EN ES PT
Back to Stats
100 Risk Score

High Risk

⚠ Risk Factors

  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

No screenshot available

Detection Info

https://sites.google.com/view/paypal-loginn/
Detected Brand
Unknown
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
5f3ec949-7e5…
Analyzed
2026-01-09 23:09
Final URL (after redirects)
https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fsites.google.com%2Fview%2Fpaypal-loginn%2F&dsh=S-1507908146%3A1767984761273958&followup=https%3A%2F%2Fsites.google.com%2Fview%2Fpaypal-loginn%2F&ifkv=AXbMIuBmtaxBVMponu8cgzV2oqTEv8hqzTxwwV6Ahk1I0PwTi4fhp-Stm0nu1Sui9whb7RhLRZf7Gg&osid=1&passive=1209600&flowName=GlifWebSignIn&flowEntry=ServiceLogin

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T17663039F6071A63FE773B7E22C885792F2FE0528E20A14201DB85636279ED11B53375E
CONTENT ssdeep
1536:pJ30me68PCGEbED0a/16y6IaV6N4yMf4jwlYKS3M+icL6hlQZ5iGV7BZ6jxwkYcH:Ames

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ce963169ce9499c3
VISUAL aHash
00003c3e78180000
VISUAL dHash
0010602443330400
VISUAL wHash
f0f0fede7a3e0000
VISUAL colorHash
07000000180
VISUAL cropResistant
0010602443330400

Code Analysis

Risk Score 100/100
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings