fleek.ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/
Submission: On April 10 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on February 6th 2024. Valid for: 3 months.
This is the only time fleek.ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a02:4780:dea... 2a02:4780:dead:f041::1 | 204915 (AWEX) (AWEX) | |
1 3 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
3 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 27.221.16.176 27.221.16.176 | 4837 (CHINA169-...) (CHINA169-BACKBONE CHINA UNICOM China169 Backbone) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:81e::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 172.67.153.31 172.67.153.31 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 37.19.207.34 37.19.207.34 | 60068 (CDN77 _) (CDN77 _) | |
14 | 10 |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
ASN4837 (CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN)
lib.sinaapp.com |
ASN60068 (CDN77 _, GB)
PTR: 37-19-207-34.bunnyinfra.net
ipfs.tech |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1847 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 4322 |
53 KB |
3 |
ipfs.io
1 redirects
fleek.ipfs.io |
114 KB |
2 |
screendot.io
screendot.io |
472 B |
1 |
ipfs.tech
ipfs.tech — Cisco Umbrella Rank: 171913 |
5 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 746 |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 381 |
7 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1217 |
24 KB |
1 |
sinaapp.com
lib.sinaapp.com — Cisco Umbrella Rank: 212427 |
29 KB |
1 |
000webhostapp.com
sputtering-tower.000webhostapp.com |
3 KB |
0 |
000webhost.com
Failed
www.000webhost.com Failed |
|
14 | 10 |
Domain | Requested by | |
---|---|---|
3 | fleek.ipfs.io |
1 redirects
sputtering-tower.000webhostapp.com
fleek.ipfs.io |
2 | screendot.io |
fleek.ipfs.io
|
2 | maxcdn.bootstrapcdn.com |
fleek.ipfs.io
|
1 | ipfs.tech | |
1 | stackpath.bootstrapcdn.com |
fleek.ipfs.io
|
1 | ajax.googleapis.com |
fleek.ipfs.io
|
1 | cdnjs.cloudflare.com |
fleek.ipfs.io
|
1 | code.jquery.com |
fleek.ipfs.io
|
1 | lib.sinaapp.com |
fleek.ipfs.io
|
1 | sputtering-tower.000webhostapp.com | |
0 | www.000webhost.com Failed |
sputtering-tower.000webhostapp.com
|
14 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.000webhostapp.com RapidSSL TLS RSA CA G1 |
2023-07-11 - 2024-08-10 |
a year | crt.sh |
dweb.link R3 |
2024-02-06 - 2024-05-06 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
*.sinaapp.com GeoTrust CN RSA CA G1 |
2023-11-10 - 2024-12-10 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-03-04 - 2024-05-27 |
3 months | crt.sh |
screendot.io GTS CA 1P5 |
2024-04-06 - 2024-07-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/
Frame ID: A8160315053C44940F9A4AC46744E626
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Mail : Sign In SessionPage URL History Show full URLs
-
http://sputtering-tower.000webhostapp.com/
HTTP 307
https://sputtering-tower.000webhostapp.com/ Page URL
- https://fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://sputtering-tower.000webhostapp.com/
HTTP 307
https://sputtering-tower.000webhostapp.com/ Page URL
- https://fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://sputtering-tower.000webhostapp.com/ HTTP 307
- https://sputtering-tower.000webhostapp.com/
- https://fleek.ipfs.io/favicon.ico HTTP 301
- https://ipfs.tech/favicon.ico
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
sputtering-tower.000webhostapp.com/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
powered-by-000webhost.png
www.000webhost.com/static/default.000webhost.com/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/ |
253 KB 114 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.3.1/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.0.3.min.js
lib.sinaapp.com/js/jquery/2.0.3/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.v2.js
fleek.ipfs.io/ipfs/QmaMny57tTV2Cha3hL8RraUEYPQWBNoJ9782ptTT4sfzdt/ |
0 0 |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
555 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
standard
screendot.io/api/ |
40 B 472 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
standard
screendot.io/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
ipfs.tech/ Redirect Chain
|
15 KB 5 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.000webhost.com
- URL
- https://www.000webhost.com/static/default.000webhost.com/images/powered-by-000webhost.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap function| _0x171a5d function| _0x197b56 function| _0x5ccd87 function| _0x4c153e function| _0x25abd8 function| _0x2024de string| tgc object| _0x5d40c8 function| _0x4d60 object| _0x1b36cf function| _0x1f3e4e string| dri function| _0xfdce9b function| _0x1538aa function| _0x1d69a5 function| _0x4291 function| _0x320a250 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
fleek.ipfs.io
ipfs.tech
lib.sinaapp.com
maxcdn.bootstrapcdn.com
screendot.io
sputtering-tower.000webhostapp.com
stackpath.bootstrapcdn.com
www.000webhost.com
www.000webhost.com
104.17.25.14
104.18.11.207
172.67.153.31
2602:fea2:2::1
2607:f8b0:4006:81e::200a
27.221.16.176
2a02:4780:dead:f041::1
2a04:4e42:600::649
37.19.207.34
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
26530b577283e610ea949a19c3d64a5b7ed04293cb0c8238a93bcc8c79f572a3
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
60b19e5da6a9234ff9220668a5ec1125c157a268513256188ee80f2d2c8d8d36
6a6beae164a3397dd506f59af5261bb7662b9344a3225c0f4d7f857f54f4db13
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
93f553f07040ccaa21c9fa7c4ec02e97aff4999acee2bd4bdf9860100a1ea08a
94a9fefbbe42310c03ff1e52c1f753c21038805f632867ea78930a52c445a456
a361c3731b9ad8bb6b7ea6b122d2edb921735ca1b07a4be7b9a159f599de4ede
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
aba082654ed9a884ee14954d8a4085aff721d03989fcc16934f4d03cf6a55229
b13cb5989e08fcb02314209d101e1102f3d299109bdc253b62aa1da21c9e38ba
dfefec49df5a567bd6c7997d0603b10fcd709e74acb9f0028c3c83f1ee488c5d
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b