ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Submission: On August 18 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
2 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 27.221.16.176 27.221.16.176 | 4837 (CHINA169-...) (CHINA169-BACKBONE CHINA UNICOM China169 Backbone) | |
1 | 142.250.198.10 142.250.198.10 | 15169 (GOOGLE) (GOOGLE) | |
2 | 104.21.80.186 104.21.80.186 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 6 |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
ASN4837 (CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN)
lib.sinaapp.com |
ASN15169 (GOOGLE, US)
PTR: nrt12s58-in-f10.1e100.net
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
screendot.io
screendot.io |
383 B |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1179 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3131 |
39 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 424 |
30 KB |
1 |
sinaapp.com
lib.sinaapp.com — Cisco Umbrella Rank: 166919 |
29 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 50965 |
114 KB |
7 | 5 |
Domain | Requested by | |
---|---|---|
2 | screendot.io |
ipfs.io
|
1 | stackpath.bootstrapcdn.com |
ipfs.io
|
1 | ajax.googleapis.com |
ipfs.io
|
1 | lib.sinaapp.com |
ipfs.io
|
1 | maxcdn.bootstrapcdn.com |
ipfs.io
|
1 | ipfs.io | |
7 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
*.sinaapp.com GeoTrust CN RSA CA G1 |
2022-11-10 - 2023-12-11 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-17 - 2023-10-09 |
3 months | crt.sh |
screendot.io GTS CA 1P5 |
2023-08-14 - 2023-11-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafybeibiixver6m3bgiln3no3wilp5yly2eh6podb54mxvwbhmo36yvnhy/index7btry.html
Frame ID: 62BC24879894D3BCBD27007895411580
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Mail : Sign In SessionDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index7btry.html
ipfs.io/ipfs/bafybeibiixver6m3bgiln3no3wilp5yly2eh6podb54mxvwbhmo36yvnhy/ |
254 KB 114 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.3.1/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.0.3.min.js
lib.sinaapp.com/js/jquery/2.0.3/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
555 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
standard
screendot.io/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
standard
screendot.io/api/ |
40 B 383 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery object| bootstrap function| _0x171a5d function| _0x197b56 function| _0x5ccd87 function| _0x4c153e function| _0x25abd8 function| _0x2024de string| tgc object| _0x5d40c8 function| _0x4d60 object| _0x1b36cf function| _0x1f3e4e string| dri function| _0xfdce9b function| _0x1538aa function| _0x1d69a5 function| _0x4291 function| _0x320a250 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
ipfs.io
lib.sinaapp.com
maxcdn.bootstrapcdn.com
screendot.io
stackpath.bootstrapcdn.com
104.18.11.207
104.21.80.186
142.250.198.10
209.94.90.1
27.221.16.176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