{"node":"0x60983dbfbc16a1c283b55666c42da9b384c132d7932d7d01331f7f15c75a2411","name":"adobee.eth","parent_name":"eth","is_subdomain":false,"root_cid":"bafybeiglz55ll2p6rqidppfnp4qj5dgdn5udjswmdrhiy26r3op6exwl6a","title":"continue","icon_url":null,"manifest_url":null,"analysis":{"root_cid":"bafybeiglz55ll2p6rqidppfnp4qj5dgdn5udjswmdrhiy26r3op6exwl6a","model":"openai/gpt-5.4-mini","analyzed_at":"2026-05-02T21:29:03.179Z","path":"analysis/by-cid/wl/6a/bafybeiglz55ll2p6rqidppfnp4qj5dgdn5udjswmdrhiy26r3op6exwl6a.json","category":"Identity","category_confidence":0.63,"summary":"A credential-harvesting login page masquerading as a document access prompt and exfiltrating submitted email and password to Telegram.","quality_tier":"low","quality_score":0.18,"security_risk":"high","security_risk_score":0.99,"threat_type":"phishing_language","safe_to_list":false},"contenthashes":[{"contenthash_protocol":"ipfs","root_cid":"bafybeiglz55ll2p6rqidppfnp4qj5dgdn5udjswmdrhiy26r3op6exwl6a","contenthash_set_block":22482549,"contenthash_set_tx_hash":"0x64a413fbcd6605692786bffc8232ba7ad11c3541e88c732d97675d050c0ecc34"}]}
