ipfs.eth.aragon.network
Open in
urlscan Pro
146.190.204.125
Malicious Activity!
Public Scan
Submission: On July 27 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 6th 2024. Valid for: 3 months.
This is the only time ipfs.eth.aragon.network was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 146.190.204.125 146.190.204.125 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
2 | 2a00:1450:400... 2a00:1450:4001:82a::2001 | 15169 (GOOGLE) (GOOGLE) | |
7 | 5 |
ASN14061 (DIGITALOCEAN-ASN, US)
ipfs.eth.aragon.network |
ASN15169 (GOOGLE, US)
lh3.googleusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 129 |
193 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
14 KB |
1 |
aragon.network
ipfs.eth.aragon.network |
38 KB |
0 |
kgkagkgaga.ws
Failed
kgkagkgaga.ws Failed |
|
7 | 5 |
Domain | Requested by | |
---|---|---|
2 | lh3.googleusercontent.com | |
1 | code.jquery.com |
ipfs.eth.aragon.network
|
1 | cdnjs.cloudflare.com |
ipfs.eth.aragon.network
|
1 | ipfs.eth.aragon.network | |
0 | kgkagkgaga.ws Failed |
code.jquery.com
|
7 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.eth.aragon.network R3 |
2024-06-06 - 2024-09-04 |
3 months | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
*.googleusercontent.com WR2 |
2024-07-01 - 2024-09-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.eth.aragon.network/ipfs/bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm
Frame ID: 7871C082EB63E4935B117191FDDCC7FB
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bafkreigkbq4k7lz74z6xlrgccf3u4wqyiuzobpjzzjds32q3ig2m4igcpm
ipfs.eth.aragon.network/ipfs/ |
37 KB 38 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CjWLE-4lSHnzZVyyi38RiG_iHUev92wvk3GXVlZur4_v68tJc5TxPcsfc6Vo4P2_Sa5_Dg4wBjO9x0q0xYFQKyjpg1zURhvOLxyPhDhPJg_Z8XDFduSWtavIhhZp_z9dX4zrOp2jk9GCWUmL_6qus=s128-no
lh3.googleusercontent.com/pw/ |
330 B 439 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
kgkagkgaga.ws/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
kgkagkgaga.ws/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- kgkagkgaga.ws
- URL
- https://kgkagkgaga.ws/obufsssssssscaaatoion/
- Domain
- kgkagkgaga.ws
- URL
- https://kgkagkgaga.ws/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)82 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CryptoJS function| _0xdfe2e5 function| _0x505424 function| _0x15b174 function| _0x1026e1 function| _0x39a546 function| _0x1ef433 function| _0x4a68c1 function| _0x570a35 function| _0x5406e1 function| _0x4e38bd function| _0x53e5f5 function| _0x1af94a function| _0x190cda function| _0x108864 function| _0x41e12e function| _0x3b6b34 function| _0xf927d6 function| _0x52d1a8 function| _0x36d77f function| _0x1c22e7 function| _0x1ed93f function| _0x267230 function| _0x1197c3 function| _0x67813b function| _0x5d4cc9 function| _0x249cf5 function| _0x557a00 function| _0x5d1458 function| _0x3cac08 function| _0x501f54 function| _0x488c55 function| _0x2d7576 function| _0x2285a0 function| _0x2e1b17 function| _0x41b69d function| _0x2afae9 function| _0x3d1c8e function| _0x45f26d function| _0x1b2fde function| _0x556abe function| _0x3d542f function| _0x1690b7 function| _0x51ee5a function| _0x4de875 function| _0x33156b function| _0x2e8159 function| _0x7e9c07 function| _0x1b906b function| _0x5c3587 function| _0x4f26e5 function| _0x221235 function| _0x18a602 function| _0x1f63b8 function| _0x42f839 function| _0x4dadd7 function| _0x1728cc function| _0xb217fc function| _0x1f4a9f function| _0x82c164 function| _0x4c150f function| _0xab961b function| _0xa7afe7 function| _0x5d817b function| _0x377d43 function| _0x51b8c4 function| _0x18cc25 function| _0x2189a8 function| _0x5ef44f function| _0x10d97c function| _0x4ee68f function| _0x58b9c5 object| _0x98c7 string| IGOBZL function| _0x261c function| _0x3b2f string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
ipfs.eth.aragon.network
kgkagkgaga.ws
lh3.googleusercontent.com
kgkagkgaga.ws
104.17.25.14
146.190.204.125
2a00:1450:4001:82a::2001
2a04:4e42:400::649
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
ca0c38afaf3fe67d75c4c211774e5a184532e0bd39ca472dea1b41b4ce20c27b
fea8fbaec75213e1af8005edfcdc94e7b5d7dca6ddb4e262d66e4756bda96d54