ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY
Submission: On October 05 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 26th 2023. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.201.118.67 52.201.118.67 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700:e0:... 2606:4700:e0::ac40:6113 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4004:827::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-201-118-67.compute-1.amazonaws.com
infura-ipfs.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 720 |
30 KB |
1 |
iconfinder.com
cdn3.iconfinder.com — Cisco Umbrella Rank: 109583 |
10 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 49655 |
5 KB |
1 |
infura-ipfs.io
1 redirects
infura-ipfs.io — Cisco Umbrella Rank: 363879 |
262 B |
3 | 4 |
Domain | Requested by | |
---|---|---|
1 | ajax.googleapis.com |
ipfs.io
|
1 | cdn3.iconfinder.com |
ipfs.io
|
1 | ipfs.io | |
1 | infura-ipfs.io | 1 redirects |
3 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-08-26 - 2023-11-24 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-02-13 - 2024-02-12 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-09-04 - 2023-11-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY
Frame ID: BB6ADF5202A2180D25A0FE7941F5FAE8
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Redirecting.....Page URL History Show full URLs
-
https://infura-ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY
HTTP 301
https://ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://infura-ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY
HTTP 301
https://ipfs.io/ipfs/QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
QmVAtQvV43mR1V97a8gT1FA2MLQBejw8U8VxqMsKbgvZMY
ipfs.io/ipfs/ Redirect Chain
|
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
internt_web_technology-13-512.png
cdn3.iconfinder.com/data/icons/internet-and-web-4/78/ |
9 KB 10 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery string| email function| startTimer function| checkSecond0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn3.iconfinder.com
infura-ipfs.io
ipfs.io
2404:6800:4004:827::200a
2602:fea2:2::1
2606:4700:e0::ac40:6113
52.201.118.67
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
496321f135521471ce7d0a88cdfc09bfc5e84beb0407cc32cc2abe1933b7bd88
7073d25c0fc185d2dcca467d9bc0ea32933cfbce803832fbd07f45efa0aa581e
cdd666bf866b3aaba311acc79ebc0b780690651c42bd14efc7228a373a9263a7