Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11745188CB9D2B0B643D371F4847F450AF2BB5959A40E8890F62DC4D16FB894EA137F29 |
|
CONTENT
ssdeep
|
6144:cyFKhRbEIJ6/24bs90wNw/5srydc+6K9O/poxbe63I6wkgwHiTekBWkYVdLlJNbY:cftEIJq2H2dcJKh/f/1TwEkMnW89n6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
815974734e667339 |
|
VISUAL
aHash
|
001c0c3f2f2f3737 |
|
VISUAL
dHash
|
88f0d8e3dbd8c6e6 |
|
VISUAL
wHash
|
001c0c3f2f2f3f37 |
|
VISUAL
colorHash
|
07002008080 |
|
VISUAL
cropResistant
|
88f0d8e3dbd8c6e6 |
This webpage is impersonating Microsoft, displaying its logo and login interface. However, the URL domain is suspicious (odd-bonus-8094.mikiams007.workers.dev) and does not belong to Microsoft, indicating a phishing attempt.
Pages with identical visual appearance (based on perceptual hash)