EN ES PT
Back to Stats

Captura Visual

Screenshot of codestudiocore-source.github.io

Información de Detección

https://codestudiocore-source.github.io/Clone-web-project/
Detected Brand
Netflix
Country
International
Confidence
95%
HTTP Status
200
Report ID
187b0775-0bb…
Analyzed
2026-02-14 00:05

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T160B1AEF06052AB2B4293C2E11733ABAF33E6D68DCAD6171256FC539A0BE7C52FC15095
CONTENT ssdeep
96:noYzDnfAeHnWnWn7ETnenynin/4nG6nMnnrwqEGnfAe+lBpk:oYPnf0e6FGnf6fpk

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ce4071398ce7b336
VISUAL aHash
4010a07c3f89a0b8
VISUAL dHash
88a129e1755b4371
VISUAL wHash
60d0b0fc3fb9a8b8
VISUAL colorHash
39401008000
VISUAL cropResistant
88a129e1755b4371

Análisis de Código

Threat Level ALTO
⚠️ Phishing Confirmed

🔬 Threat Analysis Report

• Amenaza: Phishing
• Objetivo: Usuarios de Netflix
• Método: Suplantación de identidad a través de un sitio web similar en alojamiento gratuito.
• Exfil: Direcciones de correo electrónico
• Indicadores: Alojamiento gratuito, logotipo de la marca, formulario.
• Riesgo: Alto

📊 Desglose de Puntuación de Riesgo

Total Risk Score
90/100

Contributing Factors

Free Hosting + Brand Logo
The use of free hosting with a Netflix logo is a strong indicator of phishing.
Form for Email Collection
Requests for email addresses are often a sign of credential harvesting.

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Netflix Phishing Landing Page
Objetivo
Netflix users (International)
Método de Ataque
Brand impersonation
Canal de Exfiltración
Form submission (backend endpoint not detected - likely JavaScript-based)
Evaluación de Riesgo
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Análisis de Suplantación de Marca

Impersonated Brand
Netflix
Official Website
https://www.netflix.com/
Fake Service
Netflix Membership

Fraudulent Claims

⚔️ Metodología de Ataque

Primary Method: Credential Harvesting

The attacker attempts to collect the user's email address under the guise of Netflix using a landing page to create a subscription or restart an existing one.

Secondary Method: Social Engineering

The website uses Netflix branding to deceive the user into providing personal information.

🌐 Indicadores de Compromiso de Infraestructura

Domain Information

Domain
codestudiocore-source.github.io
Registered
Unknown
Registrar
Unknown
Status
Active

🔬 JavaScript Deep Analysis

Operator Language
English (1%)
Total Code Size
772 bytes

🔐 Obfuscation Detected

  • : None

🤖 AI-Extracted Threat Intelligence

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

Scan History for codestudiocore-source.github.io

Found 1 other scan for this domain

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.