EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: BT

⚠ Risk Factors

  • Brand impersonation of BT on non-official domain
  • Contains 5 form(s) with JavaScript submission
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of kjkjfsjkfs9.weebly.com

Detection Info

https://kjkjfsjkfs9.weebly.com/
Detected Brand
BT
Country
UK
Confidence
100%
HTTP Status
200
Report ID
21ac11ae-5a4…
Analyzed
2026-01-07 17:26

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T19DC141E1C454CD36435286E4E7F9AB0F67A2C34ACA42094453F883EB6BDBC70DB22599
CONTENT ssdeep
96:nkSw/zeNNeSTgGkQ48ctmMHNLwvFyexXWHF7veaoXiX/2lJ:kD/zeTkGnWYMtew9WaDX6

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
872539c2c7d3c639
VISUAL aHash
0202363636340c0c
VISUAL dHash
febee6e4e46cb878
VISUAL wHash
02063e7f7e3e0e0e
VISUAL colorHash
00000000038
VISUAL cropResistant
effbf6ecd830c080,d2c0f2f2e2826a6a,febee6e4e46cb878

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

Similar Websites

Pages with identical visual appearance (based on perceptual hash)