bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link/
Submission: On August 02 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.80.64.45 54.80.64.45 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
10 | 2404:6800:400... 2404:6800:4004:818::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3033::ac43:9623 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:247... 2606:2800:247:8f3c:39fe:2753:7a35:e3da | 15133 (EDGECAST) (EDGECAST) | |
15 | 6 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-80-64-45.compute-1.amazonaws.com
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io |
ASN40680 (PROTOCOL, US)
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 107 |
559 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1066 |
670 B |
1 |
kgkagkgaga.ws
kgkagkgaga.ws — Cisco Umbrella Rank: 908817 |
76 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 743 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 265 |
14 KB |
1 |
dweb.link
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link |
30 KB |
1 |
infura-ipfs.io
1 redirects
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io |
278 B |
15 | 7 |
Domain | Requested by | |
---|---|---|
10 | lh3.googleusercontent.com | |
1 | aadcdn.msftauth.net | |
1 | kgkagkgaga.ws |
code.jquery.com
|
1 | code.jquery.com |
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link
|
1 | cdnjs.cloudflare.com |
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link
|
1 | bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link | |
1 | bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io | 1 redirects |
15 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.googleusercontent.com GTS CA 1C3 |
2023-07-10 - 2023-10-02 |
3 months | crt.sh |
kgkagkgaga.ws E1 |
2023-07-20 - 2023-10-18 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link/
Frame ID: 551016A1F250DE062CA52CBBDA2EDB62
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io/
HTTP 301
https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io/
HTTP 301
https://bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link/ Redirect Chain
|
39 KB 30 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
kgkagkgaga.ws/obufsssssssscaaatoion/ |
928 KB 76 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8C1y-LmqPwr79FSVd9YMV5yeje6h34dtqg8n1c7UYT__udX1hIixqqaItUS-Vtl4epJI-2Qtycgc0GgiWtrFAFZIVdjRD8HShOpZsK0Vucx0qiSJ9iKKAd1_ocqVqIgMtn1jlLj4HB4Ap_2ZUiwAnk=w108-h24-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CNmlIjdTtHgPdAMoSG4uyQnKbGT1407U5GJD9BBD5gOhyThvxN7ptqzSc9OV7GvMrNxsLjt_kin2qpj8tlLu4VPG_UA8XrdDZZYTEJRXHQkb_glHR4oYOoSP3tDH1rPkDWcGOdNw-zacvrmMF7NU0=s150-no
lh3.googleusercontent.com/pw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8DXuoTCchIiCUMSjRAC76eUjCoJ1Hj726Mdu1LszHJglP2MLf_RoCW0uZpRXU92HCp7sJJtRW1SSsaUhnE1muSBc8avCHEqEHuLdsuLbYPj0hMJ1kVq-hZ1eYf_w6QcxuCHVVBR-siBvHZM2G9Rlbw=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CLLNnGpj7_FWohqCPJSzzgHwWUwFqF-CN0acr9XqBJvbhlCprvfnAvLav0gAOr0ez63QMTk6WPV7V7rT_ZZ7E5ueysaU99HDwu7huiWEUvbNO3mDIklTKmUuxN9sPyZMwDPt-T39tp9ZO2Pq53dRI=s150-no
lh3.googleusercontent.com/pw/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 670 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8AK-lOypWQRHV6CblnIhwum5iMC-2fHJehOkF8BqfFCgB1DZT2LI30pbRIC605sfh4PyJS0qLFawTwXAyFCgEjDlPQe4GThYYbbx5CB-urZNnpa1Uhn-GrOGG5UcX6f5GsSPkypixgkdMoOBFlQqZ4=s150-no
lh3.googleusercontent.com/pw/ |
810 B 933 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8Cql-_FqT-vTMz5KecPfNkES17GUcAhZtgXLH0x4Wv9Lj4vnoCGPorATuuzvKe5c-hTrhXFnWh6cu4TC2cJjWKbnr2Fq-avQW5Q1oqvrNCP29CvGjXZZkxpkBgWTjA6DBjYlYpLr5-pfWHOb04OsBY=s150-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CPpl_w_5Fj80z5l9jlYET_SacByn_w9oXKdt92XWEATpkaTNMXRjd49krHesOb3FAHMXEQBD5153gSMnAZGOmXwR9Rp_K_-6jVQvTb4qi9QggArKoSZ61C-gpBRHxrTvoFunjzMPQhEspfqSTvD-o=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8BB5eL1vbp9dPEQCSEMJxM3Y9agty2fbo3XhD76Dz3OBAH0vp3VSA07-yrArrrYp5TuF80R6HzDKK65oJ8-tv7Px-SFgTOIBONfJYbApe2ilHyCEg9LRrwu52XsghVBZuQtpKdlw0j9iUdY8MqKhVU=s150-no
