bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Effective URL: https://bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link/
Submission Tags: falconsandbox
Submission: On July 20 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 11th 2023. Valid for: 3 months.
This is the only time bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.156.170.31 18.156.170.31 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 192.185.181.246 192.185.181.246 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
10 | 2a00:1450:400... 2a00:1450:4001:806::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:303... 2606:4700:3032::6815:340e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
17 | 7 |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-156-170-31.eu-central-1.compute.amazonaws.com
jmt.jobleads.com |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 192-185-181-246.unifiedlayer.com
hq4s.americanroyalshippingline.com |
ASN40680 (PROTOCOL, US)
bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link |
ASN15169 (GOOGLE, US)
lh3.googleusercontent.com |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 110 |
242 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 255 |
28 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 941 |
753 B |
1 |
lkalzzop.online
lkalzzop.online |
72 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 710 |
78 KB |
1 |
dweb.link
bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link |
36 KB |
1 |
americanroyalshippingline.com
hq4s.americanroyalshippingline.com |
362 B |
1 |
jobleads.com
1 redirects
jmt.jobleads.com — Cisco Umbrella Rank: 935919 |
213 B |
17 | 8 |
Domain | Requested by | |
---|---|---|
10 | lh3.googleusercontent.com | |
2 | cdnjs.cloudflare.com |
bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link
hq4s.americanroyalshippingline.com |
1 | aadcdn.msftauth.net | |
1 | lkalzzop.online |
code.jquery.com
|
1 | code.jquery.com |
hq4s.americanroyalshippingline.com
|
1 | bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link |
hq4s.americanroyalshippingline.com
|
1 | hq4s.americanroyalshippingline.com | |
1 | jmt.jobleads.com | 1 redirects |
17 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.americanroyalshippingline.com R3 |
2023-06-06 - 2023-09-04 |
3 months | crt.sh |
dweb.link R3 |
2023-06-11 - 2023-09-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.googleusercontent.com GTS CA 1C3 |
2023-07-03 - 2023-09-25 |
3 months | crt.sh |
lkalzzop.online E1 |
2023-05-25 - 2023-08-23 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link/
Frame ID: EBB28D9E5E8E237C60BDE33F697CBBE6
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
https://jmt.jobleads.com/api/v1/link?m=ec3729a3-154b-4313-bb7c-da24f5137229&u=20323520&t=id_64&l=http...
HTTP 302
https://hq4s.americanroyalshippingline.com/?sicko=YW50aG9ueS5raXJieUBzZXJjby5jb20= Page URL
- https://bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://jmt.jobleads.com/api/v1/link?m=ec3729a3-154b-4313-bb7c-da24f5137229&u=20323520&t=id_64&l=https%3A%2F%2Fhq4S.americanroyalshippingline.com%2F%3Fsicko%3DYW50aG9ueS5raXJieUBzZXJjby5jb20%3D
HTTP 302
https://hq4s.americanroyalshippingline.com/?sicko=YW50aG9ueS5raXJieUBzZXJjby5jb20= Page URL
- https://bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://jmt.jobleads.com/api/v1/link?m=ec3729a3-154b-4313-bb7c-da24f5137229&u=20323520&t=id_64&l=https%3A%2F%2Fhq4S.americanroyalshippingline.com%2F%3Fsicko%3DYW50aG9ueS5raXJieUBzZXJjby5jb20%3D HTTP 302
- https://hq4s.americanroyalshippingline.com/?sicko=YW50aG9ueS5raXJieUBzZXJjby5jb20=
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
hq4s.americanroyalshippingline.com/ Redirect Chain
|
173 B 362 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link/ |
49 KB 36 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
lkalzzop.online/obufsssssssscaaatoion/ |
928 KB 72 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8C1y-LmqPwr79FSVd9YMV5yeje6h34dtqg8n1c7UYT__udX1hIixqqaItUS-Vtl4epJI-2Qtycgc0GgiWtrFAFZIVdjRD8HShOpZsK0Vucx0qiSJ9iKKAd1_ocqVqIgMtn1jlLj4HB4Ap_2ZUiwAnk=w108-h24-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CNmlIjdTtHgPdAMoSG4uyQnKbGT1407U5GJD9BBD5gOhyThvxN7ptqzSc9OV7GvMrNxsLjt_kin2qpj8tlLu4VPG_UA8XrdDZZYTEJRXHQkb_glHR4oYOoSP3tDH1rPkDWcGOdNw-zacvrmMF7NU0=s150-no
