bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
Open in
urlscan Pro
209.94.90.2
Malicious Activity!
Public Scan
Submission: On October 09 via api from US — Scanned from US
Summary
TLS certificate: Issued by E5 on August 12th 2024. Valid for: 3 months.
This is the only time bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 209.94.90.2 209.94.90.2 | 40680 (PROTOCOL) (PROTOCOL) | |
5 | 2606:4700:310... 2606:4700:310c::ac42:2edd | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 172.66.44.161 172.66.44.161 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 4 |
ASN40680 (PROTOCOL, US)
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
pages.dev
cc-3ek.pages.dev thv-2hp.pages.dev |
1002 KB |
1 |
dweb.link
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link |
65 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | cc-3ek.pages.dev |
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
|
2 | thv-2hp.pages.dev |
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
|
1 | bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link | |
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link E5 |
2024-08-12 - 2024-11-10 |
3 months | crt.sh |
cc-3ek.pages.dev WE1 |
2024-10-06 - 2025-01-04 |
3 months | crt.sh |
thv-2hp.pages.dev WE1 |
2024-10-06 - 2025-01-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link/
Frame ID: F5D8265D014C8913BD61A7595ABD0BF4
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link/ |
310 KB 65 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.png
cc-3ek.pages.dev/ |
783 KB 784 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
thv-2hp.pages.dev/ |
164 KB 40 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.min.js
thv-2hp.pages.dev/ |
6 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GT-Super-Display-Light.woff
cc-3ek.pages.dev/ |
54 KB 55 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GT-Super-Display-Bold.woff
cc-3ek.pages.dev/ |
58 KB 58 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ActiefGrotesque-Regular.woff
cc-3ek.pages.dev/ |
30 KB 31 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ActiefGrotesque-Medium.woff
cc-3ek.pages.dev/ |
31 KB 32 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link/assets/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
- URL
- https://bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link/assets/favicon.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
cc-3ek.pages.dev
thv-2hp.pages.dev
bafkreidu36lcewqv4zhhndf5wwlvupaugfxu5io3kle6vamg45nfgliapm.ipfs.dweb.link
172.66.44.161
209.94.90.2
2606:4700:310c::ac42:2edd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