EN ES PT
Back to Stats

Captura Visual

Screenshot of bafkreifvsvj7pzsn5wsb6gt3onj7ez2rvxgdvrhybg47gxzwg6a4inegoi.ipfs.dweb.link

Información de Detección

https://bafkreifvsvj7pzsn5wsb6gt3onj7ez2rvxgdvrhybg47gxzwg6a4inegoi.ipfs.dweb.link/
Detected Brand
Rackspace
Country
International
Confidence
100%
HTTP Status
200
Report ID
0749b722-a4e…
Analyzed
2026-02-28 01:03

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1D65102704068EC239642DAD0BBF9EF1E6249C365CB035B4896F4938D1EC6D82CD5A6BD
CONTENT ssdeep
48://wULTHn5fBtWWxIS9u9oFWgid33f+fgTbQbgefUVbqn9B0a:Dn9xNFWge/+Yesw96a

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b130c6cf99336475
VISUAL aHash
ffe3c3cfdfffffff
VISUAL dHash
20069e9990780c00
VISUAL wHash
f0f0c0cc1c3c3030
VISUAL colorHash
07000030000
VISUAL cropResistant
20069e9990780c00,004b0b0b0b81c301

Análisis de Código

Risk Score 65/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer

🔬 Threat Analysis Report

• Amenaza: Phishing de credenciales
• Objetivo: Usuarios de Rackspace
• Método: Impersonación de inicio de sesión de webmail
• Exfil: Correo electrónico y contraseña
• Indicadores: URL IPFS, Formulario, Logotipo de la marca
• Riesgo: ALTO

📊 Desglose de Puntuación de Riesgo

Total Risk Score
90/100

Contributing Factors

Suspicious Domain
The use of an IPFS URL is highly unusual and strongly suggests malicious intent.
Credential Harvesting
The presence of a login form for sensitive information immediately raises suspicion.

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Two-Factor Authentication Stealer
Objetivo
Rackspace users (International)
Método de Ataque
Brand impersonation + credential harvesting forms
Canal de Exfiltración
Form submission (backend endpoint not detected - likely JavaScript-based)
Evaluación de Riesgo
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer

🏢 Análisis de Suplantación de Marca

Impersonated Brand
Rackspace
Official Website
https://www.rackspace.com/
Fake Service
Webmail Login

⚔️ Metodología de Ataque

Primary Method: Credential Harvesting

The attacker creates a fake login page that mimics the legitimate website to trick users into entering their login credentials.

Secondary Method: Social Engineering

The attacker might use other techniques to get the victim to the malicious site.

🌐 Indicadores de Compromiso de Infraestructura

Domain Information

Domain
bafkreifvsvj7pzsn5wsb6gt3onj7ez2rvxgdvrhybg47gxzwg6a4inegoi.ipfs.dweb.link
Registered
None
Registrar
None
Status
None

🤖 AI-Extracted Threat Intelligence

Scan History for bafkreifvsvj7pzsn5wsb6gt3onj7ez2rvxgdvrhybg47gxzwg6a4inegoi.ipfs.dweb.link

Found 1 other scan for this domain

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.