EN ES PT
Back to Stats

Visual Capture

Screenshot of bafkreieblbaolujlruolakxfo26mvcjncldvoqjcgcpmbyberkajk6jlau.ipfs.dweb.link

Detection Info

https://bafkreieblbaolujlruolakxfo26mvcjncldvoqjcgcpmbyberkajk6jlau.ipfs.dweb.link/
Detected Brand
Network Solutions
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
d86454f8-73cโ€ฆ
Analyzed
2026-03-31 06:59

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T174B2EEB76028A95B52521FC477D0AE29B943E10ACC82B1FCD6F781D958F0E93BC4D61E
CONTENT ssdeep
192:unyglHKGUMCLS/Qxt4bWygT/3KTCAYWeWQv8SZuzUxojlXYGYql+K:unXNbUMs6UtMPCvNaefZuzblX3h1

Code Analysis

Risk Score 89/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer ๐ŸŽฃ Banking ๐ŸŽฃ Personal Info

๐Ÿ”’ Obfuscation Detected

  • fromCharCode
  • hex_escape
  • unicode_escape

๐ŸŽฏ Kit Endpoints

  • https://www.networksolutions.com/mail-admin/forgot-password?user=solomon.chika1%40gmail.com
  • login-page-configuration-custom
  • login-page-configuration

๐Ÿ“ก API Calls Detected

  • defaultcache
  • GET

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
100/100

Contributing Factors

Active Phishing Kit
Detected kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
Credential Harvesting
Credential harvesting detected with 1 form(s) capturing sensitive data
Code Obfuscation
JavaScript code obfuscated using 6 technique(s) to evade detection

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Network Solutions users
Attack Method
credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
CRITICAL - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

โš ๏ธ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 6 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

Impersonated Brand
Network Solutions
Official Website
N/A
Fake Service
Banking/payment service

โš”๏ธ Attack Methodology

Primary Method: Credential Harvesting

Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.

Secondary Method: JavaScript Obfuscation

Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.

๐ŸŒ Infrastructure Indicators of Compromise

Domain Information

Domain
bafkreieblbaolujlruolakxfo26mvcjncldvoqjcgcpmbyberkajk6jlau.ipfs.dweb.link
Registered
2017-02-24 01:05:26.675000+00:00
Registrar
CSC Corporate Domains, Inc.
Status
Active (older domain)

Hosting Information

Provider
CSC Corporate Domains, Inc.
ASN

๐Ÿค– AI-Extracted Threat Intelligence

Scan History for bafkreieblbaolujlruolakxfo26mvcjncldvoqjcgcpmbyberkajk6jlau.ipfs.dweb.link

Found 1 other scan for this domain

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.