Submitted URL: http://0btfs-bridge.jwickfil.me/
Effective URL: https://0btfs-bridge.jwickfil.me/
Submission Tags: phish.gg anti.fish automated Search All
Submission: On August 20 via api from DE — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2400:52e0:1a01::998:1, located in Los Angeles, United States and belongs to BUNNYCDN, SI. The main domain is 0btfs-bridge.jwickfil.me.
TLS certificate: Issued by R3 on August 20th 2023. Valid for: 3 months.
This is the only time 0btfs-bridge.jwickfil.me was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 2400:52e0:1a0... 200325 (BUNNYCDN)
1 1
Apex Domain
Subdomains
Transfer
2 jwickfil.me
0btfs-bridge.jwickfil.me
2 KB
1 1
Domain Requested by
2 0btfs-bridge.jwickfil.me 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
0btfs-bridge.jwickfil.me
R3
2023-08-20 -
2023-11-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://0btfs-bridge.jwickfil.me/
Frame ID: 54722EBB498379E8A64350C75BC0EB19
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://0btfs-bridge.jwickfil.me/ HTTP 301
    https://0btfs-bridge.jwickfil.me/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://0btfs-bridge.jwickfil.me/ HTTP 301
    https://0btfs-bridge.jwickfil.me/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
0btfs-bridge.jwickfil.me/
Redirect Chain
  • http://0btfs-bridge.jwickfil.me/
  • https://0btfs-bridge.jwickfil.me/
148 B
1 KB
Document
General
Full URL
https://0btfs-bridge.jwickfil.me/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2400:52e0:1a01::998:1 Los Angeles, United States, ASN200325 (BUNNYCDN, SI),
Reverse DNS
Software
BunnyCDN-LA1-998 /
Resource Hash
f73a11bce4490ddff02948db4edaaeeec13208c59fe5ac14d2fc38254f349e20
Security Headers
Name Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

access-control-allow-methods
GET
access-control-allow-origin
*
access-control-expose-headers
Link
cache-control
public, max-age=29030400, immutable
cdn-cache
HIT
cdn-cachedat
08/20/2023 02:06:13
cdn-edgestorageid
1113
cdn-proxyver
1.04
cdn-pullzone
1566915
cdn-requestcountrycode
DE
cdn-requestid
be57a576b779e34e80d7f0db04e23318
cdn-requestpullcode
200
cdn-requestpullsuccess
True
cdn-status
200
cdn-uid
3d0d6c99-bd8d-4933-b6fd-a2de1df617cf
cf-ray
7f97135de9f13146-LAX
content-encoding
br
content-security-policy
default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage
content-type
text/plain
date
Sun, 20 Aug 2023 02:11:51 GMT
etag
W/"bafkreidvkgdi4j2ddeeepa6hpkm5spvxnnhropydq44rfbisnhhklmvb5u"
reporting-endpoints
csp-endpoint="https://csp-report-to.web3.storage"
server
BunnyCDN-LA1-998
server-timing
request;dur=871
vary
Accept-Encoding
x-dotstorage-anchor
41bd3fa78638bca4ac0aad9314ebc65f3ec7ea05e4a687b5910f78ec36189630
x-dotstorage-resolution-id
https://freeway.dag.haus
x-dotstorage-resolution-layer
dotstorage-race
x-freeway-version
2.12.4

Redirect headers

CDN-PullZone
1566915
CDN-RequestCountryCode
DE
CDN-RequestId
9fcf97de5abb2111c1ad3726110ad109
CDN-Uid
3d0d6c99-bd8d-4933-b6fd-a2de1df617cf
Connection
keep-alive
Content-Length
162
Content-Type
text/html
Date
Sun, 20 Aug 2023 02:11:51 GMT
Location
https://0btfs-bridge.jwickfil.me/
Server
BunnyCDN-LA1-998

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self' 'unsafe-inline' 'unsafe-eval' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; form-action 'self'; navigate-to 'self'; connect-src 'self' blob: data: https://*.w3s.link https://*.nftstorage.link https://*.dweb.link https://ipfs.io/ipfs/ https://*.githubusercontent.com https://tableland.network https://*.tableland.network ; report-to csp-endpoint ; report-uri https://csp-report-to.web3.storage

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0btfs-bridge.jwickfil.me
2400:52e0:1a01::998:1
f73a11bce4490ddff02948db4edaaeeec13208c59fe5ac14d2fc38254f349e20