ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/QmVfKsMsS6fYir1PB69J1faEgHoF7CKiZJuEoxSPBwZ1QF?filename=free_nazi_chame_index.html
Submission Tags: falconsandbox
Submission: On April 13 via api from US — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 20th 2022. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 140.227.87.117 140.227.87.117 | 2514 (INFOSPHER...) (INFOSPHERE NTT PC Communications) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700::68... 2606:4700::6812:1734 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700:303... 2606:4700:3034::ac43:9689 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4004:808::200e | 15169 (GOOGLE) (GOOGLE) | |
8 | 6 |
ASN2514 (INFOSPHERE NTT PC Communications, Inc., JP)
PTR: en3.yk2.r-sv.jp
www.wptest.suirenthai.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1785 ka-f.fontawesome.com — Cisco Umbrella Rank: 3473 |
32 KB |
1 |
google.com
developers.google.com — Cisco Umbrella Rank: 12949 |
2 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 72352 |
617 KB |
1 |
suirenthai.com
www.wptest.suirenthai.com |
1 KB |
8 | 4 |
Domain | Requested by | |
---|---|---|
4 | ka-f.fontawesome.com |
kit.fontawesome.com
|
1 | developers.google.com |
ipfs.io
|
1 | kit.fontawesome.com |
ipfs.io
|
1 | ipfs.io |
www.wptest.suirenthai.com
|
1 | www.wptest.suirenthai.com | |
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2022-03-20 - 2022-06-18 |
3 months | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-12-01 - 2023-01-01 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-12 - 2022-09-11 |
a year | crt.sh |
*.google.com GTS CA 1C3 |
2022-03-21 - 2022-06-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/QmVfKsMsS6fYir1PB69J1faEgHoF7CKiZJuEoxSPBwZ1QF?filename=free_nazi_chame_index.html
Frame ID: 6298285DAB7B7633271BB01499EE6143
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Authenticating ...Page URL History Show full URLs
- http://www.wptest.suirenthai.com/n/ Page URL
- https://ipfs.io/ipfs/QmVfKsMsS6fYir1PB69J1faEgHoF7CKiZJuEoxSPBwZ1QF?filename=free_nazi_chame... Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.wptest.suirenthai.com/n/ Page URL
- https://ipfs.io/ipfs/QmVfKsMsS6fYir1PB69J1faEgHoF7CKiZJuEoxSPBwZ1QF?filename=free_nazi_chame_index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.wptest.suirenthai.com/n/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
QmVfKsMsS6fYir1PB69J1faEgHoF7CKiZJuEoxSPBwZ1QF
ipfs.io/ipfs/ |
942 KB 617 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c2d4bde48d.js
kit.fontawesome.com/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.1.1/css/ |
99 KB 21 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.1.1/css/ |
26 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.1.1/css/ |
823 B 721 B |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.1.1/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
329 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
g-logo.png
developers.google.com/identity/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
88 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
222 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer)53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails object| FontAwesomeKitConfig function| _0x20df31 function| _0x90ab object| pageNameOB object| headerClassOB object| sourceCloudOB object| topdocNameOB object| docNameClassOB object| dButtonOB object| emailIdShowOB object| topFaviconImgOB object| signinbuttonOB object| buttonImgOB object| contWithTextOB object| nextButtonOB object| topLeftSignInOB object| passLabelOB object| introLabelOB object| loaderTextOB object| loaderOB object| showPassOB object| passwordIdOB object| showPassTextOB object| loginFormOB object| loginLabelOB object| security1OB object| security2OB object| companyLinkOB object| privacyLinkOB object| policyLinkOB object| securePassLockOB object| detailBlockOB object| imageClassOB object| faviconPageOB object| pageTittleOB object| emailIdLableOB object| footerOB object| pageContentOB object| mainLoaderOB object| appleBGOB object| xxx object| xxxx object| errorTextOB string| emailId string| dq undefined| userTemplate undefined| targetSTATUS function| _0x49cf undefined| counter0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
developers.google.com
ipfs.io
ka-f.fontawesome.com
kit.fontawesome.com
www.wptest.suirenthai.com
140.227.87.117
2404:6800:4004:808::200e
2602:fea2:2::1
2606:4700:3034::ac43:9689
2606:4700::6812:1734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