bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
Open in
urlscan Pro
2606:4700::6811:600d
Malicious Activity!
Public Scan
Effective URL: https://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/
Submission: On May 05 via api from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on March 16th 2024. Valid for: 3 months.
This is the only time bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6811:600d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 27.221.16.146 27.221.16.146 | 4837 (CHINA169-...) (CHINA169-BACKBONE CHINA UNICOM China169 Backbone) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3034::ac43:991f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 7 |
ASN13335 (CLOUDFLARENET, US)
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com |
ASN4837 (CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN)
lib.sinaapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
screendot.io
screendot.io |
488 B |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1103 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3044 |
39 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 380 |
30 KB |
1 |
sinaapp.com
lib.sinaapp.com — Cisco Umbrella Rank: 324841 |
29 KB |
1 |
cf-ipfs.com
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com |
113 KB |
7 | 5 |
Domain | Requested by | |
---|---|---|
2 | screendot.io |
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
|
1 | stackpath.bootstrapcdn.com |
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
|
1 | ajax.googleapis.com |
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
|
1 | lib.sinaapp.com |
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
|
1 | maxcdn.bootstrapcdn.com |
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
|
1 | bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com | |
7 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cf-ipfs.com E1 |
2024-03-16 - 2024-06-14 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
*.sinaapp.com GeoTrust CN RSA CA G1 |
2023-11-10 - 2024-12-10 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
screendot.io GTS CA 1P5 |
2024-04-06 - 2024-07-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/
Frame ID: CE017DB39F07FD1BD61009F0953ACE0B
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Mail : Sign In SessionPage URL History Show full URLs
-
http://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/
HTTP 307
https://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/
HTTP 307
https://bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/ Redirect Chain
|
252 KB 113 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.3.1/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.0.3.min.js
lib.sinaapp.com/js/jquery/2.0.3/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
555 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
standard
screendot.io/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
standard
screendot.io/api/ |
40 B 488 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap function| _0x171a5d function| _0x197b56 function| _0x5ccd87 function| _0x4c153e function| _0x25abd8 function| _0x2024de string| tgc object| _0x5d40c8 function| _0x4d60 object| _0x1b36cf function| _0x1f3e4e string| dri function| _0xfdce9b function| _0x1538aa function| _0x1d69a5 function| _0x4291 function| _0x320a251 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com/ | Name: __cf_bm Value: xew89.xpTyaFlLgPKz9ORziKCnOmlD1brm5CwdBrqAg-1714944496-1.0.1.1-E3YSr0WNE7EToB9hsNpJTeg7cZHIKa.NsmMfPDfKgSwoWDi3ElQv3EHor81yE6VpHpKje59iqRXmG6xns_6yOw |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bafybeieaykf7drngodqpekio3gk7swymnytxvovi2xtjchyhjnhrxzljfi.ipfs.cf-ipfs.com
lib.sinaapp.com
maxcdn.bootstrapcdn.com
screendot.io
stackpath.bootstrapcdn.com
2606:4700:3034::ac43:991f
2606:4700::6811:600d
2606:4700::6812:acf
2606:4700::6812:bcf
27.221.16.146
2a00:1450:4001:801::200a
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
60b19e5da6a9234ff9220668a5ec1125c157a268513256188ee80f2d2c8d8d36
6a6beae164a3397dd506f59af5261bb7662b9344a3225c0f4d7f857f54f4db13
93f553f07040ccaa21c9fa7c4ec02e97aff4999acee2bd4bdf9860100a1ea08a
aba082654ed9a884ee14954d8a4085aff721d03989fcc16934f4d03cf6a55229
b13cb5989e08fcb02314209d101e1102f3d299109bdc253b62aa1da21c9e38ba
d97fa9b0ec60e6d3ca668d708e2e480ddcc90adbc5ed9e42abc843de79551d5a
dfefec49df5a567bd6c7997d0603b10fcd709e74acb9f0028c3c83f1ee488c5d