Summary
This website contacted 16 IPs in 2 countries across 5 domains to perform 56 HTTP transactions. The main domain is cursor-ide.com and was registered NaN years ago.
Submitted URL: https://www.cursor-ide.com/blog/sora-invite-code-2025
AI Security Verdict
Moderate Risk
Confidence: 68%
The site is a recent, unranked blog offering Sora invite information; no direct malicious activity detected, but monitor for brand impersonation.
Risk Factors
Safety Factors
Details
Page Title
Sora Invite Code 2025: Complete Access Guide + API Alternative - Cursor IDE 博客
Scan Type
public
Language
Chinese
Category
technology software
(66%)Domain Information
The domain 'www.cursor-ide.com' uses the commercial generic top-level domain (.com); it also runs on subdomain 'www'. The second-level label 'cursor-ide' is 10 characters long with four vowels and five consonants; bonus characters include 1 hyphen. Word splitting yields 2 words: cursor, ide. The median word length lands at 4.5 characters. 'curso' most strongly signals Galician. You may catch it in English and Portuguese (Brazil) as well.
Screenshot

Page Load Overview
Language Analysis
Primary Language
Detection Details
Website Classification
Primary Category
All Detected Categories
Detected Features
Domain & IP Information
| Requests | IP Address | Location | AS Autonomous System |
|---|---|---|---|
| 11 | 104.16.79.73 | United States | AS13335CLOUDFLARENET |
| 3 | 172.67.68.36 | United States | AS13335CLOUDFLARENET |
| 3 | 104.26.2.186 | United States | AS13335CLOUDFLARENET |
| 3 | 20.250.198.32 | Zurich, Zurich, Switzerland | AS8075MICROSOFT-CORP-MSN-AS-BLOCK |
| 3 | 13.107.253.44 | United States | AS8075MICROSOFT-CORP-MSN-AS-BLOCK |
| 3 | 104.26.3.186 | United States | AS13335CLOUDFLARENET |
| 3 | 52.242.103.142 | Boydton, Virginia, United States | AS8075MICROSOFT-CORP-MSN-AS-BLOCK |
| 3 | 2606:4700:20::ac43:4424 | United States | Unknown |
| 3 | 2620:1ec:48:1::44 | United States | Unknown |
| 3 | 2606:4700:20::681a:2ba | United States | Unknown |
| 56 | 16 | - | - |
Detected Technologies7
Content Similarity HashesFor malware variant detection
TLSH (Trend Micro Locality Sensitive Hash)
Security-focusedSpecialized for malware detection and similarity analysis
ssdeep (Context Triggered Piecewise Hashing)
Context-awareDetects similar content even with modifications
sdhash (Similarity Digest Hashing)
High-precisionHigh-precision similarity detection for forensic analysis
These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.
Image Hashes
Perceptual Hashes
Other Hashes
Scan History
Scan history not available
Unable to load historical scan data