Security Scan Report: yogisandyoginis.com

Submitted: Apr 13, 2026, 11:12:17 PMCompleted: Apr 13, 2026, 11:13:29 PMpubliccompleted
Loading additional data...

Summary

This website contacted 10 IPs in 4 countries across 10 domains to perform 15 HTTP transactions. The main domain is yogisandyoginis.com and was registered NaN years ago.

Submitted URL: https://yogisandyoginis.com/wp-content/zucm.htm#[email protected]

AI Security Verdict

Moderate Risk

Confidence: 92%

5
Risk Score

The site impersonates INFOMANAGERINC and harvests credentials on a compromised WordPress page; high‑risk phishing site.

Risk Factors
Brand impersonation with credential form
Compromised WordPress path (wp-content)
Unranked domain used for brand spoofing
DevTools and right‑click blocking
Email address present in URL fragment
Safety Factors
Domain age >10 years (well‑established)
No malicious JavaScript YARA matches
No network IDS alerts
Established domain (3666 days old) with no strong malicious indicators — risk clamped from 8 to 5
Domain age information unavailable

Details

Page Title

Webmail Portal Access

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

phishing scam

(30%)

Domain Information

The domain name 'yogisandyoginis.com' uses the commercial generic top-level domain (.com). The core label 'yogisandyoginis' covers 15 characters holding six vowels versus nine consonants. Word splitting yields 4 words: yogis, and, yogin, is. The median word length lands at four characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://yogisandyoginis.com/wp-content/zucm.htm#c.kennedy@infomanagerinc.com

Page Load Overview

1.61s
Total Load Time
15
HTTP Requests
10
Domains
212 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:232 chars
Detector Agreement:100%

Website Classification

Primary Category

phishing scam30% confidence
Type: webapp
Method: ml+structural

All Detected Categories

phishing scam
30%
government public service
25%
documentation technical
25%
adult content
25%

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
6142.251.155.119United States
AS15169Google LLC
1172.64.147.188United States
AS13335Cloudflare, Inc.
1172.67.139.119United States
AS13335Cloudflare, Inc.
1192.124.249.10Menifee, California, United States
AS30148Sucuri
1178.63.16.224Falkenstein, Saxony, Germany
AS24940Hetzner Online GmbH
1151.101.130.137United States
AS54113Fastly, Inc.
123.227.39.200Ottawa, Ontario, Canada
AS13335Cloudflare, Inc.
1142.251.110.95United States
AS15169Google LLC
1142.251.13.95United States
AS15169Google LLC
1154.197.211.164Seychelles
AS135097LUOGELANG FRANCE LIMITED
1510--

Detected Technologies4

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T15B61B8236450143B252586E0B5B89F0730C3DD23E9461408E6F99ADFABD6EC2D14339F

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

96:n8N3N/6BNG5zPq79ztjfcqpMbIQwfNsWUYtXX:AJ6vQIv7Vb5X

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:3349:AoQCAADgAIQAJACCQEAAAACGEAAIHAGAREQABBIExICAAAAAFDoBIAAQHAAIIDgBACJCihBEQAQABQACQiEAAcgABIGAAAAA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:3fffe7e7e7e7ffff
Perceptual Hash:a70d8d27238d8f27
Difference Hash:c0000c0c4d0c0800
Wavelet Hash:0f47e7e7c0c0f0f0
Color Hash:#aae06c

Other Hashes

Crop Resistant:c0000c0c4d0c0800

Scan History

Scan history not available

Unable to load historical scan data