Security Scan Report: jksndkmlsmdkml.cyou

Submitted: Feb 28, 2026, 2:58:52 AMCompleted: Feb 28, 2026, 3:00:48 AMpubliccompleted
Loading additional data...

Summary

This website contacted 1 IP in 1 country across 1 domain to perform 4 HTTP transactions. The main domain is jksndkmlsmdkml.cyou and was registered NaN years ago.

Submitted URL: https://jksndkmlsmdkml.cyou/

AI Security Verdict

Safe Website

Confidence: 85%

1
Risk Score

No malicious activity detected; site appears benign but is brand‑new and currently unavailable.

Safety Factors
No credential or payment collection forms
No malicious Indicators of Compromise
No JavaScript malware patterns
No network IDS alerts
HTTPS connection (implied by URL scheme)
Domain age information unavailable

Details

Page Title

jksndkmlsmdkml.cyou

Scan Type

public

Language

🇺🇸

English

(71% confidence)

Category

technology software

(60%)

Domain Information

Domain 'jksndkmlsmdkml.cyou' uses the .cyou top-level domain. Count 14 characters in 'jksndkmlsmdkml' containing zero vowels alongside 14 consonants. Segmentation suggests 7 words: jk, s, nd, km, lsm, dk, ml. Median word length comes out to 2 characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://jksndkmlsmdkml.cyou/

Page Load Overview

4.76s
Total Load Time
2
HTTP Requests
1
Domains
N/A
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:71%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:71%
Script Type:Latin
Text Length:99 chars
Detector Agreement:100%

Website Classification

Primary Category

technology software60% confidence
Type: static
Method: ml+structural

All Detected Categories

technology software
60%
documentation technical
28%

Detected Features

No structural features detected

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
264.32.26.230United States
21--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T1F4048F77329A063986558498E05B430D9F20B143F506C9BCB9BCBAD9BFDED06107BB78

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

3072:zfQho9PKBb9Js3q9Jzbs6tlg3SBKwdQWgceIszH2bMy8Oldh:MhoC9JSqzzbs6o3Sj3gcrsT2eAD

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:184524:9EgNGRCJaQhxBS/CnRAqTCWVNAIEMSBHujCXyASBTkUopAylUAEMAwWjEggBCYjiiDQsY8glNOlRErQghNOE4kpehCtAVhha

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:ffc7c7c3f3ffffff
Perceptual Hash:b1319acecc653333
Difference Hash:001c181606000000
Wavelet Hash:f0d0c4c0f0f0f0f0
Color Hash:#d2aa79

Other Hashes

Crop Resistant:001c181606000000

Scan History

Scan history not available

Unable to load historical scan data