bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link/
Submission: On July 29 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 201.224.58.176 201.224.58.176 | 11556 (Cable & W...) (Cable & Wireless Panama) | |
1 2 | 162.241.124.47 162.241.124.47 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
10 | 2a00:1450:400... 2a00:1450:4001:827::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
16 | 7 |
ASN11556 (Cable & Wireless Panama, PA)
PTR: multiservicios.cwpanama.com
bclientes.cwpanama.com |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 162-241-124-47.webhostbox.net
mortgagefamily.sautescff.com |
ASN40680 (PROTOCOL, US)
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link |
ASN15169 (GOOGLE, US)
lh3.googleusercontent.com |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 107 |
242 KB |
2 |
sautescff.com
1 redirects
mortgagefamily.sautescff.com |
718 B |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1066 |
753 B |
1 |
kgkagkgaga.ws
kgkagkgaga.ws — Cisco Umbrella Rank: 908817 |
77 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 743 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 265 |
14 KB |
1 |
dweb.link
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link |
29 KB |
1 |
cwpanama.com
1 redirects
bclientes.cwpanama.com |
477 B |
16 | 8 |
Domain | Requested by | |
---|---|---|
10 | lh3.googleusercontent.com | |
2 | mortgagefamily.sautescff.com | 1 redirects |
1 | aadcdn.msftauth.net | |
1 | kgkagkgaga.ws |
code.jquery.com
|
1 | code.jquery.com |
mortgagefamily.sautescff.com
|
1 | cdnjs.cloudflare.com |
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link
|
1 | bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link |
mortgagefamily.sautescff.com
|
1 | bclientes.cwpanama.com | 1 redirects |
16 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.googleusercontent.com GTS CA 1C3 |
2023-07-10 - 2023-10-02 |
3 months | crt.sh |
kgkagkgaga.ws E1 |
2023-07-20 - 2023-10-18 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link/
Frame ID: 4E9DDBEB297A36E1CD2BFE9FBBB0C7EF
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://bclientes.cwpanama.com/customers/module.php/core/loginuserpass.php?AuthState=_f6522b387362565de2fd6...
HTTP 302
http://mortgagefamily.sautescff.com/mortgagefamily Page URL
-
http://mortgagefamily.sautescff.com/red.php?e=36875676f2e746f72726573406d6f72746761676566616d696c792e636f6d
HTTP 302
https://bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bclientes.cwpanama.com/customers/module.php/core/loginuserpass.php?AuthState=_f6522b387362565de2fd6c90c667dff1393e050975%3Ahttp://mortgagefamily.sautescff.com/mortgagefamily
HTTP 302
http://mortgagefamily.sautescff.com/mortgagefamily Page URL
-
http://mortgagefamily.sautescff.com/red.php?e=36875676f2e746f72726573406d6f72746761676566616d696c792e636f6d
HTTP 302
https://bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bclientes.cwpanama.com/customers/module.php/core/loginuserpass.php?AuthState=_f6522b387362565de2fd6c90c667dff1393e050975%3Ahttp://mortgagefamily.sautescff.com/mortgagefamily HTTP 302
- http://mortgagefamily.sautescff.com/mortgagefamily
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
mortgagefamily
mortgagefamily.sautescff.com/ Redirect Chain
|
164 B 371 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link/ Redirect Chain
|
37 KB 29 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
kgkagkgaga.ws/obufsssssssscaaatoion/ |
928 KB 77 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8C1y-LmqPwr79FSVd9YMV5yeje6h34dtqg8n1c7UYT__udX1hIixqqaItUS-Vtl4epJI-2Qtycgc0GgiWtrFAFZIVdjRD8HShOpZsK0Vucx0qiSJ9iKKAd1_ocqVqIgMtn1jlLj4HB4Ap_2ZUiwAnk=w108-h24-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CNmlIjdTtHgPdAMoSG4uyQnKbGT1407U5GJD9BBD5gOhyThvxN7ptqzSc9OV7GvMrNxsLjt_kin2qpj8tlLu4VPG_UA8XrdDZZYTEJRXHQkb_glHR4oYOoSP3tDH1rPkDWcGOdNw-zacvrmMF7NU0=s150-no
