EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: BAJO • Impersonating: Roblox
  • • Threat: Potential domain typo or misconfiguration
  • • Target: Roblox users
  • • Method: No active phishing detected, but domain is suspicious
  • • Exfil: No data exfiltration detected
  • • Indicators: Domain mismatch, no malicious forms
  • • Risk: LOW - No immediate threat detected

⚠ Risk Factors

  • Brand impersonation of Roblox on non-official domain
  • Contains 1 form(s) with JavaScript submission
  • JavaScript obfuscation detected (8 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

No screenshot available

Detection Info

https://www.robiox.com.py/games/109983668079237/DUELS-Steal-a-Brainrot?privateServerLinkCode=033448852841876548311712961804
Detected Brand
Roblox
Country
International
Confidence
100%
HTTP Status
200
Report ID
648d505a-f22…
Analyzed
2026-01-11 13:05

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T18613967261201837A17FA2D9F519F70591E3E70FCA829BE1A1F8A3760AD9C31FD1351A
CONTENT ssdeep
768:sOuXVXW12rl0WlqXbym4J4dvrvrvEL36Pd3vBRJTMhdiEK:sOuXVXW12rljlqXZNjMbcXJTMfiEK

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b43636989c596d4d
VISUAL aHash
82c7c3c7dfdfcfff
VISUAL dHash
ae0e0e0e30301e2a
VISUAL wHash
008383c39f8fcfc3
VISUAL colorHash
070000001c0
VISUAL cropResistant
ae0e0e0e30301e2a

Code Analysis

Risk Score 100/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Potential domain typo or misconfiguration
• Target: Roblox users
• Method: No active phishing detected, but domain is suspicious
• Exfil: No data exfiltration detected
• Indicators: Domain mismatch, no malicious forms
• Risk: LOW - No immediate threat detected

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • js_packer
  • base64_strings