EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: Outlook

⚠ Risk Factors

  • Brand impersonation of Outlook on non-official domain
  • Contains 5 form(s) with JavaScript submission
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of xn--posta-aurirati-ced.weebly.com

Detection Info

https://xn--posta-aurirati-ced.weebly.com/
Detected Brand
Outlook
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
79184401-bb2…
Analyzed
2026-01-11 04:01

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T16CE152D1C104DE37471245D9F7F55B5BB692C349CB060984A3F882AB9BCBC60CB2669D
CONTENT ssdeep
96:nkJ8i6m2zdaPfSTh0yt7P7yt77ufVwvFMeFXVHFIeZXmX/YDCrJ:kJ8jm2zdaid0yx7y0fOHFwXgC1

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
bb86c499a7d3b08c
VISUAL aHash
ffffef8f0b888880
VISUAL dHash
71a1985a5a1b3a15
VISUAL wHash
ffffef0f0b080080
VISUAL colorHash
07480040080
VISUAL cropResistant
71a1985a5a1b3a15,2008367171162000,6b7b1f038b0f6301,b4b43434b471a7b7,b010018707373333

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

Scan History for xn--posta-aurirati-ced.weebly.com

Found 1 other scan for this domain