cloudflare-ipfs.com
Open in
urlscan Pro
104.17.64.14
Malicious Activity!
Public Scan
Effective URL: https://cloudflare-ipfs.com/ipfs/bafybeibcrwcbkrighzq33cny2adqmvzqllmnjb3likrwegmxvw2d5m6hpq/46h-359gn-9h34-hhf.html
Submission: On May 14 via manual from CH — Scanned from CH
Summary
TLS certificate: Issued by E1 on April 24th 2024. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 45.56.72.12 45.56.72.12 | 63949 (AKAMAI-LI...) (AKAMAI-LINODE-AP Akamai Connected Cloud) | |
1 | 104.17.64.14 104.17.64.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.67.144.35 172.67.144.35 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.18.10.207 104.18.10.207 | () () | |
1 | 142.250.186.170 142.250.186.170 | () () | |
1 | 103.153.183.146 103.153.183.146 | () () | |
1 | 104.17.25.14 104.17.25.14 | () () | |
1 1 | 216.58.206.68 216.58.206.68 | () () | |
1 | 142.250.185.228 142.250.185.228 | () () | |
1 | 151.101.2.137 151.101.2.137 | () () | |
1 | 172.217.18.10 172.217.18.10 | () () | |
1 | 104.18.11.207 104.18.11.207 | () () | |
1 | 142.250.186.35 142.250.186.35 | () () | |
15 | 13 |
ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG)
PTR: 45-56-72-12.ip.linodeusercontent.com
nationalyouthparty.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com stackpath.bootstrapcdn.com |
51 KB |
2 |
gstatic.com
t1.gstatic.com fonts.gstatic.com |
27 KB |
2 |
googleapis.com
fonts.googleapis.com ajax.googleapis.com |
31 KB |
2 |
nationalyouthparty.com
nationalyouthparty.com |
3 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
1 |
google.com
1 redirects
www.google.com |
287 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
techsmashwru.ru
techsmashwru.ru |
6 KB |
1 |
8190116.com
redrct.8190116.com |
174 KB |
1 |
cloudflare-ipfs.com
cloudflare-ipfs.com |
992 B |
0 |
ipfs.io
Failed
ipfs.io Failed |
|
15 | 11 |
Domain | Requested by | |
---|---|---|
2 | maxcdn.bootstrapcdn.com |
redrct.8190116.com
|
2 | nationalyouthparty.com | |
1 | fonts.gstatic.com |
techsmashwru.ru
|
1 | stackpath.bootstrapcdn.com |
redrct.8190116.com
|
1 | ajax.googleapis.com |
redrct.8190116.com
|
1 | code.jquery.com |
redrct.8190116.com
|
1 | t1.gstatic.com |
cloudflare-ipfs.com
|
1 | www.google.com | 1 redirects |
1 | cdnjs.cloudflare.com |
redrct.8190116.com
|
1 | techsmashwru.ru |
redrct.8190116.com
|
1 | fonts.googleapis.com |
redrct.8190116.com
|
1 | redrct.8190116.com |
cloudflare-ipfs.com
|
1 | cloudflare-ipfs.com | |
0 | ipfs.io Failed | |
15 | 14 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nationalyouthparty.com R3 |
2024-05-05 - 2024-08-03 |
3 months | crt.sh |
cloudflare-ipfs.com E1 |
2024-04-24 - 2024-07-23 |
3 months | crt.sh |
8190116.com GTS CA 1P5 |
2024-03-25 - 2024-06-23 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
techsmashwru.ru R3 |
2024-03-16 - 2024-06-14 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.gstatic.com WR2 |
2024-05-06 - 2024-07-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafybeibcrwcbkrighzq33cny2adqmvzqllmnjb3likrwegmxvw2d5m6hpq/46h-359gn-9h34-hhf.html
Frame ID: 66F1443186A8003628D276067E0A01FF
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://nationalyouthparty.com/ Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeibcrwcbkrighzq33cny2adqmvzqllmnjb3likrwegmxvw2d5m6hpq/46h-359gn-9... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://nationalyouthparty.com/ Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeibcrwcbkrighzq33cny2adqmvzqllmnjb3likrwegmxvw2d5m6hpq/46h-359gn-9h34-hhf.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://www.google.com/s2/favicons?sz=64&domain_url=cpanel.com HTTP 301
- https://t1.gstatic.com/faviconV2?client=SOCIAL&type=FAVICON&fallback_opts=TYPE,SIZE,URL&url=http://cpanel.com&size=64
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
nationalyouthparty.com/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
nationalyouthparty.com/ |
552 B 363 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
46h-359gn-9h34-hhf.html
cloudflare-ipfs.com/ipfs/bafybeibcrwcbkrighzq33cny2adqmvzqllmnjb3likrwegmxvw2d5m6hpq/ |
342 B 992 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
@Lucius_is_Safe-13-06.js
redrct.8190116.com/ |
526 KB 174 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 903 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css2.css
techsmashwru.ru/.luc/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faviconV2
t1.gstatic.com/ Redirect Chain
|
534 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
117 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
92zatBhPNqw73oTd4jQmfxI.woff2
fonts.gstatic.com/s/jost/v14/ |
26 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
QmQ9HAfg4RgBRHcoxhoekptaEVYzj5m39DTMGCXiNhSAKf
ipfs.io/ipfs/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ipfs.io
- URL
- https://ipfs.io/ipfs/QmQ9HAfg4RgBRHcoxhoekptaEVYzj5m39DTMGCXiNhSAKf?filename=index.html
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: h94heJyxXG8htnkeNhXQtIh.9B_nX6r81p.6tW3Ezd4-1715678960-1.0.1.1-mDZFttU6YOnTnuMmGh7INRZYrKTnmm_JYKi5abtOEk81G_KAYBcyr4QNGSiDLEBiZFsF72d0S1.0TWeih0V0MA |
9 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
cloudflare-ipfs.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
ipfs.io
maxcdn.bootstrapcdn.com
nationalyouthparty.com
redrct.8190116.com
stackpath.bootstrapcdn.com
t1.gstatic.com
techsmashwru.ru
www.google.com
ipfs.io
103.153.183.146
104.17.25.14
104.17.64.14
104.18.10.207
104.18.11.207
142.250.185.228
142.250.186.170
142.250.186.35
151.101.2.137
172.217.18.10
172.67.144.35
216.58.206.68
45.56.72.12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