Summary
This website contacted 4 IPs in 1 country across 1 domain to perform 4 HTTP transactions. The main domain is lorino.cfd and was registered NaN years ago.
Submitted URL: https://lorino.cfd/kkoco.jp
AI Security Verdict
Confirmed Scam
Confidence: 95%
Confirmed phishing scam impersonating Mitsui Sumitomo Bank on a brand‑new unranked domain.
Risk Factors
Details
Page Title
三井住友銀行
Scan Type
public
Language
English
Category
phishing/scam
(40%)Domain Information
The domain name 'lorino.cfd' uses the .cfd top-level domain and has no subdomain. The registrable portion 'lorino' spans 6 characters holding 3 vowels versus three consonants. Breaking it apart gives two words: lori, no. Average segment length settles at three characters. No strong language cues emerged from the frequency lists.
Screenshot

Page Load Overview
Language Analysis
Primary Language
Detection Details
Website Classification
Primary Category
All Detected Categories
Detected Features
Domain & IP Information
| Requests | IP Address | Location | AS Autonomous System |
|---|---|---|---|
| 4 | 172.67.218.14 | United States | AS13335CLOUDFLARENET |
| 1 | 104.21.24.79 | United States | AS13335CLOUDFLARENET |
| 1 | 2606:4700:3033::ac43:da0e | United States | AS13335CLOUDFLARENET |
| 1 | 2606:4700:3033::6815:184f | United States | AS13335CLOUDFLARENET |
| 4 | 4 | - | - |
Detected Technologies3
Content Similarity HashesFor malware variant detection
ssdeep (Context Triggered Piecewise Hashing)
Context-awareDetects similar content even with modifications
sdhash (Similarity Digest Hashing)
High-precisionHigh-precision similarity detection for forensic analysis
These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.
Image Hashes
Perceptual Hashes
Other Hashes
Scan History
Scan history not available
Unable to load historical scan data