Submitted URL: http://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Effective URL: https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Submission: On July 02 via automatic, source openphish — Scanned from DE

Summary

This website contacted 4 IPs in 1 countries across 6 domains to perform 6 HTTP transactions. The main IP is 209.94.90.1, located in United States and belongs to PROTOCOL, US. The main domain is ipfs.io. The Cisco Umbrella rank of the primary domain is 87085.
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 209.94.90.1 40680 (PROTOCOL)
1 2a04:4e42::649 54113 (FASTLY)
1 2600:9000:235... 16509 (AMAZON-02)
6 4
Apex Domain
Subdomains
Transfer
1 imagekit.io
ik.imagekit.io — Cisco Umbrella Rank: 24398
55 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 816
29 KB
1 ipfs.io
ipfs.io — Cisco Umbrella Rank: 87085
57 KB
0 alphatrade-options.com Failed
alphatrade-options.com Failed
0 Failed
function sub() { [native code] }. Failed
0 fortinet.com Failed
fac.corp.fortinet.com Failed
6 6
Domain Requested by
1 ik.imagekit.io ipfs.io
1 code.jquery.com ipfs.io
1 ipfs.io
0 alphatrade-options.com Failed
0 www.yxnkyxnkqgdtywlslmnvbq== Failed ipfs.io
0 fac.corp.fortinet.com Failed ipfs.io
6 6

This site contains no links.

Subject Issuer Validity Valid
ipfs.io
WE1
2024-06-14 -
2024-09-12
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.imagekit.io
Amazon RSA 2048 M02
2024-01-23 -
2025-02-19
a year crt.sh

This page contains 2 frames:

Primary Page: https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Frame ID: B84C8CFDABE97A206E6974D9D1E06356
Requests: 5 HTTP requests in this frame

Frame: https://www.yxnkyxnkqgdtywlslmnvbq==/
Frame ID: 54BBBA100C17A2CB98A1F5C5FDC887A2
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Webmail

Page URL History Show full URLs

  1. http://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY HTTP 307
    https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • (?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

50 %
HTTPS

67 %
IPv6

6
Domains

6
Subdomains

4
IPs

1
Countries

141 kB
Transfer

295 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY HTTP 307
    https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
ipfs.io/ipfs/
Redirect Chain
  • http://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
  • https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
157 KB
57 KB
Document
General
Full URL
https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
209.94.90.1 , United States, ASN40680 (PROTOCOL, US),
Reverse DNS
Software
cloudflare /
Resource Hash
001a75874bbe506f0e821a093314551f9e249147a6d280f45742898d6be61dd1

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET HEAD OPTIONS
access-control-allow-origin
*
access-control-expose-headers
Content-Length Content-Range X-Chunked-Output X-Ipfs-Path X-Ipfs-Roots X-Stream-Output
age
43855
alt-svc
h3=":443"; ma=86400
cache-control
public, max-age=29030400, immutable
cf-cache-status
HIT
cf-ray
89cefb67ce011968-FRA
content-encoding
br
content-type
text/html
date
Tue, 02 Jul 2024 13:28:58 GMT
server
cloudflare
vary
Accept-Encoding
x-ipfs-path
/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
x-ipfs-pop
rainbow-fr2-03
x-ipfs-roots
Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY

Redirect headers

Cross-Origin-Resource-Policy
Cross-Origin
Location
https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Non-Authoritative-Reason
HSTS
jquery-2.2.4.min.js
code.jquery.com/
84 KB
29 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://ipfs.io/
Origin
https://ipfs.io
Accept-Language
de-DE,de;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Tue, 02 Jul 2024 13:28:58 GMT
content-encoding
gzip
via
1.1 varnish, 1.1 varnish
age
5783094
x-cache
MISS, HIT
content-length
29811
x-served-by
cache-lga21935-LGA, cache-fra-eddf8230107-FRA
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
server
nginx
x-timer
S1719926939.911965,VS0,VE0
etag
W/"28feccc0-14e4a"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=604800
accept-ranges
bytes
x-cache-hits
0, 186355
Rolling-1s-200px__1__trHCWXy9jD.gif
ik.imagekit.io/escrowmade/
54 KB
55 KB
Image
General
Full URL
https://ik.imagekit.io/escrowmade/Rolling-1s-200px__1__trHCWXy9jD.gif
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2359:b200:15:c281:3500:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
669c17cde38dd0ab9673de77a674c5b192e934399bbee3ebed65bd70b05bff5f

Request headers

sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
Referer
https://ipfs.io/
Accept-Language
de-DE,de;q=0.9;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Thu, 01 Feb 2024 00:34:10 GMT
via
1.1 61c90c70feca5f532bf48bc0dc85d516.cloudfront.net (CloudFront), 1.1 343f10c14a24beceec4fd2e9df6f9a50.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P10
age
13179288
x-cache
Hit from cloudfront
alt-svc
h3=":443"; ma=86400
content-length
55202
x-request-id
b5219f3c-5455-4706-92bc-1607d368c509
last-modified
Sun, 31 Dec 2023 19:31:51 GMT
etag
"d536d58ea2f4cfe5d5b734e7893fb09e"
vary
Accept
access-control-allow-methods
GET
content-type
image/gif
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=31536000, must-revalidate
x-server
ImageKit.io
timing-allow-origin
*
access-control-allow-headers
*
x-amz-cf-id
IE5mHuMU4-_pwCg77mNs6t6f9RalY37BZax6YJlRZpt9e53qAs2evA==
/
fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
0
0

/
www.yxnkyxnkqgdtywlslmnvbq==/ Frame 54BB
0
0

favicon.png
alphatrade-options.com/git/rand/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fac.corp.fortinet.com
URL
https://fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
Domain
www.yxnkyxnkqgdtywlslmnvbq==
URL
https://www.yxnkyxnkqgdtywlslmnvbq==/
Domain
alphatrade-options.com
URL
https://alphatrade-options.com/git/rand/favicon.png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 undefined| event object| fence object| sharedStorage function| $ function| jQuery function| ceuirna45_0x1e91 function| caps function| ceuirna45_0x23d630 function| ceuirna45_0x301a function| ceuirna45_0x484a42 function| ceuirna45_0x23b7e4 function| ceuirna45_0x5ab387 function| ceuirna45_0x3b7bf2 function| _0x4f7e73

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://ipfs.io/ipfs/Qmcoi241db9j771jPoZeScoQvCwbwqofz6cuT4zLzg1xaY
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o