ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafybeigcgswok2odduwavw2udmlgjjr3wd3qpemakpzmeowb76rc36gbya/barrymartz9_cham-e4.html
Submission: On June 11 via manual from IL — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 27th 2023. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 100.20.192.3 100.20.192.3 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 69.49.244.31 69.49.244.31 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 192.229.133.221 192.229.133.221 | 15133 (EDGECAST) (EDGECAST) | |
1 | 169.62.254.82 169.62.254.82 | 36351 (SOFTLAYER) (SOFTLAYER) | |
1 | 2620:1ec:46::45 2620:1ec:46::45 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
6 | 7 |
ASN16509 (AMAZON-02, US)
PTR: ec2-100-20-192-3.us-west-2.compute.amazonaws.com
tracking.vocus.io |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 69-49-244-31.webhostbox.net
nychoodies.com |
ASN36351 (SOFTLAYER, US)
PTR: 52.fe.3ea9.ip4.static.sl-reverse.com
huunus22.us-south.cf.appdomain.cloud |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 1404 |
2 KB |
1 |
appdomain.cloud
huunus22.us-south.cf.appdomain.cloud |
2 KB |
1 |
w3schools.com
www.w3schools.com — Cisco Umbrella Rank: 17582 |
5 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 263 |
6 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 44817 |
403 KB |
1 |
nychoodies.com
nychoodies.com |
327 B |
1 |
vocus.io
1 redirects
tracking.vocus.io |
602 B |
6 | 7 |
Domain | Requested by | |
---|---|---|
1 | aadcdn.msauth.net | |
1 | huunus22.us-south.cf.appdomain.cloud |
ipfs.io
|
1 | www.w3schools.com |
ipfs.io
|
1 | cdnjs.cloudflare.com |
ipfs.io
|
1 | ipfs.io | |
1 | nychoodies.com | |
1 | tracking.vocus.io | 1 redirects |
6 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpanel.nychoodies.com R3 |
2023-05-27 - 2023-08-25 |
3 months | crt.sh |
*.i.ipfs.io R3 |
2023-03-27 - 2023-06-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
*.w3schools.com DigiCert TLS RSA SHA256 2020 CA1 |
2023-03-05 - 2024-04-04 |
a year | crt.sh |
*.us-south.cf.appdomain.cloud DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-04-21 - 2024-04-19 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2023-04-28 - 2024-04-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafybeigcgswok2odduwavw2udmlgjjr3wd3qpemakpzmeowb76rc36gbya/barrymartz9_cham-e4.html
Frame ID: 5F016EFA3ADA9E77E33864834F727890
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
PORTAL - MICROSOFT Mail AuthenticationDetected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://tracking.vocus.io/mlink?id=72022f39-8df6-83-bbbd-b8d15f1805df&url=https://nychoodies.com%2fAuth%2fnew%2f7atez81vtl56niugq5g3js4xdzefw1q2lbk7o6fz%2f%2f%2fYW5hdGVAcmFkd2FyZS5jb20= HTTP 302
- https://nychoodies.com/Auth/new/7atez81vtl56niugq5g3js4xdzefw1q2lbk7o6fz///YW5hdGVAcmFkd2FyZS5jb20=
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
YW5hdGVAcmFkd2FyZS5jb20=
nychoodies.com/Auth/new/7atez81vtl56niugq5g3js4xdzefw1q2lbk7o6fz/// Redirect Chain
|
0 327 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
barrymartz9_cham-e4.html
ipfs.io/ipfs/bafybeigcgswok2odduwavw2udmlgjjr3wd3qpemakpzmeowb76rc36gbya/ |
1 MB 403 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
w3.css
www.w3schools.com/w3css/4/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
huunus22.us-south.cf.appdomain.cloud/ |
1 KB 2 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
220 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend object| _0x8a4a function| waitForElm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
cdnjs.cloudflare.com
huunus22.us-south.cf.appdomain.cloud
ipfs.io
nychoodies.com
tracking.vocus.io
www.w3schools.com
100.20.192.3
169.62.254.82
192.229.133.221
2602:fea2:2::1
2606:4700::6811:190e
2620:1ec:46::45
69.49.244.31
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
10893413f26162d73529c583e29ed8a79bbe1921be22ffa2decc81d29afeafc4
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
c4f2aba13970ecf8303fb9329f97c8824861569273b0aa27acce48abc61d04f5
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ef0184e71d81a4ff202ff225a2e340d67ede3d7856d52762c403b9e300a13c0c
f388ef4e737ce78851cc77b5b64b83f51db50c513735ad9c46749f2dd304105b