Security Scan Report: test2.pathwaysinaging.com

Redirected to: blob:https://internationaladmission.org/1a3542cd-9fc0-4740-8461-d31d390d3518

Submitted: Oct 6, 2025, 4:47:04 PMCompleted: Oct 6, 2025, 4:47:46 PMpubliccompleted
Loading additional data...

Summary

This website contacted 20 IPs in 2 countries across 6 domains to perform 9 HTTP transactions. The main domain is .

Submitted URL: https://test2.pathwaysinaging.com/wp-includes/customize/class-wp-customize-partial.html

Effective URL: blob:https://internationaladmission.org/1a3542cd-9fc0-4740-8461-d31d390d3518Redirected

AI Security Verdict

Confirmed Scam

Confidence: 95%

10
Risk Score

Phishing site impersonating Chase, harvesting credentials and payment info; avoid and report.

Risk Factors
Brand impersonation / typosquatting
Compromised WordPress site indicators
Blob URL usage to evade detection
Credential harvesting form
Payment data collection on suspicious domain
Domain age information unavailable

Details

Page Title

Sign in - chase.com

Scan Type

public

Language

🇺🇸

English

(50% confidence)

Category

corporate business

(54%)

Domain Information

The domain name 'test2.pathwaysinaging.com' uses the commercial generic top-level domain (.com) and includes subdomain 'test2'. The core label 'pathwaysinaging' covers 15 characters with five vowels and ten consonants. It segments into 3 words: pathways, in, aging. Average segment length settles at five characters. Most frequently, 'pathways' shows up in English. Secondary signals appear in Chinese (Pinyin) and Slovenian.

Screenshot

Security scan screenshot of https://test2.pathwaysinaging.com/wp-includes/customize/class-wp-customize-partial.html

Page Load Overview

10.91s
Total Load Time
9
HTTP Requests
6
Domains
173 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:50%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:50%
Script Type:Latin
HTML Lang Attribute:en-us
Text Length:868 chars
Detector Agreement:100%

Website Classification

Primary Category

corporate business54% confidence
Type: webapp
Method: ml+structural

All Detected Categories

corporate business
54%
finance banking
39%
social media network
35%
government public service
31%
e-commerce
25%

Detected Features

Login Form
Payment

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
963.176.8.218Frankfurt am Main, Hesse, Germany
AS16509AMAZON-02
0151.101.2.137San Francisco, California, United States
AS54113FASTLY
0108.179.253.38United States
AS19871NETWORK-SOLUTIONS-HOSTING
0151.101.130.137San Francisco, California, United States
AS54113FASTLY
0151.101.66.137San Francisco, California, United States
AS54113FASTLY
0104.17.25.14United States
AS13335CLOUDFLARENET
0172.217.18.10United States
AS15169GOOGLE
050.116.92.148Phoenix, Arizona, United States
AS31898ORACLE-BMC-31898
02a04:4e42::649United StatesUnknown
02a04:4e42:600::649United StatesUnknown
920--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T16A94BF3F45E717857923266D32EB06856F28D403E2099D5ABF8C53A5CF8BF909E63708

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

6144:075Z30Xe2WE+fKTRRIEbl7VfH1KLiT9Dsx6ISqtwOXA7XI8mwOzO/Hw4:wGJ5HDvISmwu448mwOzR4

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:412003:JgwMQQEgYziEgucqZBg1yQAc2ZkERgBkDjYUZiAQwIZB6AzCMi7Eygge0AF2hhBBpmMEJAFKMEwUigMAQEJwCIXNUaAgaoAJ

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:001e1c1c1c00ffff
Perceptual Hash:9a18e563fa654b98
Difference Hash:99f0f07179685400
Wavelet Hash:003e1c1c1c18ffff
Color Hash:#311f93

Scan History

Scan history not available

Unable to load historical scan data