bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link Open in urlscan Pro
2602:fea2:2::1  Malicious Activity! Public Scan

Submitted URL: http://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link:443/
Effective URL: https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Submission: On April 10 via api from US — Scanned from US

Summary

This website contacted 4 IPs in 1 countries across 5 domains to perform 6 HTTP transactions. The main IP is 2602:fea2:2::1, located in United States and belongs to PROTOCOL, US. The main domain is bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link.
TLS certificate: Issued by R3 on February 6th 2024. Valid for: 3 months.
This is the only time bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 2602:fea2:2::1 40680 (PROTOCOL)
1 2a04:4e42::649 54113 (FASTLY)
1 2600:9000:21d... 16509 (AMAZON-02)
6 4
Apex Domain
Subdomains
Transfer
1 imagekit.io
ik.imagekit.io — Cisco Umbrella Rank: 23033
54 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 1217
29 KB
1 dweb.link
bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
54 KB
0 Failed
function sub() { [native code] }. Failed
0 fortinet.com Failed
fac.corp.fortinet.com Failed
6 5
Domain Requested by
1 ik.imagekit.io bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
1 code.jquery.com bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
1 bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
0 www.yxnkyxnkqgdtywlslmnvbq== Failed bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
0 fac.corp.fortinet.com Failed bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
6 5

This site contains no links.

Subject Issuer Validity Valid
dweb.link
R3
2024-02-06 -
2024-05-06
3 months crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2023-07-11 -
2024-07-14
a year crt.sh
*.imagekit.io
Amazon RSA 2048 M02
2024-01-23 -
2025-02-19
a year crt.sh

This page contains 2 frames:

Primary Page: https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Frame ID: 4A81A8EAC668CCDAD42A2DDC87A13280
Requests: 5 HTTP requests in this frame

Frame: https://www.yxnkyxnkqgdtywlslmnvbq==/
Frame ID: ED4450BA3AABD1EA32B04D9192B1571A
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Webmail

Page URL History Show full URLs

  1. http://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link:443/ HTTP 307
    https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • (?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

50 %
HTTPS

100 %
IPv6

5
Domains

5
Subdomains

4
IPs

1
Countries

138 kB
Transfer

281 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link:443/ HTTP 307
    https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Redirect Chain
  • http://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link:443/
  • https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
144 KB
54 KB
Document
General
Full URL
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2602:fea2:2::1 , United States, ASN40680 (PROTOCOL, US),
Reverse DNS
Software
openresty /
Resource Hash
939033098b6909f71e1546a2f146ef50da62516c4231f8ee4e6e5764b3aa9ae4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET HEAD OPTIONS
access-control-allow-origin
*
access-control-expose-headers
Content-Length Content-Range X-Chunked-Output X-Ipfs-Path X-Ipfs-Roots X-Stream-Output
cache-control
public, max-age=29030400, immutable
content-encoding
gzip
content-type
text/html
date
Wed, 10 Apr 2024 20:53:16 GMT
etag
W/"bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y"
server
openresty
strict-transport-security
max-age=31536000; includeSubDomains; preload
timing-allow-origin
*
vary
Accept-Encoding
x-bfid
8b0b6a090c69936beded7143f5b1778e
x-ipfs-lb-pop
gateway-bank2-dc13
x-ipfs-path
/ipfs/bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y/
x-ipfs-pop
ipfs-bank6-dc13
x-ipfs-roots
bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y
x-proxy-cache
HIT

Redirect headers

Cross-Origin-Resource-Policy
Cross-Origin
Location
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Non-Authoritative-Reason
HSTS
jquery-2.2.4.min.js
code.jquery.com/
84 KB
29 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
URL: https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

sec-ch-ua
"Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
Referer
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Origin
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
accept-language
en-US,en;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Wed, 10 Apr 2024 20:56:51 GMT
content-encoding
gzip
via
1.1 varnish, 1.1 varnish
age
5523857
x-cache
HIT, HIT
content-length
29811
x-served-by
cache-lga21935-LGA, cache-mia-kmia1760082-MIA
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
server
nginx
x-timer
S1712782612.700633,VS0,VE0
etag
W/"28feccc0-14e4a"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=604800
accept-ranges
bytes
x-cache-hits
21, 42517
Rolling-1s-200px__1__trHCWXy9jD.gif
ik.imagekit.io/escrowmade/
54 KB
54 KB
Image
General
Full URL
https://ik.imagekit.io/escrowmade/Rolling-1s-200px__1__trHCWXy9jD.gif
Requested by
Host: bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
URL: https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:21dd:c600:15:c281:3500:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
669c17cde38dd0ab9673de77a674c5b192e934399bbee3ebed65bd70b05bff5f

Request headers

sec-ch-ua
"Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
Referer
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
accept-language
en-US,en;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Sun, 31 Mar 2024 20:25:25 GMT
via
1.1 e8eec15d9551dd475d4c478f9fbb5f04.cloudfront.net (CloudFront), 1.1 ba636ce43f1cebcb0c172b8070a33b14.cloudfront.net (CloudFront)
x-amz-cf-pop
EWR53-C2
age
865886
x-cache
Hit from cloudfront
alt-svc
h3=":443"; ma=86400
content-length
55202
x-request-id
0e865e17-c9be-4f69-8d10-b50a29ac881a
etag
W/"d7a2-d8Xp/Lsz65tt+AiqhvUOBULlFi8"
vary
Accept
access-control-allow-methods
GET
content-type
image/gif
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=31536000, must-revalidate
x-server
ImageKit.io
timing-allow-origin
*
access-control-allow-headers
*
x-amz-cf-id
lHc5mYanv4RjSbNhAbXjI4zkabZM7ynoEUh4fLpxBkJLizlRUURq5Q==
/
fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
0
0

/
www.yxnkyxnkqgdtywlslmnvbq==/ Frame ED44
0
0

favicon.ico
bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fac.corp.fortinet.com
URL
https://fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
Domain
www.yxnkyxnkqgdtywlslmnvbq==
URL
https://www.yxnkyxnkqgdtywlslmnvbq==/
Domain
bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link
URL
https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/favicon.ico

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| $ function| jQuery function| mkvo924_0x188e95 function| mkvo924_0x34d98e function| mkvo924_0x523af1 function| caps function| mkvo924_0x23b7d8 function| mkvo924_0x438d9a function| mkvo924_0x55dd function| mkvo924_0x184f function| _0x2d6a10

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://bafybeigeflzm55xs4naqtrlkk4wwrusfbv56ak3ipitigvb2wqrbzqy23y.ipfs.dweb.link/
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload