www.c-levels.com
Open in
urlscan Pro
208.100.50.121
Malicious Activity!
Public Scan
Effective URL: http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/
Submission: On November 01 via automatic, source openphish
Summary
This is the only time www.c-levels.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 208.100.50.121 208.100.50.121 | 32748 (STEADFAST) (STEADFAST - Steadfast) | |
7 | 1 |
ASN32748 (STEADFAST - Steadfast, US)
PTR: ip121.208-100-50.static.steadfastdns.net
www.c-levels.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
c-levels.com
2 redirects
www.c-levels.com |
169 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
9 | www.c-levels.com |
2 redirects
www.c-levels.com
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/
Frame ID: 9936.1
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/validate.php
HTTP 302
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320 HTTP 301
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/validate.php
HTTP 302
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320 HTTP 301
http://www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign_in.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign_in_with_g.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign_in_with_y.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign_in_with_h.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
submit_button.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
www.c-levels.com/wp-content/CompletedFile/Charles/drop_app/aa8e4cd92d5b2c8ac9c2f984a44a4320/media/ |
138 KB 138 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.c-levels.com
208.100.50.121
0f6e82b2c3c1b0fa9db582eb164604da233c1a9730f4484358623d0382cc5d39
1346063f0d6693ee29539d83e99d8ebff51904c9a62eb567179c1f87d056b9a7
50a286e5a17071b49061422f649293c6cd248193dfcc5f5b0c1d5bca5f3f4007
69912b3009ae9cede7c8212de474d64ce27679852c466ed698092fb33430aac2
9a466fc4ef0723cf7a02b8329d249350db446844977323fd193e9e9d3efb63c9
acbba92a4a56b4b5b89704e54e5de37e3422907879b8f721bf6b9f3b83523db5
e456bd6a5cdd128ba5b0bdd99e560165d7c7eb706ef14836e0cfda0c41f0afb5