EN ES PT
Back to Stats

Visual Capture

Screenshot of nisman.kinsta.cloud

Detection Info

https://nisman.kinsta.cloud/pf/pages/index.php
Detected Brand
DHL
Country
International
Confidence
95%
HTTP Status
200
Report ID
bc850945-06e…
Analyzed
2026-01-11 13:03

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T14FD1F2A681D58477411383DFF2AAAB17B1F0855CCA466A12F6FD57AC97EBC20B412F01
CONTENT ssdeep
96:Jb2UNRKIGo1YI4jNXiJ3FLBYkGlWkGj92lrYXz5nPSl48/vxDY:Jb2UTzN1YIG0eU96RlY

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9a1b29bd96878786
VISUAL aHash
01003c3cffffffff
VISUAL dHash
9f13cd6d603683d8
VISUAL wHash
00003c0cffdfc37f
VISUAL colorHash
06240018000
VISUAL cropResistant
9f13cd6d603683d8,3333b2909e8adee0,13535b2753636323,0000081010100800

Code Analysis

Threat Level ALTO
⚠️ Phishing Confirmed

🔬 Threat Analysis Report

• Threat: Package delivery scam/phishing attack
• Target: DHL customers
• Method: Fake DHL tracking page requesting payment to complete delivery
• Exfil: Data likely sent to a PHP script on the attacker's server
• Indicators: Unofficial domain, payment request, urgency message
• Risk: HIGH - Financial loss and potential data theft

🔐 Credential Harvesting Forms

📡 API Calls Detected

  • ../panel/blocked_ips.txt

📤 Form Action Targets

  • ./loading.php
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.