www.vlasta.fr
Open in
urlscan Pro
62.210.88.230
Malicious Activity!
Public Scan
Submission: On December 08 via automatic, source phishtank
Summary
This is the only time www.vlasta.fr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 62.210.88.230 62.210.88.230 | 12876 (AS12876) (AS12876) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
vlasta.fr
1 redirects
www.vlasta.fr |
123 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | www.vlasta.fr |
1 redirects
www.vlasta.fr
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.vlasta.fr/filll/Pdf/Dropbox/
Frame ID: (BCEEBF45AFE48311C4C141AC6F59D147)
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.vlasta.fr/filll/Pdf/Dropbox
HTTP 301
http://www.vlasta.fr/filll/Pdf/Dropbox/ Page URL
Detected technologies
Debian (Operating Systems) ExpandDetected patterns
- headers server /Debian/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.vlasta.fr/filll/Pdf/Dropbox
HTTP 301
http://www.vlasta.fr/filll/Pdf/Dropbox/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.vlasta.fr/filll/Pdf/Dropbox/ Redirect Chain
|
25 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.css
www.vlasta.fr/filll/Pdf/Dropbox/SpryAssets/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.css
www.vlasta.fr/filll/Pdf/Dropbox/SpryAssets/ |
2 KB 878 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.js
www.vlasta.fr/filll/Pdf/Dropbox/SpryAssets/ |
76 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.js
www.vlasta.fr/filll/Pdf/Dropbox/SpryAssets/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropboxlogo.png
www.vlasta.fr/filll/Pdf/Dropbox/dropbox_files/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropboxbkg.png
www.vlasta.fr/filll/Pdf/Dropbox/dropbox_files/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropbox.jpeg
www.vlasta.fr/filll/Pdf/Dropbox/dropbox_files/ |
9 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.vlasta.fr/filll/Pdf/Dropbox/dropbox_files/ |
93 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.ddslick.min.js
www.vlasta.fr/filll/Pdf/Dropbox/dropbox_files/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint object| Spry function| $ function| jQuery object| sprypassword1 object| sprytextfield10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.vlasta.fr
62.210.88.230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