![](/screenshots/94000a3b-d312-476f-9167-53f039ede383.png)
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Effective URL: https://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/
Submission: On September 01 via api from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on August 26th 2023. Valid for: 3 months.
This is the only time bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 69.16.175.10 69.16.175.10 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
10 | 172.217.24.33 172.217.24.33 | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.21.93.58 104.21.93.58 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 152.199.39.242 152.199.39.242 | () () | |
15 | 6 |
ASN40680 (PROTOCOL, US)
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link |
ASN15169 (GOOGLE, US)
PTR: hkg07s23-in-f1.1e100.net
lh3.googleusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 62 |
242 KB |
1 |
msftauth.net
aadcdn.msftauth.net |
672 B |
1 |
jdjdmxnx.online
tnneblukgdl.jdjdmxnx.online |
74 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 733 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
14 KB |
1 |
dweb.link
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link |
36 KB |
15 | 6 |
Domain | Requested by | |
---|---|---|
10 | lh3.googleusercontent.com | |
1 | aadcdn.msftauth.net | |
1 | tnneblukgdl.jdjdmxnx.online |
code.jquery.com
|
1 | code.jquery.com |
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link
|
1 | cdnjs.cloudflare.com |
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link
|
1 | bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link | |
15 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-08-26 - 2023-11-24 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.googleusercontent.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
jdjdmxnx.online E1 |
2023-08-15 - 2023-11-13 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/
Frame ID: C06DD62211BBDF0217A421DD54A22B9C
Requests: 15 HTTP requests in this frame
Screenshot
![](/screenshots/94000a3b-d312-476f-9167-53f039ede383.png)
Page Title
Sign in to your accountPage URL History Show full URLs
-
http://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/
HTTP 307
https://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/ Page URL
Detected technologies
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/
HTTP 307
https://bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link/ Redirect Chain
|
60 KB 36 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
tnneblukgdl.jdjdmxnx.online/obufsssssssscaaatoion/ |
942 KB 74 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8C1y-LmqPwr79FSVd9YMV5yeje6h34dtqg8n1c7UYT__udX1hIixqqaItUS-Vtl4epJI-2Qtycgc0GgiWtrFAFZIVdjRD8HShOpZsK0Vucx0qiSJ9iKKAd1_ocqVqIgMtn1jlLj4HB4Ap_2ZUiwAnk=w108-h24-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CNmlIjdTtHgPdAMoSG4uyQnKbGT1407U5GJD9BBD5gOhyThvxN7ptqzSc9OV7GvMrNxsLjt_kin2qpj8tlLu4VPG_UA8XrdDZZYTEJRXHQkb_glHR4oYOoSP3tDH1rPkDWcGOdNw-zacvrmMF7NU0=s150-no
lh3.googleusercontent.com/pw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8DXuoTCchIiCUMSjRAC76eUjCoJ1Hj726Mdu1LszHJglP2MLf_RoCW0uZpRXU92HCp7sJJtRW1SSsaUhnE1muSBc8avCHEqEHuLdsuLbYPj0hMJ1kVq-hZ1eYf_w6QcxuCHVVBR-siBvHZM2G9Rlbw=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CLLNnGpj7_FWohqCPJSzzgHwWUwFqF-CN0acr9XqBJvbhlCprvfnAvLav0gAOr0ez63QMTk6WPV7V7rT_ZZ7E5ueysaU99HDwu7huiWEUvbNO3mDIklTKmUuxN9sPyZMwDPt-T39tp9ZO2Pq53dRI=s150-no
lh3.googleusercontent.com/pw/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 672 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8AK-lOypWQRHV6CblnIhwum5iMC-2fHJehOkF8BqfFCgB1DZT2LI30pbRIC605sfh4PyJS0qLFawTwXAyFCgEjDlPQe4GThYYbbx5CB-urZNnpa1Uhn-GrOGG5UcX6f5GsSPkypixgkdMoOBFlQqZ4=s150-no
lh3.googleusercontent.com/pw/ |
810 B 933 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8Cql-_FqT-vTMz5KecPfNkES17GUcAhZtgXLH0x4Wv9Lj4vnoCGPorATuuzvKe5c-hTrhXFnWh6cu4TC2cJjWKbnr2Fq-avQW5Q1oqvrNCP29CvGjXZZkxpkBgWTjA6DBjYlYpLr5-pfWHOb04OsBY=s150-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CPpl_w_5Fj80z5l9jlYET_SacByn_w9oXKdt92XWEATpkaTNMXRjd49krHesOb3FAHMXEQBD5153gSMnAZGOmXwR9Rp_K_-6jVQvTb4qi9QggArKoSZ61C-gpBRHxrTvoFunjzMPQhEspfqSTvD-o=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8BB5eL1vbp9dPEQCSEMJxM3Y9agty2fbo3XhD76Dz3OBAH0vp3VSA07-yrArrrYp5TuF80R6HzDKK65oJ8-tv7Px-SFgTOIBONfJYbApe2ilHyCEg9LRrwu52XsghVBZuQtpKdlw0j9iUdY8MqKhVU=s150-no
