Security Scan Report: yogisandyoginis.com

Site favicon
Submitted: May 9, 2026, 6:52:01 PMCompleted: May 9, 2026, 6:53:15 PMpubliccompleted
Loading additional data...

Summary

This website contacted 9 IPs in 3 countries across 9 domains to perform 12 HTTP transactions. The main domain is yogisandyoginis.com and was registered NaN years ago.

Submitted URL: https://yogisandyoginis.com/wp-includes/css/dist/patterns/z-cgmm.htm#[email protected]

AI Security Verdict

Moderate Risk

Confidence: 88%

5
Risk Score

The site impersonates INFOMANAGERINC, collects credentials via a login form, and shows signs of a hacked WordPress installation – high risk phishing site.

Risk Factors
Brand impersonation with credential collection
Compromised WordPress paths
Email in URL fragment
Unranked domain claiming to be official brand
DevTools and right‑click blocking
Safety Factors
No malicious JavaScript YARA patterns detected
No network IDS alerts
Domain age >10 years (well‑established)
Established domain (3692 days old) with no strong malicious indicators — risk clamped from 8 to 5
Domain age information unavailable

Details

Page Title

Webmail Portal Access

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

phishing scam

(30%)

Domain Information

The domain name 'yogisandyoginis.com' uses the commercial generic top-level domain (.com) while skipping any subdomain. The second-level label 'yogisandyoginis' is 15 characters long containing six vowels alongside nine consonants. Segmentation suggests four words: yogis, and, yogin, is. Average segment length settles at 4 characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://yogisandyoginis.com/wp-includes/css/dist/patterns/z-cgmm.htm#c.kennedy@infomanagerinc.com

Page Load Overview

0.65s
Total Load Time
12
HTTP Requests
9
Domains
138 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:232 chars
Detector Agreement:100%

Website Classification

Primary Category

phishing scam30% confidence
Type: webapp
Method: ml+structural

All Detected Categories

phishing scam
30%
government public service
25%
documentation technical
25%
adult content
25%

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
4151.101.66.137United States
AS54113Fastly, Inc.
1198.204.251.75United States
AS33387Nocix, LLC
1142.251.153.119United States
AS15169Google LLC
1142.251.20.95United States
AS15169Google LLC
1172.64.147.188United States
AS13335Cloudflare, Inc.
123.227.39.200Ottawa, Ontario, Canada
AS13335Cloudflare, Inc.
1192.124.249.10Menifee, California, United States
AS30148Sucuri
1178.63.16.224Falkenstein, Saxony, Germany
AS24940Hetzner Online GmbH
1192.178.183.95United States
AS15169Google LLC
129--

Detected Technologies4

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T15B61B8236450143B252586E0B5B89F0730C3DD23E9461408E6F99ADFABD6EC2D14339F

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

96:n8N3N/6BNG5zPq79ztjfcqpMbIQwfNsWUYtXX:AJ6vQIv7Vb5X

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:3349:AoQCAADgAIQAJACCQEAAAACGEAAIHAGAREQABBIExICAAAAAFDoBIAAQHAAIIDgBACJCihBEQAQABQACQiEAAcgABIGAAAAA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:3fffe7e7e7e7ffff
Perceptual Hash:a70d8927278d8f27
Difference Hash:c0000c0c4d0c0800
Wavelet Hash:30e0c0c0e0e0fcfc
Color Hash:#d22dba

Other Hashes

Crop Resistant:c0000c0c4d0c0800

Scan History

Scan history not available

Unable to load historical scan data