EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: Apple

⚠ Risk Factors

  • Brand impersonation of Apple on non-official domain
  • Contains 1 form(s) with JavaScript submission
  • JavaScript obfuscation detected (8 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of www.migly.in

Detection Info

http://www.migly.in/yFnY
Detected Brand
Apple
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
bb673ac9-218…
Analyzed
2026-01-09 22:39
Final URL (after redirects)
https://www.migly.in/yFnY

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1D66231317043192B423389D6F8E1BB0AB2ABE30EC7069140FAE956DB5FC7D90F952275
CONTENT ssdeep
192:AGws90Ygd9T8ufv+aKX51pLIYdyECi1J9cA4BrAuGFJfnckcXsyiA9jsvyaZrbot:ao0N1Kp1xETi1J6HBrunzpZQhH

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f626762672899999
VISUAL aHash
c3c3fffffffffffc
VISUAL dHash
0c0c000c0c0c1030
VISUAL wHash
c3c3ffe7c3e70000
VISUAL colorHash
07001000180
VISUAL cropResistant
0c0c000c0c0c1030,1c66e4333381d029

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • document.write
  • hex_escape
  • unicode_escape
  • base64_strings