Security Scan Report: yogisandyoginis.com

Submitted: Apr 20, 2026, 11:46:57 PMCompleted: Apr 20, 2026, 11:48:07 PMpubliccompleted
Loading additional data...

Summary

This website contacted 9 IPs in 4 countries across 9 domains to perform 11 HTTP transactions. The main domain is yogisandyoginis.com and was registered NaN years ago.

Submitted URL: https://yogisandyoginis.com/wp-content/zucm.htm#[email protected]

AI Security Verdict

Moderate Risk

Confidence: 92%

5
Risk Score

The site is a compromised WordPress phishing page impersonating YAO, collecting credentials via a login form; confirmed scam.

Risk Factors
Unranked domain claiming to be a major brand
DevTools and right‑click blocking (anti‑analysis techniques)
Email address in URL fragment used to lure credentials
External resources from multiple CDNs (potentially to hide malicious activity)
Safety Factors
Domain age >10 years (long‑standing registration)
Established domain (3673 days old) with no strong malicious indicators — risk clamped from 9 to 5
Domain age information unavailable

Details

Page Title

Webmail Portal Access

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

phishing scam

(30%)

Domain Information

You're looking at domain 'yogisandyoginis.com' on the commercial generic top-level domain (.com) and has no subdomain. The core label 'yogisandyoginis' covers 15 characters split between six vowels and 9 consonants. Word splitting yields 4 words: yogis, and, yogin, is. Expect four characters per word on average. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://yogisandyoginis.com/wp-content/zucm.htm#nnl@yao.se

Page Load Overview

0.96s
Total Load Time
11
HTTP Requests
9
Domains
98 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:210 chars
Detector Agreement:100%

Website Classification

Primary Category

phishing scam30% confidence
Type: webapp
Method: ml+structural

All Detected Categories

phishing scam
30%
documentation technical
28%
government public service
26%
adult content
26%

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
3142.251.20.95United States
AS15169Google LLC
1151.101.130.137United States
AS54113Fastly, Inc.
1178.63.16.224Falkenstein, Saxony, Germany
AS24940Hetzner Online GmbH
1192.124.249.10Menifee, California, United States
AS30148Sucuri
1192.178.183.95United States
AS15169Google LLC
123.227.39.200Ottawa, Ontario, Canada
AS13335Cloudflare, Inc.
1154.197.211.164Seychelles
AS135097LUOGELANG FRANCE LIMITED
1142.251.152.119United States
AS15169Google LLC
1104.18.40.68United States
AS13335Cloudflare, Inc.
119--

Detected Technologies4

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T1AE61A7236450153B262586E0B5B8AF0730C3DD23E9461418E6F9DADFABD6DC2D14239F

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

96:n8N3s/6BNG5zPq795tjfcqpMbIQwfNsWUYtnX:AG6vQId7VbJX

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:3315:GhAAGACAADQAoUACQEADSmBAQEAAGAQgRoABIAQBRAQAAEAgEAEBIIAgWABAACgBKABAAgBAQDAABBgAIAFhIEBgBAKABIDA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:3ffff7e7e7e7ffff
Perceptual Hash:a70d8d27278d8d27
Difference Hash:c0002c0c4d0c0800
Wavelet Hash:3c64d0c0e0e0f0f0
Color Hash:#d2c979

Other Hashes

Crop Resistant:c0002c0c4d0c0800

Scan History

Scan history not available

Unable to load historical scan data