bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link Open in urlscan Pro
2606:4700::6812:1634  Malicious Activity! Public Scan

URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Submission: On November 30 via api from IE — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 5 domains to perform 7 HTTP transactions. The main IP is 2606:4700::6812:1634, located in United States and belongs to CLOUDFLARENET, US. The main domain is bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 18th 2022. Valid for: a year.
This is the only time bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
2 2606:4700::68... 13335 (CLOUDFLAR...)
7 2
Domain Requested by
2 bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
0 stackpath.bootstrapcdn.com Failed bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
0 ajax.googleapis.com Failed bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
0 maxcdn.bootstrapcdn.com Failed bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
0 cdnjs.cloudflare.com Failed bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
0 code.jquery.com Failed bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
7 6

This site contains no links.

Subject Issuer Validity Valid
w3s.link
Cloudflare Inc ECC CA-3
2022-07-18 -
2023-07-17
a year crt.sh

This page contains 1 frames:

Primary Page: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Frame ID: 428353EFF4BD1F5276EC97C34BB30ACA
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

Webmail Portal Login

Page Statistics

7
Requests

29 %
HTTPS

100 %
IPv6

5
Domains

6
Subdomains

2
IPs

1
Countries

95 kB
Transfer

236 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
180 KB
95 KB
Document
General
Full URL
https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1634 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0028ab4e3438686f76d891d28e839a24e1e729b614e2c2b19aa83bce6a385887
Security Headers
Name Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com; form-action 'self' ; navigate-to 'self'; connect-src 'self' blob: data:

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET
access-control-allow-origin
*
access-control-expose-headers
Link
cache-control
public, max-age=29030400, immutable
cf-cache-status
DYNAMIC
cf-ray
772640f38c969b9e-FRA
content-encoding
gzip
content-security-policy
default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com; form-action 'self' ; navigate-to 'self'; connect-src 'self' blob: data:
content-type
text/html
date
Wed, 30 Nov 2022 20:15:33 GMT
server
cloudflare
server-timing
request;dur=21384
vary
Accept-Encoding
x-cf-ipfs-cache-status
miss
x-dotstorage-anchor
070bf91b309ae12cc6b77588b0d22ff5883d469dde9f979cd31fe3d78ca2f2d9
x-dotstorage-resolution-id
https://cf.dag.haus
x-dotstorage-resolution-layer
public-race-l2
x-ipfs-path
/ipfs/bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4/
x-ipfs-root
bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4
x-ipfs-roots
bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4
favicons
bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/images/
11 B
109 B
Image
General
Full URL
https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/images/favicons
Requested by
Host: bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link
URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1634 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8bc36331ef8b0fc6c198c090bdd4acc3c01185392d2c4d4cd1963fc8b00bde11
Security Headers
Name Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com; form-action 'self' ; navigate-to 'self'; connect-src 'self' blob: data:

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

date
Wed, 30 Nov 2022 20:15:35 GMT
content-security-policy
default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com; form-action 'self' ; navigate-to 'self'; connect-src 'self' blob: data:
server
cloudflare
vary
Accept-Encoding
content-type
text/html
access-control-allow-origin
*
access-control-expose-headers
Link
server-timing
request;dur=1665
cf-ray
7726417c1f789b9e-FRA
content-length
11
truncated
/
558 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
578254b8c8e53db6ffe80754d29a9db454d8818885ac826b11e9b95389618b5b

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
520 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2172033cc841f94e32ca4412cd380e43d873a9e74e54aee03f0d26ed72d20be5

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
55 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
42171d76548498998da88f032aba50a028b9481fd7004a9a3b5d3b8d98fe48a2

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/png
jquery-3.2.1.slim.min.js
code.jquery.com/
0
0

popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/
0
0

bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/
0
0

jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
0
0

bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
code.jquery.com
URL
https://code.jquery.com/jquery-3.2.1.slim.min.js
Domain
cdnjs.cloudflare.com
URL
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Domain
maxcdn.bootstrapcdn.com
URL
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Domain
ajax.googleapis.com
URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Domain
stackpath.bootstrapcdn.com
URL
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| oncontentvisibilityautostatechange function| $ function| jQuery object| _0x29a3 function| _0x40b2 function| _0x2e20a0 string| hash number| n function| goNow

1 Cookies

Domain/Path Name / Value
bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/ Name: __cflb
Value: 02DiuEkP8hw3gxppKvBYxa2eaW7UoqmRBUy7iL5sJshbJ

7 Console Messages

Source Level URL
Text
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/(Line 24)
Message:
Refused to load the image 'https://firebasestorage.googleapis.com/v0/b/chdi98-u54r.appspot.com/o/favicon.png' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'img-src' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Message:
Refused to load the script 'https://code.jquery.com/jquery-3.2.1.slim.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Message:
Refused to load the script 'https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Message:
Refused to load the script 'https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Message:
Refused to load the script 'https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/
Message:
Refused to load the script 'https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
network error URL: https://bafkreiaafcvu4nbynbxxnwer2khihgre4htstnqu4lbldgvihphguocyq4.ipfs.w3s.link/images/favicons
Message:
Failed to load resource: the server responded with a status of 502 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.githubusercontent.com; form-action 'self' ; navigate-to 'self'; connect-src 'self' blob: data: