ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html
Submission: On July 04 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 172.67.143.16 172.67.143.16 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 6 | 104.17.96.13 104.17.96.13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cloudflare-ipfs.com
2 redirects
cloudflare-ipfs.com |
8 KB |
2 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 87085 |
8 KB |
1 |
nadeemiqbal.com
nadeemiqbal.com |
829 B |
7 | 3 |
Domain | Requested by | |
---|---|---|
6 | cloudflare-ipfs.com |
2 redirects
nadeemiqbal.com
cloudflare-ipfs.com |
2 | ipfs.io |
ipfs.io
|
1 | nadeemiqbal.com | |
7 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
ipfs.tech |
docs.ipfs.tech |
Subject Issuer | Validity | Valid | |
---|---|---|---|
nadeemiqbal.com GTS CA 1P5 |
2024-05-21 - 2024-08-19 |
3 months | crt.sh |
cloudflare-ipfs.com WE1 |
2024-06-22 - 2024-09-20 |
3 months | crt.sh |
ipfs.io WE1 |
2024-06-14 - 2024-09-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html
Frame ID: 46DFE33A6C820F21CB04E69C3D8C9886
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
410 GonePage URL History Show full URLs
- https://nadeemiqbal.com/about/ Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=qAazJKxBU8SsYP16e406A5KH5dioGJI0V6W5Ma77NoQ-172011...
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html HTTP 301
https://ipfs.io/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: About IPFS
Search URL Search Domain Scan URL
Title: Install IPFS
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://nadeemiqbal.com/about/ Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=qAazJKxBU8SsYP16e406A5KH5dioGJI0V6W5Ma77NoQ-1720117418-0.0.1.1-%2Fipfs%2Fbafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi%2Fappp.html
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html HTTP 301
https://ipfs.io/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
nadeemiqbal.com/about/ |
881 B 829 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
appp.html
cloudflare-ipfs.com/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
cloudflare-ipfs.com/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
cloudflare-ipfs.com/ |
14 B 347 B |
Other
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
appp.html
ipfs.io/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
email-decode.min.js
ipfs.io/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 835 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: N82CTG1lb4K30F.wKij9Y6N6VRK3qBwT0AKtFORkJ9U-1720117418-1.0.1.1-U318OnUgXxwduXwAxS7orpxCOmTGtzgSS2vQHdkb65vwdJWrxg3lBxEzQuQqWfnT7BUhBorEKTbwKPepMIlDVg |
|
cloudflare-ipfs.com/ | Name: __cf_mw_byp Value: qAazJKxBU8SsYP16e406A5KH5dioGJI0V6W5Ma77NoQ-1720117418-0.0.1.1-/ipfs/bafybeiboj255sle5m423iqc2xnzbe5l6j4kt7s5mkozfxi5nac2quwsydi/appp.html |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cloudflare-ipfs.com
ipfs.io
nadeemiqbal.com
104.17.96.13
172.67.143.16
209.94.90.1
2505c1ba07dd0ecd915f7d866147a9cc1651cf425bba0a03d8fc3a89793a9975
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
a469ab4ca4e55bf547566e9ebfa1b809c933207e9d558156bc0c4252b17533fe
e8aacf8dc784aa310d05f53485344f25cf7645c46bf188dd2988eda18d232cc2
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016