EN ES PT
Back to Stats

Visual Capture

Screenshot of rad.godprox.cc

Detection Info

https://rad.godprox.cc/go/3374w2/y284v2
Detected Brand
Blockchain.com
Country
International
Confidence
100%
HTTP Status
200
Report ID
945af79f-b42…
Analyzed
2026-02-23 07:56
Final URL (after redirects)
https://121sef.dartello.cc/trs/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1BFC1857472511B7F51C381F6F762ABAAF684C356C63B9748A2F9C2C50BC6C2ACE14290
CONTENT ssdeep
96:RBqXmmyCekg3VJr945uH0kzbKWRAZt6ItarZeYp:RBqJle5X25c0QRU6p

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c0c03b3f3f3fc068
VISUAL aHash
7070707070700000
VISUAL dHash
a6e4e4c4c4e41b80
VISUAL wHash
70fcfc7e7c7e0000
VISUAL colorHash
31007000000
VISUAL cropResistant
8080b217cf888280,80898855452559b8,84535b97974b5780,a6e4e4c4c4e41b80

Code Analysis

Risk Score 76/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Blockchain.com users
• Method: Impersonation and fake payout
• Exfil: Unknown, likely to steal credentials and/or steal crypto.
• Indicators: Domain, deceptive language, claims of payouts.
• Risk: High

🔒 Obfuscation Detected

  • fromCharCode
  • unicode_escape

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Impersonation
The site directly attempts to impersonate Blockchain.com with a similar design, logo, and content.
Deceptive Content
Claims of payouts and compensation are designed to lure users into taking actions that expose them to risk.
Domain Suspicion
Domain age is not new but it's not the correct domain for the brand, and it is unrelated. Obfuscation detected in javascript

🔬 Comprehensive Threat Analysis

Threat Type
Two-Factor Authentication Stealer
Target
Blockchain.com users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Personal Info
  • 6 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Blockchain.com
Official Website
https://www.blockchain.com/
Fake Service
Blockchain.com services.

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Credential Harvesting / Cryptocurrency Theft

The site likely redirects users to a credential harvesting form, which captures their Blockchain.com login details. Or, it could try to extract private keys or obtain permissions for crypto transactions.

Target Blockchain
Bitcoin (BTC)

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
rad.godprox.cc
Registered
None
Registrar
None
Status
None

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.