lh3.googleusercontent.com/pw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8DXuoTCchIiCUMSjRAC76eUjCoJ1Hj726Mdu1LszHJglP2MLf_RoCW0uZpRXU92HCp7sJJtRW1SSsaUhnE1muSBc8avCHEqEHuLdsuLbYPj0hMJ1kVq-hZ1eYf_w6QcxuCHVVBR-siBvHZM2G9Rlbw=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CLLNnGpj7_FWohqCPJSzzgHwWUwFqF-CN0acr9XqBJvbhlCprvfnAvLav0gAOr0ez63QMTk6WPV7V7rT_ZZ7E5ueysaU99HDwu7huiWEUvbNO3mDIklTKmUuxN9sPyZMwDPt-T39tp9ZO2Pq53dRI=s150-no
lh3.googleusercontent.com/pw/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
513 B 753 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8AK-lOypWQRHV6CblnIhwum5iMC-2fHJehOkF8BqfFCgB1DZT2LI30pbRIC605sfh4PyJS0qLFawTwXAyFCgEjDlPQe4GThYYbbx5CB-urZNnpa1Uhn-GrOGG5UcX6f5GsSPkypixgkdMoOBFlQqZ4=s150-no
lh3.googleusercontent.com/pw/ |
810 B 947 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8Cql-_FqT-vTMz5KecPfNkES17GUcAhZtgXLH0x4Wv9Lj4vnoCGPorATuuzvKe5c-hTrhXFnWh6cu4TC2cJjWKbnr2Fq-avQW5Q1oqvrNCP29CvGjXZZkxpkBgWTjA6DBjYlYpLr5-pfWHOb04OsBY=s150-no
lh3.googleusercontent.com/pw/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CPpl_w_5Fj80z5l9jlYET_SacByn_w9oXKdt92XWEATpkaTNMXRjd49krHesOb3FAHMXEQBD5153gSMnAZGOmXwR9Rp_K_-6jVQvTb4qi9QggArKoSZ61C-gpBRHxrTvoFunjzMPQhEspfqSTvD-o=s150-no
lh3.googleusercontent.com/pw/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8BB5eL1vbp9dPEQCSEMJxM3Y9agty2fbo3XhD76Dz3OBAH0vp3VSA07-yrArrrYp5TuF80R6HzDKK65oJ8-tv7Px-SFgTOIBONfJYbApe2ilHyCEg9LRrwu52XsghVBZuQtpKdlw0j9iUdY8MqKhVU=s150-no
lh3.googleusercontent.com/pw/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8D8e5caxJov7GOp1rwDQidEks3V2UuXk1O7PZDbHZa5IL_i0KpG0ekmdhUvoDq55PguGPsZ-IFD0DpviH169WF09S-C8-tYQlW5MiYBzUesaWNDrAhwB3xLJo66GKNcYquCnPMjb1AN4oiTdyMOkvI=w1652-h929-no
lh3.googleusercontent.com/pw/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)77 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| zQrhoPht object| CryptoJS object| decrypted object| key function| _0x56b768 function| _0x45af9f function| _0x4c3ebb function| _0x4a2b62 function| _0x163b9f function| _0x1aa33d function| _0xbc0b34 function| _0x3d587c function| _0x2daebc function| _0x203921 function| _0x3ea350 function| _0x27bf4d function| _0x769e9f function| _0x2b771e function| _0x57975f function| _0x56e467 function| _0x3e7c57 function| _0x44ebc1 function| _0x4ec475 function| _0x33453c function| _0x3f1e7c function| _0xe7cdbd function| _0x16182a function| _0x215991 function| _0x3f1770 function| _0x20b763 function| _0x2434f0 function| _0x47d062 function| _0x504f5f function| _0x4949c4 function| _0x24a477 function| _0x44985e function| _0x49a97e function| _0x5bc2c5 function| _0xd0cb8d function| _0x3802b6 function| _0x13733e function| _0xf12c7e function| _0x52c194 function| _0x35aa2a function| _0x556a2c function| _0x203017 function| _0x42d616 function| _0x269d3f function| _0x422e1a function| _0x202fb5 function| _0x2a87c8 function| _0x555a9b function| _0x473ba8 function| _0x48d235 function| _0x90bc92 function| _0x1ca6f9 function| _0x134379 function| _0x20b8fc function| _0x45faa3 function| _0x129f99 function| _0x2dfac1 function| _0x371e function| _0x2b74 object| _0xe078 string| IGOBZL string| cbbg string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery string| kakakaafinal string| getjsonnn number| counterror number| dalizk string| sb1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
hq4s.americanroyalshippingline.com/ | Name: PHPSESSID Value: a9779d9febb6696340ec98c3baae54a1 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
bafkreibh5uqkfpc2dlgqi7s73mlxx4yumyos6nhvhxg5xhyxpfxwtrslpe.ipfs.dweb.link
cdnjs.cloudflare.com
code.jquery.com
hq4s.americanroyalshippingline.com
jmt.jobleads.com
lh3.googleusercontent.com
lkalzzop.online
18.156.170.31
192.185.181.246
2001:4de0:ac18::1:a:1b
2602:fea2:2::1
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2606:4700:3032::6815:340e
2606:4700::6811:180e
2a00:1450:4001:806::2001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