ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo
Submission: On November 14 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 26th 2022. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BT (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
10 | 178.79.243.140 178.79.243.140 | 22822 (LLNW) (LLNW) | |
1 | 138.199.37.226 138.199.37.226 | 60068 (CDN77 ^_^) (CDN77 ^_^) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 54.241.18.70 54.241.18.70 | 16509 (AMAZON-02) (AMAZON-02) | |
18 | 8 |
ASN22822 (LLNW, US)
PTR: https-178-79-243-140.fra.llnw.net
img01.bt.co.uk |
ASN60068 (CDN77 ^_^, GB)
PTR: unn-138-199-37-226.datapacket.com
ipfs.tech |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-241-18-70.us-west-1.compute.amazonaws.com
holdings756.4everland.store |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bt.co.uk
img01.bt.co.uk — Cisco Umbrella Rank: 91297 |
426 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 712 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2222 |
29 KB |
2 |
ipfs.io
1 redirects
ipfs.io — Cisco Umbrella Rank: 63114 |
6 KB |
1 |
4everland.store
holdings756.4everland.store |
20 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 304 |
84 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 201 |
7 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 669 |
24 KB |
1 |
ipfs.tech
ipfs.tech — Cisco Umbrella Rank: 949761 |
|
18 | 8 |
Domain | Requested by | |
---|---|---|
10 | img01.bt.co.uk |
ipfs.io
img01.bt.co.uk |
2 | ipfs.io | 1 redirects |
1 | holdings756.4everland.store |
ipfs.io
|
1 | stackpath.bootstrapcdn.com |
ipfs.io
|
1 | ajax.googleapis.com |
ipfs.io
|
1 | maxcdn.bootstrapcdn.com |
ipfs.io
|
1 | cdnjs.cloudflare.com |
ipfs.io
|
1 | code.jquery.com |
ipfs.io
|
1 | ipfs.tech |
ipfs.io
|
18 | 9 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bt.com |
my.bt.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2022-10-26 - 2023-01-24 |
3 months | crt.sh |
www.bt.com GeoTrust EV RSA CA 2018 |
2022-09-02 - 2023-09-20 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-10-25 - 2023-01-17 |
3 months | crt.sh |
*.4everland.store R3 |
2022-10-03 - 2023-01-01 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo
Frame ID: C014BAA45BB1CA8268978C094E9F572D
Requests: 17 HTTP requests in this frame
Frame:
https://holdings756.4everland.store/bt-top.PNG
Frame ID: C4A98CD8C92C55D41C410251A14A652E
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Email Login PagePage URL History Show full URLs
-
http://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo
HTTP 307
https://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Popper (Miscellaneous) Expand
Detected patterns
- <script [^>]*src="[^"]*/popper\.js/([0-9.]+)
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
8 Outgoing links
These are links going to different origins than the main page.
Title: https://www.bt.com/email
Search URL Search Domain Scan URL
Title: More information
Search URL Search Domain Scan URL
Title: your login details?
Search URL Search Domain Scan URL
Title: here
Search URL Search Domain Scan URL
Title: Learn more
Search URL Search Domain Scan URL
Title: Help >
Search URL Search Domain Scan URL
Title: Create new Email address >
Search URL Search Domain Scan URL
Title: Find out more
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo
HTTP 307
https://ipfs.io/ipns/k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://ipfs.io/s/assets/aauth/images/BT_logo.png HTTP 301
- https://ipfs.tech/s/assets/aauth/images/BT_logo.png
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
k51qzi5uqu5dlkgbfoanrxryyoazxskc24kmmleq9hxig8oe2335xzwrrs8jeo
ipfs.io/ipns/ Redirect Chain
|
15 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-login.css
img01.bt.co.uk/s/assets/020822/home/css/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
img01.bt.co.uk/s/assets/020822/home/css/ |
378 KB 80 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
responsive-menu.css
img01.bt.co.uk/s/assets/020822/css/ |
30 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dantenewgh.api-1.0.js
img01.bt.co.uk/s/assets/020822/js/ |
15 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ArcotAdapterIntegration.js
img01.bt.co.uk/s/assets/020822/aauth/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BT_logo.png
ipfs.tech/s/assets/aauth/images/ Redirect Chain
|
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 84 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bt-top.PNG
holdings756.4everland.store/ Frame C4A9 |
20 KB 20 KB |
Document
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BTFont_Rg.woff
img01.bt.co.uk/s/assets/020822/fonts/bt/ |
58 KB 58 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BTFont-Light.ttf
img01.bt.co.uk/s/assets/020822/home/fonts/bt/ |
78 KB 79 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BTFont-Bold.ttf
img01.bt.co.uk/s/assets/020822/home/fonts/bt/ |
78 KB 79 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BTFont-Regular.ttf
img01.bt.co.uk/s/assets/020822/home/fonts/bt/ |
78 KB 78 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BTTV-Bold.woff
img01.bt.co.uk/s/assets/020822/fonts/bt/ |
38 KB 38 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BT (Telecommunication)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| DanteNewGH object| HeaderEncoder undefined| portaluser object| navconfig function| hexDecode function| restorePlusSymbols function| ArcotExtractUserMsg function| hexEncode object| footerconfig function| $ function| jQuery function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
holdings756.4everland.store
img01.bt.co.uk
ipfs.io
ipfs.tech
maxcdn.bootstrapcdn.com
stackpath.bootstrapcdn.com
138.199.37.226
178.79.243.140
2001:4de0:ac18::1:a:3a
2602:fea2:2::1
2606:4700::6811:180e
2606:4700::6812:bcf
2a00:1450:4001:830::200a
54.241.18.70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