lh3.googleusercontent.com/pw/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8D8e5caxJov7GOp1rwDQidEks3V2UuXk1O7PZDbHZa5IL_i0KpG0ekmdhUvoDq55PguGPsZ-IFD0DpviH169WF09S-C8-tYQlW5MiYBzUesaWNDrAhwB3xLJo66GKNcYquCnPMjb1AN4oiTdyMOkvI=w1652-h929-no
lh3.googleusercontent.com/pw/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)171 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| CryptoJS string| encrypted string| key string| iv object| keyBytes object| ivBytes object| decrypted string| decryptedString object| s string| acTVemua function| _0x31eae7 function| _0x261e51 function| _0x23e3a4 function| _0x299b46 function| _0x248c98 function| _0x57f48e function| _0x3a23df function| _0xf1d821 function| _0x33f404 function| _0x4a1c09 function| _0x20636a function| _0x304d2a function| _0x525fe8 function| _0x2d1315 function| _0xacd556 function| _0x20fe11 function| _0x2a7c0c function| _0x46031 function| _0x5d5a06 function| _0x59bcd4 function| _0x1f31cb function| _0x3832fd function| _0x4b7fdd function| _0x1e9ea0 function| _0x22f8bc function| _0x3267e6 function| _0x18a16d function| _0x2760f0 function| _0x2f3a05 function| _0x5737ab function| _0x5f342a function| _0x331039 function| _0x834266 function| _0x271ff3 function| _0x14d900 function| _0x56df65 function| _0x189f2b function| _0x294f3c function| _0x393ae9 function| _0x5407f7 function| _0x5dfdf6 function| _0x430773 function| _0x37fad8 function| _0x9567b function| _0x441808 function| _0x3dee70 function| _0xee1ade function| _0x5a45bc function| _0x376e75 function| _0x55437c function| _0x33d048 function| _0x14b300 function| _0x1b35ee function| _0x23b7e2 function| _0x1054b0 function| _0x16b3e0 function| _0x311ed5 function| _0x1a48a3 function| _0x2a6c73 function| _0x3874f8 function| _0x387575 function| _0x144ae1 function| _0x34d267 function| _0x56b229 function| _0x4d9c3b function| _0x1904d6 function| _0x4b825f function| _0x4431e8 function| _0x5df640 function| _0x10b6eb function| _0x31733e function| _0x3a9054 function| _0x2bc109 function| _0x98e88d function| _0x45a18 function| _0x1858f2 function| _0x4246fb function| _0x3241fd function| _0x4b6db0 function| _0x2f91bb function| _0x19b373 function| _0x1fe2a4 function| _0x663364 function| _0x3c8a21 function| _0x1b8cae function| _0x4096ce function| _0x3fac2d function| _0x3eca66 function| _0x3a62a0 function| _0x3db115 function| _0x51586d function| _0x43721b function| _0x713279 function| _0xcfa4a3 function| _0x542c34 function| _0xd853b5 function| _0x376983 function| _0x3cf746 function| _0x206ffc function| _0x455d66 function| _0x159a16 function| _0x1599d1 function| _0x68dc92 function| _0x10a016 function| _0xeb24f function| _0x55dec9 function| _0x22fa3c function| _0x406d3c function| _0x4a1680 function| _0x24ecb1 function| _0x1dd296 function| _0x350db7 function| _0x4643fc function| _0x4e01c9 function| _0x11da00 function| _0x20d650 function| _0x5c0737 function| _0x7fe671 function| _0x14e72f function| _0x2161eb function| _0xf2b94c function| _0x211610 function| _0x3d2c42 function| _0x2602ff function| _0x46a575 function| _0x4f782f function| _0x5c874c function| _0x57622e function| _0x5a8316 function| _0x4c1d0f function| _0x275139 function| _0x46f9d2 function| _0x4ee1a7 function| _0x2209e4 function| _0x345f00 function| _0x23d2c2 function| _0x413d91 function| _0x255a5f function| _0x85f135 function| _0x5d5131 function| _0x395d3b function| _0xd0e32c function| _0x1c22eb function| _0x1891d6 function| _0x15eb7f function| _0xc5ba object| _0x1018 string| IGOBZL string| cbbg function| _0xc091 string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery string| kakakaafinal string| getjsonnn number| counterror number| dalizk0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
bafkreia7hftqnexp6zqgkw4e5jtxii2lwlqyh2ksg4e4ykwpk3obmmb43q.ipfs.dweb.link
cdnjs.cloudflare.com
code.jquery.com
lh3.googleusercontent.com
tnneblukgdl.jdjdmxnx.online
104.17.25.14
104.21.93.58
152.199.39.242
172.217.24.33
209.94.90.1
69.16.175.10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