ssdeep
384:8QiZvNcKUwtkTAaFZ+91hgsELwSTRkCEPPEYnQcRmLx0pHW:8PZvNuTLLgtCf

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
877271361b254eec
VISUAL aHash
004c3c3f3e3f131b
VISUAL dHash
8c98e0ea60e2e67a
VISUAL wHash
006c7c3f3e3f3219

Code Analysis

Risk Score 75/100
Threat Level CRITICAL
⚠️ Phishing Confirmed
🎣 Credential Harvester
Telegram Exfiltration

🔬 Threat Analysis Report

• Threat: Discord credential harvesting phishing.
• Target: Discord users.
• Method: Fake Discord login page stealing email/phone and password.
• Exfil: Unknown, likely to a remote server controlled by the attacker.
• Indicators: Free hosting (github.io), Discord branding, login form.
• Risk: HIGH - Immediate credential theft.

🔑 Telegram Bot Tokens (1)

  • 8111369039:AAFb...z8PyXlCU
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.