EN ES PT
Back to Stats

Visual Capture

Screenshot of talhah2005.github.io

Detection Info

http://talhah2005.github.io/Netflix-Clone
Detected Brand
Netflix
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
899408b3-851…
Analyzed
2026-04-04 21:20
Final URL (after redirects)
https://talhah2005.github.io/Netflix-Clone/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1E6517B614056FA6311D692E167379B6FB6C18288CA230F05B7FE93CA0BDED0BDD67241
CONTENT ssdeep
48:TXIenvSKHhd3g7fts3kZ8LUUYA8L342z07JCNT0rc+UfhabByYsAUnLRS18AbW:TYenvl33g7Vs3kdUVc0rQMAoZy

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
d9b824b72626788f
VISUAL aHash
c7dcd8483cfc2400
VISUAL dHash
8e929390487a4990
VISUAL wHash
cfdcd85cbeb82c00
VISUAL colorHash
31601008000
VISUAL cropResistant
8e929390487a4990

Code Analysis

Risk Score 50/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Personal Info

📊 Risk Score Breakdown

Total Risk Score
70/100

Contributing Factors

Active Phishing Kit
Detected kit types: Personal Info

🔬 Comprehensive Threat Analysis

Threat Type
Phishing Kit (Personal Info)
Target
Netflix users
Attack Method
Phishing webpage
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
MEDIUM - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Personal Info

🏢 Brand Impersonation Analysis

Impersonated Brand
Netflix
Official Website
https://www.netflix.com
Fake Service
Credential harvesting service

⚔️ Attack Methodology

Primary Method: SEO Poisoning Landing Page

Fake Netflix page designed to appear in search results and trick users into visiting. May redirect to credential harvesting pages, malware downloads, or serve as a trust-building step before requesting sensitive information.

Secondary Method: Standard Phishing Techniques

Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
talhah2005.github.io
Registered
Unknown
Registrar
Unknown
Status
Hosting platform (subdomain)

Hosting Information

Provider
Unknown
ASN

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.