ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434
Submission: On May 20 via api from LU — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on April 16th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
2 | 2a00:1450:400... 2a00:1450:4001:812::2001 | 15169 (GOOGLE) (GOOGLE) | |
6 | 5 |
ASN15169 (GOOGLE, US)
lh3.googleusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 44 |
193 KB |
2 |
ipfs.io
1 redirects
gateway.ipfs.io — Cisco Umbrella Rank: 316196 ipfs.io — Cisco Umbrella Rank: 65949 |
30 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 776 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 237 |
14 KB |
0 |
lopapscop.ws
Failed
zxc1mfde93.lopapscop.ws Failed |
|
6 | 5 |
Domain | Requested by | |
---|---|---|
2 | lh3.googleusercontent.com | |
1 | code.jquery.com |
ipfs.io
|
1 | cdnjs.cloudflare.com |
ipfs.io
|
1 | ipfs.io | |
1 | gateway.ipfs.io | 1 redirects |
0 | zxc1mfde93.lopapscop.ws Failed |
code.jquery.com
|
6 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.io GTS CA 1P5 |
2024-04-16 - 2024-07-15 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.googleusercontent.com WR2 |
2024-05-06 - 2024-07-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434
Frame ID: 9875FE4CA9B745FACF7C36041FC365C7
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://gateway.ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434
HTTP 301
https://ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434 Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://gateway.ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434
HTTP 301
https://ipfs.io/ipfs/bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
bafkreihe7r56yrbmxncjhzsvdinlmhottqrm34r6kagvfpmunfy2xo3434
ipfs.io/ipfs/ Redirect Chain
|
39 KB 30 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CjWLE-4lSHnzZVyyi38RiG_iHUev92wvk3GXVlZur4_v68tJc5TxPcsfc6Vo4P2_Sa5_Dg4wBjO9x0q0xYFQKyjpg1zURhvOLxyPhDhPJg_Z8XDFduSWtavIhhZp_z9dX4zrOp2jk9GCWUmL_6qus=s128-no
lh3.googleusercontent.com/pw/ |
330 B 439 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
zxc1mfde93.lopapscop.ws/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- zxc1mfde93.lopapscop.ws
- URL
- https://zxc1mfde93.lopapscop.ws/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)156 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CryptoJS string| sHEXRkXz function| _0x1887 function| _0x413d91 function| _0x3b0275 function| _0x40af56 function| _0x15588d function| _0x58d9da function| _0x38ae60 function| _0x3c292a function| _0xbf669c function| _0x385563 function| _0x41e0a2 function| _0x4b4337 function| _0x1ceca5 function| _0x397686 function| _0x234d61 function| _0x4707a1 function| _0x381d39 function| _0x32e848 function| _0x307f61 function| _0x95971 function| _0x15448a function| _0x3919f7 function| _0x234e96 function| _0x5aaeae function| _0x2e0d55 function| _0x1d4cde function| _0x1669a0 function| _0x1abe08 function| _0x1fde93 function| _0x77e4a9 function| _0x513064 function| _0x4bf477 function| _0x593c56 function| _0x1180c8 function| _0x3aa05d function| _0x2cbe32 function| _0x36b43a function| _0x105157 function| _0xe3d16d function| _0x605b38 function| _0x27fa1e function| _0xf83e27 function| _0x3e1564 function| _0x2e7339 function| _0x33082f function| _0xf55f17 function| _0x3206c4 function| _0x2bf2d7 function| _0x1e8cf1 function| _0x18f7e1 function| _0x2831a1 function| _0x4ae082 function| _0x4d45cf function| _0x172318 function| _0x556174 function| _0xd9523c function| _0x4e60a9 function| _0x4e8a1f function| _0x4287c8 function| _0x2c0598 function| _0x7eae16 function| _0x52f695 function| _0x477d7b function| _0xefa55a function| _0x2878a6 function| _0x46d865 function| _0x143d76 function| _0x4e606f function| _0x428843 function| _0x20699e function| _0x30082c function| _0x3872b2 function| _0x485fd4 function| _0x5b3994 function| _0x14ca18 function| _0x3d2ca5 function| _0x343120 function| _0x40dee9 function| _0x5d9787 function| _0x3817e9 function| _0x5b251c function| _0x3aa2c2 function| _0x3242cb function| _0x11ab9c function| _0x23f147 function| _0x19485e function| _0x1862b8 function| _0xb9c1d1 function| _0x2db33a function| _0x2669cb function| _0x38a472 function| _0x55d5a9 function| _0x4aff04 function| _0x407422 function| _0x11eca7 function| _0x4d0ad5 function| _0x48714b function| _0x4a9fcf function| _0x5d896d function| _0x1772d6 function| _0x53c35d function| _0x5b9341 function| _0x3dc454 function| _0x413e7e function| _0x1b0ec4 function| _0x3064e5 function| _0x49041b function| _0x3e1f9a function| _0x4fb0eb function| _0x3e29ef function| _0x4ba277 function| _0x1ae051 function| _0x436699 function| _0x449d35 function| _0x3eb746 function| _0x1340f9 function| _0x894711 function| _0x191047 function| _0x129544 function| _0x52cd67 function| _0x33f104 function| _0x2f5c2d function| _0xf6dc74 function| _0x1c157c function| _0x8db7d2 function| _0x1dc619 function| _0x33fd73 function| _0x37175e function| _0x4ff5e2 function| _0x242987 function| _0x28163d function| _0x340f31 function| _0x2d5c84 function| _0x46a9cc function| _0x20db76 function| _0x257fab function| _0x25d21e function| _0x2377b1 function| _0xf357a7 function| _0x3c82cd function| _0x5f3b31 function| _0x3e59c0 function| _0x3ef48e function| _0x5370f9 function| _0x23f4 object| _0xfb5f string| IGOBZL string| cbbg string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
gateway.ipfs.io
ipfs.io
lh3.googleusercontent.com
zxc1mfde93.lopapscop.ws
zxc1mfde93.lopapscop.ws
104.17.24.14
209.94.90.1
2602:fea2:2::1
2a00:1450:4001:812::2001
2a04:4e42:400::649
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
e4fc7bec442cbb4493e6551a1ab61dd39c22cdf23e500d52bd946971abbb7cdf
fea8fbaec75213e1af8005edfcdc94e7b5d7dca6ddb4e262d66e4756bda96d54