EN ES PT
Back to Stats

Captura Visual

Screenshot of bhavanishankar7075.github.io

Información de Detección

https://bhavanishankar7075.github.io/amazon-clone
Detected Brand
Amazon
Country
Unknown
Confianza
100%
HTTP Status
200
Report ID
d7215f6a-f92…
Analyzed
2026-05-16 22:17
Final URL (after redirects)
https://bhavanishankar7075.github.io/amazon-clone/

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T107023AE0C8B6D6B304D261B4D3752AD53FC0934286671E1453F99389BEAEDC9CE23938
CONTENT ssdeep
96:n6JnpqrH2Y9PoM6PHWRX/V57Palbl+lRl8lHlalNlYl8lRllPHWRtKm:Omegmlbl+lRl8lHlalNlYl8lRllcKm

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f84f134a13875b4e
VISUAL aHash
00fbf8ffc0c0ffcf
VISUAL dHash
c11702b295959b9d
VISUAL wHash
00d1f0ffc0c0ff4e
VISUAL colorHash
07401010000
VISUAL cropResistant
808082c2c2c28080,9313629695979b9d,e9c1036397176222,1c3d4cc6799d8523,981f3ba1c5c5b909,070e4c4e0606c667,41694d6c5e5e7e3e

Análisis de Código

Nivel de Amenaza ALTO
⚠️ Phishing Confirmed

🎯 Kit Endpoints

  • /login.html

📊 Desglose de Puntuación de Riesgo

Total Risk Score
40/100

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Amazon Phishing Landing Page
Objetivo
Amazon users
Método de Ataque
Phishing webpage
Canal de Exfiltración
Form submission (backend endpoint not detected - likely JavaScript-based)
Evaluación de Riesgo
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Análisis de Suplantación de Marca

Impersonated Brand
Amazon
Official Website
https://www.amazon.com
Fake Service
Credential harvesting service

⚔️ Metodología de Ataque

Primary Method: Malicious Landing Page

Uses Amazon branding to appear legitimate in search results, social media, or advertising networks. Designed to redirect victims to phishing pages or distribute malware while maintaining appearance of authenticity.

Secondary Method: Standard Phishing Techniques

Uses typical phishing tactics including brand impersonation, urgency tactics, and social engineering to trick victims into providing sensitive information.

🌐 Indicadores de Compromiso de Infraestructura

Domain Information

Dominio
bhavanishankar7075.github.io
Registered
Unknown
Registrar
Unknown
Estado
Hosting platform (subdomain)

Hosting Information

Provider
Unknown
ASN

🤖 AI-Extracted Threat Intelligence

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.