URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: root-gate.ryesears.in.net
Domain registrar:Public Domain Registry -
Domain registration date:1994-10-26 04:00:00 UTC
Spamhaus DBL :Abused domain (malware)
SURBL :Not blocked
Quad9 :Blocked
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Not blocked
Control D HaGeZi :Blocked
Firstseen:2026-04-09 08:00:10 UTC
Total malware sites :2
Online malware sites :0 (0%)
Offline Malware sites :2 (100%)
A record(s) observed :2

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2026-04-09 08:00:13 104.21.75.192Not listedAS13335 CLOUDFLARENETn/ayes
2026-04-09 08:00:13 172.67.180.226Not listedAS13335 CLOUDFLARENETn/ayes

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2026-04-13 10:54:12https://root-gate.ryesears.in.net/05fe317c-0981...OfflineNetSupport ext JAMESWT_WT
2026-04-09 08:00:13https://root-gate.ryesears.in.net/05fe317c-0981...OfflineClearFake NetSupport ext Anonymous

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2026-04-13 10:54:1262d487a22c5954809e2f5efd55db70cf8bdbc492bd2b0acc1d6ec75582e5cdcedllNetSupport
2026-04-09 08:00:13136251575ff9ab9f1381efa349213a203dbb05d5de596a6c3dd726e660c7785ddllNetSupport