EN ES PT
Back to Stats
95 Risk Score

High Risk

Threat Level: ALTO • Impersonating: AT&T

⚠ Risk Factors

  • Brand impersonation of AT&T on non-official domain
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of docs.google.com

Detection Info

https://docs.google.com/presentation/d/e/2PACX-1vTfjcBpt0jsOjyQYiCdiV0V2tqE386QEi0Ju7KMLjUnSusYhI7_-NsmYCaCiI5FF2Niid8oaKgdVyij/pub?start=false&loop=false&delayms=3000&slide=id.p
Detected Brand
AT&T
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
e2d02198-ea5…
Analyzed
2026-01-09 08:47

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1B4036633D2016571E7FE12E2A8F06B7E2593832ECE071400573CEA919EFFD566646D8A
CONTENT ssdeep
768:TDHEHYTYTPXdTWTHEBT1TQ1dneec+CLpdhDNe1ARkapjTdPUxkuo:PE4TYTPXdTWTkBT1TQ1dneec+CLpdhDd

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b3ccd033cc39cccc
VISUAL aHash
ffe7ef81ffe7c7ff
VISUAL dHash
104d0d13004d4d00
VISUAL wHash
2c04ee003f07071f
VISUAL colorHash
07001000180
VISUAL cropResistant
104d0d13004d4d00

Code Analysis

Risk Score 95/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

Similar Websites

Pages with identical visual appearance (based on perceptual hash)