bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link Open in urlscan Pro
2606:4700:4400::6812:29a9  Malicious Activity! Public Scan

URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Submission: On July 02 via automatic, source phishtank — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 7 domains to perform 9 HTTP transactions. The main IP is 2606:4700:4400::6812:29a9, located in United States and belongs to CLOUDFLARENET, US. The main domain is bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link.
TLS certificate: Issued by E1 on May 16th 2024. Valid for: 3 months.
This is the only time bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online) Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:440... 13335 (CLOUDFLAR...)
9 2
Domain Requested by
1 bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link Failed
0 ajax.googleapis.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 maxcdn.bootstrapcdn.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 cdnjs.cloudflare.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 i.imgur.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 code.jquery.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
0 stackpath.bootstrapcdn.com Failed bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link
9 8

This site contains no links.

Subject Issuer Validity Valid
w3s.link
E1
2024-05-16 -
2024-08-14
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Frame ID: 47EC848B09A549571961E5E6FB0880FC
Requests: 11 HTTP requests in this frame

Screenshot

Page Title

Sign In

Page Statistics

9
Requests

11 %
HTTPS

100 %
IPv6

7
Domains

8
Subdomains

2
IPs

1
Countries

80 kB
Transfer

357 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 9
  • https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/favicon.ico HTTP 307
  • https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link/favicon.ico

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request ogp.html
bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/
294 KB
80 KB
Document
General
Full URL
https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::6812:29a9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
76a27bafb758203cb7a5f3291dadf950c0403495b47e714b9a5cddd5b9ed64a2
Security Headers
Name Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
sec-ch-ua-mobile
?0
sec-ch-ua-platform
"Win32"

Response headers

access-control-allow-methods
GET, HEAD
access-control-allow-origin
*
access-control-expose-headers
Link
age
62608
cache-control
public, max-age=29030400
cf-cache-status
HIT
cf-ray
89d0bbc1afaf2c46-FRA
content-encoding
gzip
content-security-policy
default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage
content-type
text/html
date
Tue, 02 Jul 2024 18:35:03 GMT
etag
W/"bafkreidwuj527n2yea6lpjptfeo236kqybadjfnupzyuxgs43xk3t3leui"
expires
Tue, 03 Jun 2025 18:35:03 GMT
reporting-endpoints
csp-endpoint="https://csp-report-to.web3.storage"
server
cloudflare
server-timing
request;dur=170
vary
Accept-Encoding
x-dotstorage-resolution-id
cache-zone
x-dotstorage-resolution-layer
cdn
x-freeway-version
2.19.0
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/
0
0

jquery-3.2.1.slim.min.js
code.jquery.com/
0
0

ABtJ2Uv.jpg
i.imgur.com/
0
0

truncated
/
16 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2d1c6efc7ba8d7b7a3bd04a9e11a7761c112e4bbc23f74937749067acea91d70

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
48 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b017df1defe56bb74395e69cf291beea481d7f97cdbe2cd50e9ea9f86f5570ca

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/
0
0

bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/
0
0

jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
0
0

bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/
0
0

favicon.ico
bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link/
Redirect Chain
  • https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/favicon.ico
  • https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link/favicon.ico
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
stackpath.bootstrapcdn.com
URL
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css
Domain
code.jquery.com
URL
https://code.jquery.com/jquery-3.2.1.slim.min.js
Domain
i.imgur.com
URL
https://i.imgur.com/ABtJ2Uv.jpg
Domain
cdnjs.cloudflare.com
URL
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Domain
maxcdn.bootstrapcdn.com
URL
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Domain
ajax.googleapis.com
URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Domain
stackpath.bootstrapcdn.com
URL
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
Domain
bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link
URL
https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.dweb.link/favicon.ico

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online) Microsoft (Consumer)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 undefined| event object| fence object| sharedStorage

1 Cookies

Domain/Path Name / Value
.w3s.link/ Name: __cf_bm
Value: kBKc8sJQP__JHzBdpbOLaIpyIYx1KMJkhD_JcCXNA18-1719945303-1.0.1.1-nALTIKoynpsECN1FA9Mwza9IYIM1Hcpf8b3GPnBbXqzxWuaTOJvNtPHT8zk6uuCUlzlhc1H7y4V2g5k1053V4Q

17 Console Messages

Source Level URL
Text
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the stylesheet 'https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'style-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can escape its sandboxing.
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.2.1.slim.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the script 'https://code.jquery.com/jquery-3.2.1.slim.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Mixed Content: The page at 'https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html' was loaded over HTTPS, but requested an insecure element 'http://i.imgur.com/ABtJ2Uv.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.2.1.slim.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
security warning URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Mixed Content: The page at 'https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html' was loaded over HTTPS, but requested an insecure element 'http://i.imgur.com/ABtJ2Uv.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the image 'https://i.imgur.com/ABtJ2Uv.jpg' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'img-src' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the script 'https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the script 'https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the script 'https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
security error URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
Refused to load the script 'https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js' because it violates the following Content Security Policy directive: "default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network". Note that 'script-src-elem' was not explicitly set, so 'default-src' is used as a fallback.
recommendation verbose URL: https://bafybeifxh4daw2vcz2ba3dhxg4ixm6nwa4pcxzwmmulaghgyhmalglesgy.ipfs.w3s.link/ogp.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage