EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: Tutanota

⚠ Risk Factors

  • Brand impersonation of Tutanota on non-official domain
  • Contains 4 form(s) with JavaScript submission
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of centuri6.wixsite.com

Detection Info

https://centuri6.wixsite.com/tutanota1
Detected Brand
Tutanota
Country
International
Confidence
100%
HTTP Status
200
Report ID
9fec9514-ea1…
Analyzed
2026-01-09 07:45

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1FBD2F83036613C3E56974ADEF1A6774A61C3F62DE9814420A6E833DD0BC3CB26157AB9
CONTENT ssdeep
768:+UcRNOIMWmxlaIYwH64mCk3DI3r0tE1bM8BZ1BM8BSrM8B/RM8BL:+UcbwH64mCk3DI3r0tE1bM8BZ1BM8BSt

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
a7278ccc66666ccc
VISUAL aHash
03ffe7c7fffff7ff
VISUAL dHash
d6f04c4d28280c08
VISUAL wHash
002f3f273c3c2424
VISUAL colorHash
07000000006
VISUAL cropResistant
d6f04c4d28280c08,000028b2b2300810

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings