ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm
Submission: On February 21 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 6th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 141.193.213.10 141.193.213.10 | 209242 (CLOUDFLAR...) (CLOUDFLARESPECTRUM Cloudflare) | |
2 | 3 |
ASN209242 (CLOUDFLARESPECTRUM Cloudflare, Inc., US)
blog.thunderbird.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
thunderbird.net
blog.thunderbird.net |
3 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 68707 |
93 KB |
2 | 2 |
Domain | Requested by | |
---|---|---|
1 | blog.thunderbird.net |
ipfs.io
|
1 | ipfs.io | |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2024-02-06 - 2024-05-06 |
3 months | crt.sh |
thunderbird.net GTS CA 1P5 |
2024-01-16 - 2024-04-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm
Frame ID: 87AD83A493405FD9A7AC53307E512990
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
WeTransferPage URL History Show full URLs
-
http://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm
HTTP 307
https://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm
HTTP 307
https://ipfs.io/ipfs/bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bafybeidackz3xw2q4iqtmyv6hobywpxup3roy7guypp5sowu57a5ixi3xm
ipfs.io/ipfs/ Redirect Chain
|
547 KB 93 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
391 KB 0 |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wetransfer-workmark-website.png
blog.thunderbird.net/files/2019/05/ |
2 KB 3 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| init function| writeText function| unhideBody function| validateForm object| _0x58eb function| _0x598b function| _0x1905d4 function| _0x202c97 function| _0x180425 string| hash function| suc function| _0x50f6bd1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.blog.thunderbird.net/ | Name: __cf_bm Value: RyP7gIU6F72ZYpOI_uFv.sBuQGa2MhAtxNMalRfhJrg-1708520584-1.0-AcWMI33tzV50h03cXJ7FNB9l+zS3PQMh+Ux6UcqfQMG/bca+1KCgV4Kq8+ipfhXVkZjsNyrOufPxTgfWY83C/cU= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blog.thunderbird.net
ipfs.io
141.193.213.10
2602:fea2:2::1
7ffe32277afc717076324e7b1f7178dc3a07901cf54f8851f57fb1cef0441ec8
be83f2b174eac6dcb8ea03a75ae5926bab27c8653d0fdd7368c151b9c6bd249c
cd2a081f45571ad28411acc42d1a29ab1cfb487bfeb9e70dfc8647e8a3f6a161