https://github.app916842.com/
172.67.216.187 · Cloudflare, Inc.
Toronto, Canada
10 days
403 · 21.4s
Valid· E7, Let's Encrypt, US
COMPLETED
Registered-domain escalation
Submit app916842.com as the primary IOC, enriched with evidence from hostile subdomains like github.app916842.com.
No KB/IOK detections were recorded for this scan.
Scanner blocked by cloudflare
This scan likely captured a block/challenge page, so the AI analysis may not reflect the real site victims see.
technology | software_development · 4/5/2026
The page presents GitHub branding in the domain name but the host is a recently registered, suspiciously branded domain (github.app916842.com) under Cloudflare with a 403/blocked presentation. Domain intelligence indicates impersonation signals (brand in domain) and a WAF-block page was encountered, suggesting the operator is attempting to evade analysis. No definitive credential harvesting visible in static HTML, but the SPA hints and Cloudflare challenge activity imply possible credential capture mechanisms embedded in dynamic content.
Capture
Stages: 3
Canonical: Late Render (+3s)
Changed: No
Credential Signals
Forms: 0
Password fields: 0
Late-stage login UI: No
Resource Signals
Resources: 15
Hosts: 3
Domains: 3
No specific IOCs identified in source
The domain is newly registered and uses a brand name in the domain that imitates a well-known service (GitHub). The scanner was blocked by a WAF, indicating active evasion of security tooling. The page appears to be an impersonation clone designed to look like GitHub, with dynamic credential collection likely delivered via SPA JavaScript and Cloudflare challenge infrastructure. While static HTML shows no forms, the observed network activity and fingerprints strongly suggest credential capture capabilities may be present. Recommend monitoring and precautionary action pending fuller content visibility; the combination of impersonation signals and anti-scan blocking elevates risk.
Monitor