lh3.googleusercontent.com/pw/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaW23WiG6DTP5hTDkult_F7rpChQnQYb5e0YXmZaAG_uocYQb-xAb9v4i0w6rVKCRcZ2lB3ZX2uxamyGZBf6nOQEVAms47IR0Rrc6e6FPyBrPF4iMHrSIKH0PdALcUrKaecXGZF4nAjg8RQR5YHbbbk=w1365-h929-s-no
lh3.googleusercontent.com/pw/ |
337 KB 337 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)155 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CryptoJS string| kxQqNEol function| _0x76dd41 function| _0x209404 function| _0x3ff0ee function| _0x37d585 function| _0x26d72d function| _0x3e3bbf function| _0x3e1974 function| _0x986fbe function| _0x4fcfb8 function| _0x4e8f8f function| _0x3fd6d0 function| _0x20270b function| _0x223133 function| _0x1dc4d6 function| _0x5b333a function| _0x146c6a function| _0x49660e function| _0x5c030c function| _0x4a7aba function| _0xc7f95a function| _0x28a2cf function| _0x2020e6 function| _0x31f2f5 function| _0xf4308c function| _0x1811a5 function| _0x173f1d function| _0x28bc6a function| _0xc81a0f function| _0x3cd85a function| _0x4c6da8 function| _0x13757b function| _0x5e11d1 function| _0x78660e function| _0xe55e29 function| _0x50381d function| _0x4effcf function| _0x427fe6 function| _0x3d64cd function| _0x3af829 function| _0x4adb96 function| _0x260243 function| _0x4d4258 function| _0x29f1b0 function| _0x209fd8 function| _0x507698 function| _0x7cfe79 function| _0x1354bd function| _0x30d93c function| _0x5d70c5 function| _0x5526ef function| _0x38dee8 function| _0x4a7083 function| _0x334223 function| _0x259a4c function| _0x15ea08 function| _0x21232c function| _0xb50c9a function| _0x1aeb7c function| _0x334377 function| _0x5a608d function| _0x47ce32 function| _0x37123c function| _0x4b1231 function| _0x13d53d function| _0x172a52 function| _0x229edb function| _0x564195 function| _0x117611 function| _0x43dc06 function| _0xb2106e function| _0x2162ff function| _0x378f15 function| _0x5b6e4d function| _0x316df6 function| _0x29a4f4 function| _0x1eedac function| _0x13c2eb function| _0x154caa function| _0x1e54e7 function| _0x1cb1f8 function| _0x4a6598 function| _0x1ba5b7 function| _0x473d26 function| _0x4c5db5 function| _0x352f76 function| _0x36264a function| _0x2ed1bb function| _0x4a443e function| _0x48ef88 function| _0xd4d4db function| _0x4a41ff function| _0x37aabf function| _0x3a34cd function| _0x3af76d function| _0x4a52ed function| _0x4514b7 function| _0xb23b96 function| _0x17d623 function| _0x122950 function| _0xbe8b8e function| _0x1d354b function| _0x16281a function| _0x50c789 function| _0x3f9c64 function| _0x15dda7 function| _0x13f408 function| _0x10c596 function| _0x18c54f function| _0x255782 function| _0x916f9c function| _0x3b2cf4 function| _0x1c9b02 function| _0x3a457b function| _0x194e2b function| _0x5ac25c function| _0x4f8cd9 function| _0x40ae71 function| _0x1b2291 function| _0x39bf3f function| _0x2885af function| _0x237199 function| _0x2eb7b7 function| _0xd9ac91 function| _0x21c059 function| _0x340d7b function| _0x1b1da3 function| _0x4ee455 function| _0x58a60b function| _0x362551 function| _0x296907 function| _0x5d133f function| _0x546f7f function| _0x518fcf function| _0xe2bfea function| _0x568c3a function| _0x2c2263 function| _0x5557d7 function| _0x331be5 function| _0x13e0 function| _0x1bc0 object| _0x7aed string| IGOBZL string| cbbg string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery string| kakakaafinal string| getjsonnn number| counterror number| dalizk0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.dweb.link
bafkreigpgcebbznkszqsojhks6o7m6tmzylcbthrg4vku2j5f7lqq5bv3q.ipfs.infura-ipfs.io
cdnjs.cloudflare.com
code.jquery.com
kgkagkgaga.ws
lh3.googleusercontent.com
2001:4de0:ac18::1:a:1b
2404:6800:4004:818::2001
2602:fea2:2::1
2606:2800:247:8f3c:39fe:2753:7a35:e3da
2606:4700:3033::ac43:9623
2606:4700::6811:190e
54.80.64.45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