EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://ipfs.io/ipfs/bafybeigbcrv7wgw2qhnupjixk3mipgjlk4vrvuhe4iyekxhw2fx7m4xija/
Detected Brand
DocuSign
Country
International
Confidence
100%
HTTP Status
200
Report ID
771f7b81-cdb…
Analyzed
2026-01-20 00:19

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T106211270B009E91B4262C2C4F7B0A61E3F81C399C7483D1176DFA29A5AF6D59DC570D9
CONTENT ssdeep
12:nwMy7FU5GKNJdoRG7wvG6qqJADAtJD1G7BzAewPrikkWCFwo7Qa59SCIUe/VGf42:n/CCdo9vWWh7DmKvUuTkvOPwyoTp

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
8d0da70f8d0da70f
VISUAL aHash
ff000018180000ff
VISUAL dHash
800080b2b204004c
VISUAL wHash
ff0f08181800cbff
VISUAL colorHash
07000608018
VISUAL cropResistant
800080b2b204004c

Code Analysis

Risk Score 65/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer

🔬 Threat Analysis Report

• Threat: Suspicious file download request on a non-official domain.
• Target: DocuSign users.
• Method: Prompts user to verify humanity and click a button to view a file.
• Exfil: Likely attempts to download a file that could contain malware.
• Indicators: Non-official domain (ipfs.io) used for a DocuSign-related action.
• Risk: LOW - Potential for malware download, proceed with caution.
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.