rootedinclay.com
Open in
urlscan Pro
50.87.42.180
Malicious Activity!
Public Scan
Submission: On January 07 via automatic, source openphish
Summary
This is the only time rootedinclay.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 50.87.42.180 50.87.42.180 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
15 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 50-87-42-180.unifiedlayer.com
rootedinclay.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
rootedinclay.com
rootedinclay.com |
99 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | rootedinclay.com |
rootedinclay.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://rootedinclay.com/docc/drob/read_file/write.php?openlng=5ae16b9a270c7112848035ae16b9a270c711284803
Frame ID: DFABA7CEAF7550DCD52621313585ED0D
Requests: 15 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
write.php
rootedinclay.com/docc/drob/read_file/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
rootedinclay.com/docc/drob/read_file/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
responsive_cone_28nSO.css
rootedinclay.com/docc/drob/read_file/ |
351 B 431 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_strip.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
herographic.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
up_s_logo.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
rootedinclay.com/docc/drob/read_file/ |
205 B 438 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
works_2_1.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gm-new-logo-2.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s_small.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wxl_w46.gif
rootedinclay.com/docc/drob/read_file/Icon_images/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
one_on_one.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
select_gif.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w3data.js
rootedinclay.com/docc/drob/read_file/ |
464 B 520 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_im.png
rootedinclay.com/docc/drob/read_file/Icon_images/ |
24 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| validateForm function| show function| hide function| $0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
rootedinclay.com
50.87.42.180
193523fde136cce4836b3f6226de7e83285a2daa13e615d982c840347cbbadc1
28471d5e7aca82ed04a8b4b217d1ee30ec17c73d8c66721eabd36fc632f48ba4
66a23bceffcbcb36561811aa1a926d18a278aa80ffafa741a5dba9710d94c705
6e8323291a1b833ea42fdd9d9a1cc8f6a2026bc15d2bf62de76399887e54c82e
744f1088c2cc2174272b6afbaabbd2542fec41bfa7309ad787d224c72d15279b
820fd95f28c588a9b097838197d08a900a23eb5de1ee32dbdf81fa0c882fdc2f
89bc5edf6890483ce29aa65b844320b5a8ea55ad3a95cf8134f6801f5856c1f8
ac4aa93a3406a601a55f38b588bbc058a97bb8d46060c4f4aabee0c319025034
c4b1a92368a13d22f812ce6a75c7f6e011d8aba814540e28b616a0ce3d0b335f
c4e7c1cacf85de50245e0f89d304dfb5ae55c789ea06c1dd06868a8b7c291bb2
ccc7948b8a04b8622f8f892b4570dde0d3cf1a435ec48fce125711794324d0a3
dd02ad78ca54e658b484e7b77b960cd47d06e2eca8cebd07f4765fbd49cec7fe
dfa549a0c5a73d284c6bcc1d3778a980e15fc880d5756237fca05ebf35290a02
e706cb0eacf54c789fbca1ccbc42e97adf74a731fd6b57ea9ad9cd03b1cb5026
f82b7793155da20afc23e5b5291de1e383723fc86541c8da24f70eb3bf8716d6