{"node":"0x1250d75acdd98b94e841ec09ed341076cda3c2849f6909b41054faa1c7abd11c","name":"dgip2026.eth","parent_name":"eth","is_subdomain":false,"root_cid":"bafybeif4ndnsb6s4gylde4tspfpl5efi5rtrde3pplnq6ybc7kbdqvyewq","title":"Wait...","icon_url":null,"manifest_url":null,"analysis":{"root_cid":"bafybeif4ndnsb6s4gylde4tspfpl5efi5rtrde3pplnq6ybc7kbdqvyewq","model":"openai/gpt-5.4-mini","analyzed_at":"2026-05-01T04:00:53.693Z","path":"analysis/by-cid/ye/wq/bafybeif4ndnsb6s4gylde4tspfpl5efi5rtrde3pplnq6ybc7kbdqvyewq.json","category":"Identity","category_confidence":0.98,"summary":"A Microsoft365-themed login flow appears designed to collect user credentials before forwarding to a fake certificate/document path.","quality_tier":"low","quality_score":0.18,"security_risk":"high","security_risk_score":0.98,"threat_type":"brand_impersonation","safe_to_list":false},"contenthashes":[{"contenthash_protocol":"ipfs","root_cid":"bafybeif4ndnsb6s4gylde4tspfpl5efi5rtrde3pplnq6ybc7kbdqvyewq","contenthash_set_block":24829835,"contenthash_set_tx_hash":"0xecca511214bcfea79cd97c9dfcbe9542faa2e27ef5dae1392b49ea386ade43a7"}]}
