EN ES PT
Back to Stats

Visual Capture

Screenshot of vwww-roblox.com.ru

Detection Info

https://vwww-roblox.com.ru/users/813954902/profile
Detected Brand
Roblox
Country
International
Confidence
100%
HTTP Status
200
Report ID
7d798262-892…
Analyzed
2026-01-22 23:45

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E293B8B29251243320BFB1D9F1297709A2D3D74EC68287D1F2F8636B1ED6CA1F817856
CONTENT ssdeep
1536:qDbXWnSra6luOnWor1BPmzzXXMd6MiucCOK:abXWd6luOLvmzzXXMd6M1cCOK

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
a412679b3c8cedb2
VISUAL aHash
0000e3dbffffffc3
VISUAL dHash
f0e8ae3638002606
VISUAL wHash
000042c3dfffdfc3
VISUAL colorHash
07200008280
VISUAL cropResistant
f0e8ae3638002606

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Roblox users
• Method: Fake login form steals credentials.
• Exfil: Data exfiltration is suggested by obfuscated JS. The exfil point is unknown
• Indicators: Suspicious TLD (.ru), obfuscated JavaScript, non-standard domain
• Risk: HIGH - Potential credential theft.

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • js_packer
  • base64_strings

🎯 Kit Endpoints

  • /blog
  • /login

📡 API Calls Detected

  • get
  • https://ro.blox.com/Ebh5?
  • POST
  • https://apis.
  • https://help.roblox.com/hc/articles/30428367965460
  • GET

📤 Form Action Targets

  • /search
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.