EN ES PT
Back to Stats

Visual Capture

Screenshot of ldgeer-ledger.webflow.io

Detection Info

http://ldgeer-ledger.webflow.io/
Detected Brand
Ledger
Country
International
Confidence
95%
HTTP Status
200
Report ID
f091a1fc-b7c…
Analyzed
2026-02-14 23:53
Final URL (after redirects)
https://ldgeer-ledger.webflow.io/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T139D1C827C644111E5F2702A8E69FB7FEC3E6405DB7A44CE968B8825E33D910A83F6DD1
CONTENT ssdeep
192:yiIGPWw2gKatuaKy3/OYElsi66tKGrNu3:7Ww2gKatuaKy3LECkt3u3

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c16bd4906bd1947e
VISUAL aHash
7c000000007e7e7e
VISUAL dHash
d8c0c0c0d0d0dcc4
VISUAL wHash
7e0000607e7e7e7e
VISUAL colorHash
3a000e00000
VISUAL cropResistant
a280c1899dccc0a2,c03030d098383080,a2808ba3a3a7a781,d8c0c0c0d0d0dcc4

Code Analysis

Risk Score 53/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Ledger users
• Method: Impersonation via free hosting.
• Exfil: Unknown.
• Indicators: Free hosting, Ledger logo.
• Risk: High

🔒 Obfuscation Detected

  • fromCharCode

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting with Brand Logo
The site uses free hosting (webflow.io) and displays the Ledger logo, a strong indicator of phishing.
Obfuscation Detected
Code obfuscation is a technique used by phishers to hide malicious code

🔬 Comprehensive Threat Analysis

Threat Type
Credential Harvesting Kit
Target
Ledger users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
MEDIUM - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester
  • 4 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger Live Web

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker aims to steal Ledger user credentials by creating a convincing imitation of the official Ledger website. The user may be prompted to enter their seed phrase or other sensitive information.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
ldgeer-ledger.webflow.io
Registered
Unknown
Registrar
Webflow, Inc.
Status
Active

🔬 JavaScript Deep Analysis

Sophistication Level
Basic
Total Code Size
36.5 KB

🔗 API Endpoints Detected

Other
4
Backend API
1

🔐 Obfuscation Detected

  • : Light

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.