lh3.googleusercontent.com/pw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8DXuoTCchIiCUMSjRAC76eUjCoJ1Hj726Mdu1LszHJglP2MLf_RoCW0uZpRXU92HCp7sJJtRW1SSsaUhnE1muSBc8avCHEqEHuLdsuLbYPj0hMJ1kVq-hZ1eYf_w6QcxuCHVVBR-siBvHZM2G9Rlbw=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CLLNnGpj7_FWohqCPJSzzgHwWUwFqF-CN0acr9XqBJvbhlCprvfnAvLav0gAOr0ez63QMTk6WPV7V7rT_ZZ7E5ueysaU99HDwu7huiWEUvbNO3mDIklTKmUuxN9sPyZMwDPt-T39tp9ZO2Pq53dRI=s150-no
lh3.googleusercontent.com/pw/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8AK-lOypWQRHV6CblnIhwum5iMC-2fHJehOkF8BqfFCgB1DZT2LI30pbRIC605sfh4PyJS0qLFawTwXAyFCgEjDlPQe4GThYYbbx5CB-urZNnpa1Uhn-GrOGG5UcX6f5GsSPkypixgkdMoOBFlQqZ4=s150-no
lh3.googleusercontent.com/pw/ |
810 B 933 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8Cql-_FqT-vTMz5KecPfNkES17GUcAhZtgXLH0x4Wv9Lj4vnoCGPorATuuzvKe5c-hTrhXFnWh6cu4TC2cJjWKbnr2Fq-avQW5Q1oqvrNCP29CvGjXZZkxpkBgWTjA6DBjYlYpLr5-pfWHOb04OsBY=s150-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CPpl_w_5Fj80z5l9jlYET_SacByn_w9oXKdt92XWEATpkaTNMXRjd49krHesOb3FAHMXEQBD5153gSMnAZGOmXwR9Rp_K_-6jVQvTb4qi9QggArKoSZ61C-gpBRHxrTvoFunjzMPQhEspfqSTvD-o=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8BB5eL1vbp9dPEQCSEMJxM3Y9agty2fbo3XhD76Dz3OBAH0vp3VSA07-yrArrrYp5TuF80R6HzDKK65oJ8-tv7Px-SFgTOIBONfJYbApe2ilHyCEg9LRrwu52XsghVBZuQtpKdlw0j9iUdY8MqKhVU=s150-no
lh3.googleusercontent.com/pw/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8D8e5caxJov7GOp1rwDQidEks3V2UuXk1O7PZDbHZa5IL_i0KpG0ekmdhUvoDq55PguGPsZ-IFD0DpviH169WF09S-C8-tYQlW5MiYBzUesaWNDrAhwB3xLJo66GKNcYquCnPMjb1AN4oiTdyMOkvI=w1652-h929-no
lh3.googleusercontent.com/pw/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)88 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CryptoJS string| cIjhHxkh function| _0xdfe2e5 function| _0x505424 function| _0x15b174 function| _0x1026e1 function| _0x39a546 function| _0x1ef433 function| _0x4a68c1 function| _0x570a35 function| _0x5406e1 function| _0x4e38bd function| _0x53e5f5 function| _0x1af94a function| _0x190cda function| _0x108864 function| _0x41e12e function| _0x3b6b34 function| _0xf927d6 function| _0x52d1a8 function| _0x36d77f function| _0x1c22e7 function| _0x1ed93f function| _0x267230 function| _0x1197c3 function| _0x67813b function| _0x5d4cc9 function| _0x249cf5 function| _0x557a00 function| _0x5d1458 function| _0x3cac08 function| _0x501f54 function| _0x488c55 function| _0x2d7576 function| _0x2285a0 function| _0x2e1b17 function| _0x41b69d function| _0x2afae9 function| _0x3d1c8e function| _0x45f26d function| _0x1b2fde function| _0x556abe function| _0x3d542f function| _0x1690b7 function| _0x51ee5a function| _0x4de875 function| _0x33156b function| _0x2e8159 function| _0x7e9c07 function| _0x1b906b function| _0x5c3587 function| _0x4f26e5 function| _0x221235 function| _0x18a602 function| _0x1f63b8 function| _0x42f839 function| _0x4dadd7 function| _0x1728cc function| _0xb217fc function| _0x1f4a9f function| _0x82c164 function| _0x4c150f function| _0xab961b function| _0xa7afe7 function| _0x5d817b function| _0x377d43 function| _0x51b8c4 function| _0x18cc25 function| _0x2189a8 function| _0x5ef44f function| _0x10d97c function| _0x4ee68f function| _0x58b9c5 object| _0x98c7 string| IGOBZL string| cbbg function| _0x261c function| _0x3b2f string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery string| kakakaafinal string| getjsonnn number| counterror number| dalizk1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bclientes.cwpanama.com/ | Name: PHPSESSID Value: 1c902838d65442ad35c3b581bb6243d1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm.ipfs.dweb.link
bclientes.cwpanama.com
cdnjs.cloudflare.com
code.jquery.com
kgkagkgaga.ws
lh3.googleusercontent.com
mortgagefamily.sautescff.com
162.241.124.47
2001:4de0:ac18::1:a:1a
201.224.58.176
2602:fea2:2::1
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700::6811:190e
2a00:1450:4001:827::2001
2a06:98c1:3121::3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