bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link/
Submission: On July 08 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.227.105.66 54.227.105.66 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
10 | 2404:6800:400... 2404:6800:4004:821::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3032::6815:340e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:247... 2606:2800:247:8f3c:39fe:2753:7a35:e3da | 15133 (EDGECAST) (EDGECAST) | |
15 | 6 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-227-105-66.compute-1.amazonaws.com
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io |
ASN40680 (PROTOCOL, US)
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 108 |
242 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1175 |
670 B |
1 |
lkalzzop.online
lkalzzop.online |
77 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 749 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 274 |
14 KB |
1 |
dweb.link
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link |
63 KB |
1 |
infura-ipfs.io
1 redirects
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io |
278 B |
15 | 7 |
Domain | Requested by | |
---|---|---|
10 | lh3.googleusercontent.com | |
1 | aadcdn.msftauth.net | |
1 | lkalzzop.online |
code.jquery.com
|
1 | code.jquery.com |
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link
|
1 | cdnjs.cloudflare.com |
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link
|
1 | bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link | |
1 | bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io | 1 redirects |
15 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
*.googleusercontent.com GTS CA 1C3 |
2023-06-19 - 2023-09-11 |
3 months | crt.sh |
lkalzzop.online E1 |
2023-05-25 - 2023-08-23 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link/
Frame ID: 8044B70BC7E6C2D1924F96B4EAE04C7F
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io/
HTTP 301
https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io/
HTTP 301
https://bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link/ Redirect Chain
|
91 KB 63 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
lkalzzop.online/obufsssssssscaaatoion/ |
928 KB 77 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8C1y-LmqPwr79FSVd9YMV5yeje6h34dtqg8n1c7UYT__udX1hIixqqaItUS-Vtl4epJI-2Qtycgc0GgiWtrFAFZIVdjRD8HShOpZsK0Vucx0qiSJ9iKKAd1_ocqVqIgMtn1jlLj4HB4Ap_2ZUiwAnk=w108-h24-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CNmlIjdTtHgPdAMoSG4uyQnKbGT1407U5GJD9BBD5gOhyThvxN7ptqzSc9OV7GvMrNxsLjt_kin2qpj8tlLu4VPG_UA8XrdDZZYTEJRXHQkb_glHR4oYOoSP3tDH1rPkDWcGOdNw-zacvrmMF7NU0=s150-no
lh3.googleusercontent.com/pw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8DXuoTCchIiCUMSjRAC76eUjCoJ1Hj726Mdu1LszHJglP2MLf_RoCW0uZpRXU92HCp7sJJtRW1SSsaUhnE1muSBc8avCHEqEHuLdsuLbYPj0hMJ1kVq-hZ1eYf_w6QcxuCHVVBR-siBvHZM2G9Rlbw=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CLLNnGpj7_FWohqCPJSzzgHwWUwFqF-CN0acr9XqBJvbhlCprvfnAvLav0gAOr0ez63QMTk6WPV7V7rT_ZZ7E5ueysaU99HDwu7huiWEUvbNO3mDIklTKmUuxN9sPyZMwDPt-T39tp9ZO2Pq53dRI=s150-no
lh3.googleusercontent.com/pw/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 670 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8AK-lOypWQRHV6CblnIhwum5iMC-2fHJehOkF8BqfFCgB1DZT2LI30pbRIC605sfh4PyJS0qLFawTwXAyFCgEjDlPQe4GThYYbbx5CB-urZNnpa1Uhn-GrOGG5UcX6f5GsSPkypixgkdMoOBFlQqZ4=s150-no
lh3.googleusercontent.com/pw/ |
810 B 933 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8Cql-_FqT-vTMz5KecPfNkES17GUcAhZtgXLH0x4Wv9Lj4vnoCGPorATuuzvKe5c-hTrhXFnWh6cu4TC2cJjWKbnr2Fq-avQW5Q1oqvrNCP29CvGjXZZkxpkBgWTjA6DBjYlYpLr5-pfWHOb04OsBY=s150-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CPpl_w_5Fj80z5l9jlYET_SacByn_w9oXKdt92XWEATpkaTNMXRjd49krHesOb3FAHMXEQBD5153gSMnAZGOmXwR9Rp_K_-6jVQvTb4qi9QggArKoSZ61C-gpBRHxrTvoFunjzMPQhEspfqSTvD-o=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8BB5eL1vbp9dPEQCSEMJxM3Y9agty2fbo3XhD76Dz3OBAH0vp3VSA07-yrArrrYp5TuF80R6HzDKK65oJ8-tv7Px-SFgTOIBONfJYbApe2ilHyCEg9LRrwu52XsghVBZuQtpKdlw0j9iUdY8MqKhVU=s150-no
