ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/QmRunpt5Cst8ScBxYnxuqM6io9pR25DhHmAvnLTJ9diPsG
Submission: On August 03 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 167.250.5.29 167.250.5.29 | 264649 (NUT HOST SRL) (NUT HOST SRL) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:828::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | () () | |
6 | 6 |
ASN264649 (NUT HOST SRL, AR)
PTR: nb29.servidoraweb.net
narvaezabogados.com.ar |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
ipfs.io
ipfs.io |
948 B |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1066 |
17 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 79 |
1 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 265 |
28 KB |
1 |
narvaezabogados.com.ar
narvaezabogados.com.ar |
20 KB |
0 |
dgfhgjoresksks.com
Failed
dgfhgjoresksks.com Failed |
|
6 | 6 |
Domain | Requested by | |
---|---|---|
1 | ipfs.io |
narvaezabogados.com.ar
|
1 | aadcdn.msftauth.net |
narvaezabogados.com.ar
|
1 | fonts.googleapis.com |
narvaezabogados.com.ar
|
1 | cdnjs.cloudflare.com |
narvaezabogados.com.ar
|
1 | narvaezabogados.com.ar | |
0 | dgfhgjoresksks.com Failed |
ipfs.io
|
6 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
narvaezabogados.com.ar cPanel, Inc. Certification Authority |
2023-06-02 - 2023-08-31 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-10 - 2023-10-02 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/QmRunpt5Cst8ScBxYnxuqM6io9pR25DhHmAvnLTJ9diPsG
Frame ID: 840489BE8D875059EE59D2965AEF9A09
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Just a moment...Page URL History Show full URLs
- https://narvaezabogados.com.ar//////// Page URL
- https://ipfs.io/ipfs/QmRunpt5Cst8ScBxYnxuqM6io9pR25DhHmAvnLTJ9diPsG Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://narvaezabogados.com.ar//////// Page URL
- https://ipfs.io/ipfs/QmRunpt5Cst8ScBxYnxuqM6io9pR25DhHmAvnLTJ9diPsG Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
narvaezabogados.com.ar//////// |
20 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
21 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon_a_eupayfgghqiai7k9sol6lg2.ico
aadcdn.msftauth.net/shared/1.0/content/images/ |
17 KB 17 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
586 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
187 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
QmRunpt5Cst8ScBxYnxuqM6io9pR25DhHmAvnLTJ9diPsG
ipfs.io/ipfs/ |
246 B 948 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sc.php
dgfhgjoresksks.com/host%5b21%5d.mod/admin/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- dgfhgjoresksks.com
- URL
- https://dgfhgjoresksks.com/host%5b21%5d.mod/admin/js/sc.php
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| generateRandomString function| checkFlaggedUrl function| removeFlaggedUrls function| getEmailFromUrl function| redirectToRandomUrlWithDelay0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
cdnjs.cloudflare.com
dgfhgjoresksks.com
fonts.googleapis.com
ipfs.io
narvaezabogados.com.ar
dgfhgjoresksks.com
167.250.5.29
2602:fea2:2::1
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700::6811:190e
2a00:1450:4001:828::200a
45ededa902e9f8f2a61a2c06fa0f9b5e45b34ae3dcb8f3d7168b30cfa404fcb2
4ddc1e33de02a96249bf85fc7b16e669317a81d8e2fc403ddb1ded6c465dd578
907243919fe9f164b88d95f70a4356ce8ec05fa5c891b09d0890b528331b225a
90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
a021e5ef7022a556c759cca4e248f10383d65a1cd4df600dae57ea37ca481073
fc95732d9ff3b17fcb3e64fd12c0d451c38e64e1a4b420c556a7feb756a0a3fa
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e