Submitted URL: http://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Effective URL: https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Submission: On November 15 via automatic, source openphish — Scanned from CA

Summary

This website contacted 4 IPs in 1 countries across 5 domains to perform 5 HTTP transactions. The main IP is 209.94.90.1, located in United States and belongs to PROTOCOL, US. The main domain is ipfs.io. The Cisco Umbrella rank of the primary domain is 96870.
TLS certificate: Issued by WE1 on October 11th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 209.94.90.1 40680 (PROTOCOL)
1 151.101.2.137 54113 (FASTLY)
1 13.249.91.87 16509 (AMAZON-02)
5 4
Apex Domain
Subdomains
Transfer
1 imagekit.io
ik.imagekit.io — Cisco Umbrella Rank: 23836
55 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 847
29 KB
1 ipfs.io
ipfs.io — Cisco Umbrella Rank: 96870
58 KB
0 Failed
function sub() { [native code] }. Failed
0 fortinet.com Failed
fac.corp.fortinet.com Failed
5 5
Domain Requested by
1 ik.imagekit.io ipfs.io
1 code.jquery.com ipfs.io
1 ipfs.io
0 www.yxnkyxnkqgdtywlslmnvbq== Failed ipfs.io
0 fac.corp.fortinet.com Failed ipfs.io
5 5

This site contains no links.

Subject Issuer Validity Valid
ipfs.io
WE1
2024-10-11 -
2025-01-09
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.imagekit.io
Amazon RSA 2048 M02
2024-01-23 -
2025-02-19
a year crt.sh

This page contains 2 frames:

Primary Page: https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Frame ID: 898826EA00B2B542112380C1DCAAEBE0
Requests: 4 HTTP requests in this frame

Frame: https://www.yxnkyxnkqgdtywlslmnvbq==/
Frame ID: B859B3557B874602605002215DEBD3B4
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Webmail

Page URL History Show full URLs

  1. http://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku HTTP 307
    https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • (?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

60 %
HTTPS

0 %
IPv6

5
Domains

5
Subdomains

4
IPs

1
Countries

142 kB
Transfer

297 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku HTTP 307
    https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
ipfs.io/ipfs/
Redirect Chain
  • http://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
  • https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
159 KB
58 KB
Document
General
Full URL
https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
209.94.90.1 , United States, ASN40680 (PROTOCOL, US),
Reverse DNS
Software
cloudflare /
Resource Hash
111270370b6c32dd291bb02a2683677f36ecfc5e116fed1377ca1e91f07dde55

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET HEAD OPTIONS
access-control-allow-origin
*
access-control-expose-headers
Content-Length Content-Range X-Chunked-Output X-Ipfs-Path X-Ipfs-Roots X-Stream-Output
alt-svc
h3=":443"; ma=86400
cache-control
public, max-age=29030400, immutable
cf-cache-status
HIT
cf-ray
8e2fc74b98e0ab7b-YYZ
content-encoding
br
content-type
text/html
date
Fri, 15 Nov 2024 14:02:21 GMT
server
cloudflare
vary
Accept-Encoding
x-ipfs-path
/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
x-ipfs-pop
rainbow-dc13-06
x-ipfs-roots
bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku

Redirect headers

Cross-Origin-Resource-Policy
Cross-Origin
Location
https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Non-Authoritative-Reason
HSTS
jquery-2.2.4.min.js
code.jquery.com/
84 KB
29 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.137 San Francisco, United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://ipfs.io
Referer
https://ipfs.io/

Response headers

content-encoding
gzip
etag
W/"28feccc0-14e4a"
age
1670012
x-cache
HIT, HIT
date
Fri, 15 Nov 2024 14:02:21 GMT
content-type
application/javascript; charset=utf-8
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
x-cache-hits
49863, 37370
x-served-by
cache-lga21935-LGA, cache-yyz4550-YYZ
vary
Accept-Encoding
cache-control
public, max-age=31536000, stale-while-revalidate=604800
x-timer
S1731679342.729626,VS0,VE0
cross-origin-resource-policy
cross-origin
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
access-control-allow-origin
*
content-length
29811
server
nginx
Rolling-1s-200px__1__trHCWXy9jD.gif
ik.imagekit.io/escrowmade/
54 KB
55 KB
Image
General
Full URL
https://ik.imagekit.io/escrowmade/Rolling-1s-200px__1__trHCWXy9jD.gif
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.249.91.87 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-249-91-87.jfk52.r.cloudfront.net
Software
/
Resource Hash
669c17cde38dd0ab9673de77a674c5b192e934399bbee3ebed65bd70b05bff5f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://ipfs.io/

Response headers

x-request-id
0ebe67ff-dcc3-4d95-b082-385b3d6ac858
etag
"d536d58ea2f4cfe5d5b734e7893fb09e"
age
1275450
access-control-allow-methods
GET
alt-svc
h3=":443"; ma=86400
x-cache
Hit from cloudfront
x-amz-cf-id
fcR0BSl6iG0FtKOwWqQIjCYhrnwhUF9NL1ThlB_dzYFyxWHi6vwG9w==
date
Thu, 31 Oct 2024 19:44:51 GMT
content-type
image/gif
vary
Accept
x-server
ImageKit.io
last-modified
Mon, 30 Sep 2024 19:32:04 GMT
access-control-allow-headers
*
cache-control
public, s-maxage=31536000, max-age=31536000, must-revalidate
timing-allow-origin
*
via
1.1 06c1d28e93bdae8f6401a12c10b2f570.cloudfront.net (CloudFront), 1.1 bc06e962b99bba0a18da728b3e764202.cloudfront.net (CloudFront)
access-control-allow-origin
*
content-length
55202
x-amz-cf-pop
JFK52-P9
/
fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
0
0

/
www.yxnkyxnkqgdtywlslmnvbq==/ Frame B859
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fac.corp.fortinet.com
URL
https://fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
Domain
www.yxnkyxnkqgdtywlslmnvbq==
URL
https://www.yxnkyxnkqgdtywlslmnvbq==/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| $ function| jQuery function| hdki8h843_0x3bc0eb function| caps function| hdki8h843_0x4e75eb function| hdki8h843_0xef59f3 function| hdki8h843_0x1d2e function| hdki8h843_0x3da0 function| hdki8h843_0x56700b function| hdki8h843_0x2516a8 function| _0x1c6a4e

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://ipfs.io/ipfs/bafkreiarcjydoc3mglossg5qfitigz37g3wpyxqrn7wrg56kd2i7a7o6ku
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o