Security Scan Report: recruit.ncl.res.in

Submitted: Dec 27, 2025, 3:09:01 PMCompleted: Dec 27, 2025, 3:09:18 PMpubliccompleted
Loading additional data...

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main domain is recruit.ncl.res.in and was registered NaN years ago.

Submitted URL: https://recruit.ncl.res.in/

AI Security Verdict

Safe Website

Confidence: 95%

0
Risk Score

The site appears legitimate with no security concerns.

Safety Factors
Official government subdomain (ncl.res.in)
Consistent branding with CSIR/NCL
Long‑standing domain registration
Domain age information unavailable

Details

Page Title

Home Page - Recruit

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

documentation technical

(71%)

Domain Information

Domain 'recruit.ncl.res.in' uses the Indian country-code top-level domain (.res.in), featuring subdomain 'recruit'. Count 3 characters in 'ncl' holding zero vowels versus three consonants. It segments into one word: ncl. Median word length is three characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://recruit.ncl.res.in/

Page Load Overview

2.19s
Total Load Time
6
HTTP Requests
2
Domains
192 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:2,597 chars
Detector Agreement:100%

Website Classification

Primary Category

documentation technical71% confidence
Type: static
Method: ml+structural

All Detected Categories

documentation technical
71%
government public service
37%

Detected Features

No structural features detected

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
3151.101.193.229United States
AS54113FASTLY
359.163.216.78India
AS4755TATA Communications formerly VSNL is Leading ISP
62--

Detected Technologies1

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T1B203096AEAF332132413D078A7F27791BAA2D117C351DC287D5E53688F4ABB144537AC

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

768:XA/vtffczKiBxP6tFxy7Tj1e9jnxTUxu3H0:svJkx+/ynhe5ROq0

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:38013:AQJwCeaJDMtKEmQggwKKEBQjCKsXSrCUDIEBQmwAgwFEFtSgSCcCAGxMgI4EKMIRqjEgoDBmgAIM4QDGMRwGFSRMQgdEVTFq

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:fb00ff83cfffc3c3
Perceptual Hash:bd474d873ce592a0
Difference Hash:2232c80f3f980f1f
Wavelet Hash:cb00ff81cfcf8381
Color Hash:#756ce0

Scan History

Scan history not available

Unable to load historical scan data