ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Private Scan
Effective URL: https://ipfs.io/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m
Submission: On June 04 via api from DE — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on April 16th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 104.17.96.13 104.17.96.13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 4 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700:440... 2606:4700:4400::6812:2844 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:812::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 172.67.139.119 172.67.139.119 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a02:cb40:300... 2a02:cb40:300::d7 | 20546 (SOPRADO-ANY) (SOPRADO-ANY) | |
1 1 | 142.250.186.164 142.250.186.164 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:82b::2004 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2400:52e0:1e0... 2400:52e0:1e00::1080:1 | 200325 (BUNNYCDN) (BUNNYCDN) | |
15 | 9 |
ASN15169 (GOOGLE, US)
PTR: fra24s08-in-f4.1e100.net
www.google.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 3389 ka-f.fontawesome.com — Cisco Umbrella Rank: 6720 |
100 KB |
4 |
ipfs.io
1 redirects
ipfs.io — Cisco Umbrella Rank: 80193 |
4 KB |
3 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 4041 |
63 KB |
1 |
ipfs.tech
ipfs.tech — Cisco Umbrella Rank: 168693 |
5 KB |
1 |
gstatic.com
t0.gstatic.com |
727 B |
1 |
google.com
1 redirects
www.google.com — Cisco Umbrella Rank: 7 |
18 B |
1 |
helaba.com
www.helaba.com — Cisco Umbrella Rank: 866550 |
|
1 |
googleapis.com
fonts.googleapis.com Failed ajax.googleapis.com — Cisco Umbrella Rank: 613 |
30 KB |
1 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
401 B |
15 | 9 |
Domain | Requested by | |
---|---|---|
4 | ipfs.io |
1 redirects
ipfs.io
|
3 | ka-f.fontawesome.com |
kit.fontawesome.com
ipfs.io |
3 | stackpath.bootstrapcdn.com |
ipfs.io
|
1 | ipfs.tech | |
1 | t0.gstatic.com |
ipfs.io
|
1 | www.google.com | 1 redirects |
1 | www.helaba.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
ipfs.io
|
1 | kit.fontawesome.com |
ipfs.io
|
1 | cloudflare-ipfs.com | 1 redirects |
0 | fonts.googleapis.com Failed |
ipfs.io
|
15 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.io GTS CA 1P5 |
2024-04-16 - 2024-07-15 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-12-04 - 2025-01-03 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-05-13 - 2024-08-05 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-05-25 - 2024-08-23 |
3 months | crt.sh |
ka-f.fontawesome.com GTS CA 1P5 |
2024-05-03 - 2024-08-01 |
3 months | crt.sh |
helaba.com RapidSSL TLS RSA CA G1 |
2024-03-25 - 2025-03-24 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://ipfs.io/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m
Frame ID: 304A797A590C24D0B6100D3DD97D7ACD
Requests: 14 HTTP requests in this frame
Frame:
https://www.helaba.com/
Frame ID: 46E196D87D5906B15DD4B70CE71FA893
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Webmail Portal LoginPage URL History Show full URLs
-
https://cloudflare-ipfs.com/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m
HTTP 302
https://ipfs.io/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cloudflare-ipfs.com/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m
HTTP 302
https://ipfs.io/ipfs/bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 12- https://www.google.com/s2/favicons?domain=helaba.com HTTP 301
- https://t0.gstatic.com/faviconV2?client=SOCIAL&type=FAVICON&fallback_opts=TYPE,SIZE,URL&url=http://helaba.com&size=16
- https://ipfs.io/favicon.ico HTTP 301
- https://ipfs.tech/favicon.ico
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
bafkreiba5et2vfzwdmt47ljdj6wtzd543scnpxvspsrdn3u6y7xbtwpa3m
ipfs.io/ipfs/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery-1.js
ipfs.io/ipfs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
ipfs.io/ipfs/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
12 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
59 KB 13 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
26 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-fa-solid-900.woff2
ka-f.fontawesome.com/releases/v5.15.4/webfonts/ |
76 KB 77 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.helaba.com/ Frame 46E1 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faviconV2
t0.gstatic.com/ Redirect Chain
|
163 B 727 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
ipfs.tech/ Redirect Chain
|
15 KB 5 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- https://fonts.googleapis.com/css?family=Yellowtail%26display=swap
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| FontAwesomeKitConfig function| $ function| jQuery object| bootstrap1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: rnAl5IBYe.on4bgAQpuIRhhkDGKwy_cZEvmtPZIw8B8-1717477197-1.0.1.1-pDE0_yHlAlnihi876AqQWzY82dConyK5mHlYcx_Uw5ozzKBLAGL7oTYt7FFja4wdoLs50dZ_Z.zzl7b9TSVFWQ |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cloudflare-ipfs.com
fonts.googleapis.com
ipfs.io
ipfs.tech
ka-f.fontawesome.com
kit.fontawesome.com
stackpath.bootstrapcdn.com
t0.gstatic.com
www.google.com
www.helaba.com
fonts.googleapis.com
104.17.96.13
104.18.10.207
142.250.186.164
172.67.139.119
209.94.90.1
2400:52e0:1e00::1080:1
2606:4700:4400::6812:2844
2a00:1450:4001:812::200a
2a00:1450:4001:82b::2004
2a02:cb40:300::d7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