ipfs.chainsafe.io
Open in
urlscan Pro
18.119.59.15
Malicious Activity!
Public Scan
Effective URL: https://ipfs.chainsafe.io/ipfs/QmavThE1k7bU3RkCJ8HUacMfQoXBZXhwLXNNtQqR43Nf7D
Submission: On March 21 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on May 28th 2023. Valid for: a year.
This is the only time ipfs.chainsafe.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3035::6815:54e4 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 18.119.59.15 18.119.59.15 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a04:4e42:200... 2a04:4e42:200::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.77.64.70 51.77.64.70 | 16276 (OVH) (OVH) | |
8 | 6 |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-119-59-15.us-east-2.compute.amazonaws.com
ipfs.chainsafe.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5960 |
459 B |
1 |
uirork.online
onglfwnbb6n.uirork.online |
193 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 387 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1217 |
78 KB |
1 |
chainsafe.io
ipfs.chainsafe.io |
16 KB |
1 |
fkuhnkaliwio.com
1 redirects
fkuhnkaliwio.com |
490 B |
0 |
qiqoadsd.shop
Failed
bc4kdml291p.qiqoadsd.shop Failed |
|
8 | 7 |
Domain | Requested by | |
---|---|---|
1 | pro.ip-api.com |
code.jquery.com
|
1 | onglfwnbb6n.uirork.online | |
1 | cdnjs.cloudflare.com |
ipfs.chainsafe.io
|
1 | code.jquery.com |
ipfs.chainsafe.io
|
1 | ipfs.chainsafe.io | |
1 | fkuhnkaliwio.com | 1 redirects |
0 | bc4kdml291p.qiqoadsd.shop Failed |
code.jquery.com
|
8 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.chainsafe.io Amazon RSA 2048 M02 |
2023-05-28 - 2024-06-25 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
uirork.online GTS CA 1P5 |
2024-03-20 - 2024-06-18 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.chainsafe.io/ipfs/QmavThE1k7bU3RkCJ8HUacMfQoXBZXhwLXNNtQqR43Nf7D
Frame ID: 572BB7E040818F904D51F048DF3C5D85
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://fkuhnkaliwio.com/
HTTP 301
https://ipfs.chainsafe.io/ipfs/QmavThE1k7bU3RkCJ8HUacMfQoXBZXhwLXNNtQqR43Nf7D Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://fkuhnkaliwio.com/
HTTP 301
https://ipfs.chainsafe.io/ipfs/QmavThE1k7bU3RkCJ8HUacMfQoXBZXhwLXNNtQqR43Nf7D Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
QmavThE1k7bU3RkCJ8HUacMfQoXBZXhwLXNNtQqR43Nf7D
ipfs.chainsafe.io/ipfs/ Redirect Chain
|
15 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
preload-outlook.gif
bc4kdml291p.qiqoadsd.shop/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
onglfwnbb6n.uirork.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
303 B 459 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
bc4kdml291p.qiqoadsd.shop/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
bc4kdml291p.qiqoadsd.shop/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bc4kdml291p.qiqoadsd.shop
- URL
- https://bc4kdml291p.qiqoadsd.shop/static/media/preload-outlook.gif
- Domain
- bc4kdml291p.qiqoadsd.shop
- URL
- https://bc4kdml291p.qiqoadsd.shop/obufsssssssscaaatoion/
- Domain
- bc4kdml291p.qiqoadsd.shop
- URL
- https://bc4kdml291p.qiqoadsd.shop/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0xbab395 function| _0x3cfdec function| _0x1b6b9 function| _0x5e725b function| _0x2e5fc5 function| _0x147c91 function| _0x2b6c93 function| _0x111ed function| _0x5f418b function| _0x570d48 function| _0x1f47e5 function| _0x1d02fc function| _0x2c585f function| _0x5429dd function| _0x298a9e function| _0x37f957 function| _0x4e5d function| _0x8400 object| div1 string| Page_type string| IGOBZL string| cbbg string| GOFUDyHa string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr function| $ function| jQuery object| CryptoJS0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bc4kdml291p.qiqoadsd.shop
cdnjs.cloudflare.com
code.jquery.com
fkuhnkaliwio.com
ipfs.chainsafe.io
onglfwnbb6n.uirork.online
pro.ip-api.com
bc4kdml291p.qiqoadsd.shop
18.119.59.15
2606:4700:3035::6815:54e4
2606:4700::6811:180e
2a04:4e42:200::649
2a06:98c1:3121::3
51.77.64.70
2dd6f1f165752e81de756887dc22b37d3bf07ac6f394d67f0f347e8e8c6bc626
37002aaad03e5f0f13b69539ec7ad3ddf0cb683ec3c6824cfee64cd18b9618a9
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb