cloudflare-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Effective URL: https://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy
Submission: On February 09 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on December 28th 2023. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 7 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 162.0.229.87 162.0.229.87 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 2620:1ec:29:1... 2620:1ec:29:1::40 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
8 | 4 |
ASN22612 (NAMECHEAP-NET, US)
PTR: business71-2.web-hosting.com
makintouch.cam |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
cloudflare-ipfs.com
2 redirects
cloudflare-ipfs.com |
121 KB |
2 |
makintouch.cam
makintouch.cam |
35 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 3799 |
928 B |
8 | 3 |
Domain | Requested by | |
---|---|---|
7 | cloudflare-ipfs.com |
2 redirects
cloudflare-ipfs.com
|
2 | makintouch.cam |
cloudflare-ipfs.com
|
1 | logincdn.msauth.net |
cloudflare-ipfs.com
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cloudflare-ipfs.com E1 |
2023-12-28 - 2024-03-27 |
3 months | crt.sh |
makintouch.cam Sectigo RSA Domain Validation Secure Server CA |
2023-11-02 - 2024-11-02 |
a year | crt.sh |
identitycdn.msauth.net Microsoft Azure RSA TLS Issuing CA 03 |
2024-01-17 - 2025-01-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy
Frame ID: A7C20B5D286D8E32CFA0452047772EB2
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
My Files - OneDrivePage URL History Show full URLs
- http://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy Page URL
-
http://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=6AJWYmXHIRg0_JJa47il0H4mHbdwspMTIeCowiklMko-170747...
HTTP 301
http://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy Page URL
-
http://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=6AJWYmXHIRg0_JJa47il0H4mHbdwspMTIeCowiklMko-1707479895-0-%2Fipfs%2Fbafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy
HTTP 301
http://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy
cloudflare-ipfs.com/ipfs/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-exclamation.png
cloudflare-ipfs.com/cdn-cgi/images/ |
452 B 889 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy
cloudflare-ipfs.com/ipfs/ Redirect Chain
|
234 KB 112 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
w3.css
makintouch.cam/drive/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cloudflare-ipfs.com/cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/ |
0 0 |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
logincdn.msauth.net/shared/1.0/content/images/ |
513 B 928 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
makintouch.cam/drive/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
40 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Generic Cloudflare (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x4acd function| _0x4f45 string| email_var object| bodyDIV function| ValidateEmail function| redirrectPage number| counter function| backArrow function| onChangeFunction function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_mw_byp Value: 6AJWYmXHIRg0_JJa47il0H4mHbdwspMTIeCowiklMko-1707479895-0-/ipfs/bafkreidym64exwgkanxcolljqozb26bb2h5przierb3bvrhmviockg7sjy |
|
cloudflare-ipfs.com/ | Name: __cf_bm Value: 3QcqsNXkR_AfuN3DjoVKxfGZ4VFYqgy7Rqr.mNfbeTQ-1707479900-1-AaGNou9xFlMPVHGCe+7DysLKf1VzuAafKuD9ug8Z16rEtDxPXgKzEQSSENPGjOdKXxTC9/gm31c6RrnbbhaAFl4= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cloudflare-ipfs.com
logincdn.msauth.net
makintouch.cam
162.0.229.87
2606:4700::6811:400e
2620:1ec:29:1::40
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
3c980cd344c939662b52e4fa1c4e5a5f987d4323205a264212a32bf161e07597
5d06241f1eebbe8cf9c32e2fd9fcede046757997ae44d122ea6756474d3af05a
72824f3fe09c1e718f8ef2726b7ac44591443f2e6d6c68cc2faf2a2a042dd933
7867b84bd8ca036e272d6983b21d7821d1faf8e50488761ac4ecaa1c251bf24e
910799ca3f14106d049f818aaa24d5cf84ae915ddb43d5a34dd2920894546d8e
b6801179664e6f0c5a76912cc463466cb9a3539168b2b0b71de26fd307af7384
c387092aa56fb5837772d45151eb6aead41d77472959d8c14dc2df043d50e3c3
c4f2aba13970ecf8303fb9329f97c8824861569273b0aa27acce48abc61d04f5
ef311be88b3652833cf1693ab7ee24fbf379afa678af8b7a15f7a539d8dfe571
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e