Security Scan Report: kemptechnologies.com

Submitted: Nov 18, 2025, 6:55:30 PMCompleted: Nov 18, 2025, 6:59:38 PMpubliccompleted
Loading additional data...

Summary

This website contacted 11 IPs in 1 country across 7 domains to perform 20 HTTP transactions. The main domain is kemptechnologies.com and was registered NaN years ago.

Submitted URL: https://kemptechnologies.com/resources/glossary/ddos-attack

AI Security Verdict

Safe Website

Confidence: 95%

0
Risk Score

Legitimate site with no security concerns.

Safety Factors
Established domain with long registration history
No suspicious forms or data collection
No known malicious Indicators of Compromise
Page content is typical informational material about DDoS attacks
Domain age information unavailable

Details

Page Title

DDoS attack - Glossary - Kemp

Scan Type

public

Domain Information

Domain 'kemptechnologies.com' uses the commercial generic top-level domain (.com) with no subdomain. The core label 'kemptechnologies' covers 16 characters holding 6 vowels versus ten consonants. It segments into 2 words: kemp, technologies. Median word length comes out to eight characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://kemptechnologies.com/resources/glossary/ddos-attack

Page Load Overview

246.55s
Total Load Time
20
HTTP Requests
7
Domains
N/A
Total Size

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
10142.250.185.106United States
AS15169GOOGLE
199.84.149.188United States
AS16509AMAZON-02
113.107.246.45United States
AS8075MICROSOFT-CORP-MSN-AS-BLOCK
199.84.149.191United States
AS16509AMAZON-02
1104.17.24.14United States
AS13335CLOUDFLARENET
1104.18.87.42United States
AS13335CLOUDFLARENET
165.8.102.126United States
AS16509AMAZON-02
1192.133.11.4United States
AS209242Cloudflare London, LLC
165.8.102.28United States
AS16509AMAZON-02
1104.17.25.14United States
AS13335CLOUDFLARENET
2011--

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T10D930AB233F4012D0513469DBB72770CB626E06BA1B14982767C422BEFC6FA1D6177DA

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

1536:lDb/YXV2Y3fstxLjKlEAot/vjEl2ltSbrSUhEBC:l/YXV2Y2fKiA2/vjEl2lt8mC

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:93883:vdEJwkahbRCA4QmDAUEQZJAAE4aKoACw5iwCApIADwBQIR2ALQwWD8YKAH32FC0AqEnEFACxbCLrE4yMYNogAcMjDkGSAMgk

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:000000ffc3c3dfdf
Perceptual Hash:bc434b69a988e3e9
Difference Hash:0b24413037273b3f
Wavelet Hash:800000ffc3c3dfff
Color Hash:#1f9321

Other Hashes

Crop Resistant:0b24413037273b3f

Scan History

Scan history not available

Unable to load historical scan data