lh3.googleusercontent.com/pw/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8D8e5caxJov7GOp1rwDQidEks3V2UuXk1O7PZDbHZa5IL_i0KpG0ekmdhUvoDq55PguGPsZ-IFD0DpviH169WF09S-C8-tYQlW5MiYBzUesaWNDrAhwB3xLJo66GKNcYquCnPMjb1AN4oiTdyMOkvI=w1652-h929-no
lh3.googleusercontent.com/pw/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)135 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend string| hfwGMYpr object| CryptoJS object| decrypted object| key function| _0x4f04 function| _0x399903 function| _0x363ba3 function| _0x3da70c function| _0x5023ad function| _0x34c703 function| _0xfa221a function| _0x42afe3 function| _0x13477c function| _0x133311 function| _0x47ae3d function| _0x36e60e function| _0x52f30a function| _0x528711 function| _0x343969 function| _0xccad58 function| _0x325917 function| _0x42f032 function| _0xcc8bd7 function| _0x44bbc4 function| _0x483bdb function| _0x40e851 function| _0x2c6d95 function| _0x1a85e0 function| _0x5cdc0c function| _0x55e310 function| _0x7b2226 function| _0x2f12a9 function| _0x4286f1 function| _0x538a5d function| _0x185d0e function| _0x24c1c3 function| _0x570cd0 function| _0x1a39b2 function| _0x73eb96 function| _0x5ebccd function| _0x1e9df3 function| _0x52dd51 function| _0x1c384f function| _0x505eb8 function| _0x5bbdeb function| _0x14b171 function| _0x3613dd function| _0x501e65 function| _0x1def77 function| _0x266974 function| _0x29bfe7 function| _0x5d3163 function| _0x1cc639 function| _0x32a41c function| _0x47fe78 function| _0x5c4cf8 function| _0x420b71 function| _0x111c51 function| _0x1b78f0 function| _0x11b8a0 function| _0x30b708 function| _0x450fd0 function| _0xd195ef function| _0x1672a6 function| _0x25bf10 function| _0x130fef function| _0x2e68fa function| _0x2404b0 function| _0x59db0a function| _0x3ef890 function| _0x2c4c80 function| _0x5e3360 function| _0x2f1f2d function| _0x277bd4 function| _0x476d89 function| _0x2d6275 function| _0x23a90a function| _0x75fe26 function| _0xfe85f3 function| _0x56a8bc function| _0xde13b0 function| _0x1a593d function| _0x2bdac0 function| _0x2e796b function| _0x137f76 function| _0x4437d1 function| _0x149ec0 function| _0xc983bf function| _0x1fa97c function| _0x64af30 function| _0x5ae0a4 function| _0x3308a8 function| _0x43a805 function| _0x23050b function| _0x37ffb0 function| _0x42f95b function| _0x4b0e3a function| _0x484f8a function| _0x38374f function| _0x145011 function| _0x4a9ae5 function| _0x5ace57 function| _0x3ba66f function| _0x102454 function| _0x4aedeb function| _0x406b66 function| _0x3a1d3c function| _0x3e18e2 function| _0x344f51 function| _0x370d48 function| _0x53e878 function| _0x187617 function| _0x5bcd71 function| _0x43114f function| _0xd88ec2 function| _0x523e1b function| _0x125729 function| _0x150c38 object| _0xc8b6 string| IGOBZL string| cbbg function| _0x1e78 string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery string| kakakaafinal string| getjsonnn number| counterror number| dalizk0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.dweb.link
bafkreide6t3xjpf6k5l2xphqec5y5lwvbrgw5l2ypfg23ya66acjizvtza.ipfs.infura-ipfs.io
cdnjs.cloudflare.com
code.jquery.com
lh3.googleusercontent.com
lkalzzop.online
2001:4de0:ac18::1:a:3a
2404:6800:4004:821::2001
2602:fea2:2::1
2606:2800:247:8f3c:39fe:2753:7a35:e3da
2606:4700:3032::6815:340e
2606:4700::6811:190e
54.227.105.66
033ae15f266ca2f0edb4980492e4e70c5a41ffb87ee9f6daaea6a4ef64980034
2d44c3b13c9057d5ef8db356f47f29d0a7b79ccce4a1140018352289cb304336
34058a4c997349cd3c91a3bc59bcc82dd6920bd57a555b49875bf71eae942e2c
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
64f4f774bcbe5757abbcf020bb8eaed50c4d6eaf58794dade01ef0049466b3c8
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
930b3261c05ddf41566ca5906f3a5f91a437bf4de2513a84d5995a8aa1aec819
994ac85af4db5a2b5f7ce72d4f49c6b1c18c6422c8e57e623a2873bd7599e404
b13e4bfdccc28dc4b28733f02099beb91f8dbd3299c883a99dac7b619379d822
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
d1b8ac36f78215154031b551101879964a09a9e3c2ce4c7e89ccfb59eafd9879
efcfd4559471866f1f28ff4c67fd629c36fec893ea2071b8e54509a2471fedd5
f25dfd78d4d536460d422ea51153547edeb12f9662867f8972413972007e35c3
f2c40a63580308bf348c5e8eb9a0880238f5f207e228e0c091e83b1efcbf979f