Security Scan Report: t.co

Redirected to: blob:https://platensefc.com/deceeb5f-cd10-4c0c-9da0-1461f35c141d

Site favicon
Submitted: Oct 30, 2025, 9:08:52 PMCompleted: Oct 30, 2025, 9:10:19 PMpubliccompleted
Loading additional data...

Summary

This website contacted 30 IPs in 4 countries across 10 domains to perform 16 HTTP transactions. The main domain is .

Submitted URL: https://t.co/SNX1qyz1E7

Effective URL: blob:https://platensefc.com/deceeb5f-cd10-4c0c-9da0-1461f35c141dRedirected

AI Security Verdict

Confirmed Scam

Confidence: 95%

10
Risk Score

Phishing page impersonating American Express on an unranked, likely new domain – confirmed scam.

Risk Factors
Brand impersonation on unranked, newly registered domain
Credential harvesting forms with disguised password fields
Hidden password fields
Unicode evasion in form fields
Collection of sensitive payment and personal data (card details, SSN) on suspicious domain
Domain age information unavailable

Details

Page Title

Log in to My Account | American Express US

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

finance banking

(30%)

Domain Information

Within the Colombian country-code top-level domain (.co), 't.co' is registered while skipping any subdomain. Its registrable label 't' stretches across 1 characters containing zero vowels alongside 1 consonant. Word splitting yields one word: t. Expect 1 character per word on average. Most frequently, 't' shows up in Chinese (Zhuyin). You may catch it in Catalan and Albanian as well. Taken together, it feels Chinese (Zhuyin) with single-word simplicity.

Screenshot

Security scan screenshot of https://t.co/SNX1qyz1E7

Page Load Overview

58.56s
Total Load Time
16
HTTP Requests
10
Domains
183 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:3,997 chars
Detector Agreement:100%

Website Classification

Primary Category

finance banking30% confidence
Type: webapp
Method: ml+structural

All Detected Categories

finance banking
30%

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
1623.201.242.36Frankfurt am Main, Hesse, Germany
AS16625AKAMAI-AS
066.235.200.147United States
AS13335CLOUDFLARENET
035.157.26.135Frankfurt am Main, Hesse, Germany
AS16509AMAZON-02
0142.250.74.202United States
AS15169GOOGLE
0172.66.0.227United States
AS13335CLOUDFLARENET
023.227.39.200Ottawa, Ontario, Canada
AS13335CLOUDFLARENET
0151.101.130.137San Francisco, California, United States
AS54113FASTLY
0188.114.96.3United States
AS13335CLOUDFLARENET
0104.17.25.14United States
AS13335CLOUDFLARENET
02606:4700::6811:180eUnited States
AS13335CLOUDFLARENET
1630--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T18F042A1715A655251C6F2CEA4FE73E4D7A94F483C802C650F4ED8ACCAF97B81899A3CC

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

1536:fdTO/YGu3iIob0mTbYkIOHLS0nRV+U1Y2AzEbtVcDrM3ZLhNS2kEO5Qw7qUreEiq:fdTOlGA0mTlLSiRV+cY3wbTuMQ5mwW72

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:186551:DEEEWQHAcYSRICAyNJfsBoQAEqBBiAox8JhEAI9dKgjlGwwDj8IBECgRIodBQgFCgghBQwZTRgiASJIGAsMAIQHAZGgmmA0K

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:N/A
Perceptual Hash:N/A
Difference Hash:N/A
Wavelet Hash:N/A
Color Hash:N/A

Other Hashes

Crop Resistant:N/A

Scan History

Scan history not available

Unable to load historical scan data