cloudflare-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Submission: On January 24 via api from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on December 28th 2023. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 2606:4700:303... 2606:4700:3033::ac43:c119 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.77.64.70 51.77.64.70 | 16276 (OVH) (OVH) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
17 | 7 |
ASN13335 (CLOUDFLARENET, US)
x56iodwrtr.lkalzzop.online |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
lkalzzop.online
x56iodwrtr.lkalzzop.online |
317 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 943 |
753 B |
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5772 |
459 B |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
78 KB |
1 |
cloudflare-ipfs.com
cloudflare-ipfs.com |
9 KB |
0 |
gakgalag.online
Failed
741bcuj1lwl.gakgalag.online Failed |
|
17 | 7 |
Domain | Requested by | |
---|---|---|
11 | x56iodwrtr.lkalzzop.online |
code.jquery.com
|
1 | aadcdn.msftauth.net | |
1 | pro.ip-api.com |
code.jquery.com
|
1 | cdnjs.cloudflare.com |
cloudflare-ipfs.com
|
1 | code.jquery.com |
cloudflare-ipfs.com
|
1 | cloudflare-ipfs.com | |
0 | 741bcuj1lwl.gakgalag.online Failed | |
17 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cloudflare-ipfs.com E1 |
2023-12-28 - 2024-03-27 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
lkalzzop.online E1 |
2024-01-17 - 2024-04-16 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafkreignactel26rktnbaze27oc547oeuk54bqmnpdfrzcyx4enbtjewqi
Frame ID: 622FB473EE84189233C83A99B55FCE25
Requests: 17 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bafkreignactel26rktnbaze27oc547oeuk54bqmnpdfrzcyx4enbtjewqi
cloudflare-ipfs.com/ipfs/ |
28 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
x56iodwrtr.lkalzzop.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
preload-outlook.gif
741bcuj1lwl.gakgalag.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
303 B 459 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
x56iodwrtr.lkalzzop.online/obufsssssssscaaatoion/ |
923 KB 73 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
x56iodwrtr.lkalzzop.online/static/media/microsoft_logo.png/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
key_workshcool.png
x56iodwrtr.lkalzzop.online/static/media/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
person_workshcool.png
x56iodwrtr.lkalzzop.online/static/media/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
person_office.png
x56iodwrtr.lkalzzop.online/static/media/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
message_think.png
x56iodwrtr.lkalzzop.online/static/media/ |
810 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
auth_number.png
x56iodwrtr.lkalzzop.online/static/media/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
call_2fa.png
x56iodwrtr.lkalzzop.online/static/media/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2fa_authenticator.png
x56iodwrtr.lkalzzop.online/static/media/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_normal.png
x56iodwrtr.lkalzzop.online/static/media/ |
19 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 741bcuj1lwl.gakgalag.online
- URL
- https://741bcuj1lwl.gakgalag.online/static/media/preload-outlook.gif
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)41 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x3ca73a function| _0x1d8401 function| _0x442922 function| _0x388818 function| _0xa8832b function| _0x309cb9 function| _0x104a45 function| _0x3800a2 function| _0x456e4c function| _0x27b35e function| _0x254664 function| _0x41e759 function| _0x5dc289 function| _0x5ac2e6 function| _0x49a92c function| _0x442ef1 function| _0x1ce859 function| _0x1cbb91 function| _0x14807b function| _0x114b74 function| _0x2028f8 function| _0xbd1623 function| _0x3c5f70 function| _0x4d8546 function| _0x4236 function| _0x3460 object| div1 string| Page_type string| IGOBZL string| cbbg string| drOXGMIa string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr object| CryptoJS function| $ function| jQuery number| counterror number| dalizk1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: z6jABCJgMe1ismy8tJgelOUTr10F0tGvp2SQeQT8P5s-1706096244-1-AdEji7CtFQmDraIHvCN7dEzEJpGBznAJy8cvC7OfjZfyfs+e6AxuUMWayVy2vjgYtgWGmBVU1KAZrm0UPDzulZQ= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
741bcuj1lwl.gakgalag.online
aadcdn.msftauth.net
cdnjs.cloudflare.com
cloudflare-ipfs.com
code.jquery.com
pro.ip-api.com
x56iodwrtr.lkalzzop.online
741bcuj1lwl.gakgalag.online
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700:3033::ac43:c119
2606:4700::6811:190e
2606:4700::6811:400e
2a04:4e42:400::649
51.77.64.70
033ae15f266ca2f0edb4980492e4e70c5a41ffb87ee9f6daaea6a4ef64980034
2d44c3b13c9057d5ef8db356f47f29d0a7b79ccce4a1140018352289cb304336
2dc4435674232b7e3ea41308131208c27e02dc81a132e8b8e4daac74804d8e43
34058a4c997349cd3c91a3bc59bcc82dd6920bd57a555b49875bf71eae942e2c
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
75e078bba55adba2be242c7c0cddfdf9bdb6e94135f14592f1ee29d8aae54731
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
930b3261c05ddf41566ca5906f3a5f91a437bf4de2513a84d5995a8aa1aec819
994ac85af4db5a2b5f7ce72d4f49c6b1c18c6422c8e57e623a2873bd7599e404
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
cd00a645ebd154da10649afb85de7dc4a2bbc0c18d78cb1c8b17e11a19a49682
d1b8ac36f78215154031b551101879964a09a9e3c2ce4c7e89ccfb59eafd9879
efcfd4559471866f1f28ff4c67fd629c36fec893ea2071b8e54509a2471fedd5
f25dfd78d4d536460d422ea51153547edeb12f9662867f8972413972007e35c3
f2c40a63580308bf348c5e8eb9a0880238f5f207e228e0c091e83b1efcbf979f