{"node":"0xbb26b2ae184250471e5e25849f8827a41e4f9ba135ee9ce569e0c0b1222bf7f2","name":"workaem.eth","parent_name":"eth","is_subdomain":false,"root_cid":"bafybeie4j62qzbxsq26s4k6hriokd7vqxblpv4rq3qqucmm7vje2riftk4","title":null,"icon_url":null,"manifest_url":null,"analysis":{"root_cid":"bafybeie4j62qzbxsq26s4k6hriokd7vqxblpv4rq3qqucmm7vje2riftk4","model":"openai/gpt-5.4-mini","analyzed_at":"2026-05-06T10:45:54.104Z","path":"analysis/by-cid/ft/k4/bafybeie4j62qzbxsq26s4k6hriokd7vqxblpv4rq3qqucmm7vje2riftk4.json","category":"Unknown","category_confidence":0.93,"summary":"The root is a fake Cloudflare-style verification page that pushes users to copy and run PowerShell downloading remote scripts.","quality_tier":"low","quality_score":0.18,"security_risk":"high","security_risk_score":0.98,"threat_type":"malware_download","safe_to_list":false},"contenthashes":[{"contenthash_protocol":"ipfs","root_cid":"bafybeie4j62qzbxsq26s4k6hriokd7vqxblpv4rq3qqucmm7vje2riftk4","contenthash_set_block":22383717,"contenthash_set_tx_hash":"0x01bd19e860d7f7e319deef656e15539f9da786eebb8e679e76119006b9427e87"}]}
