ipfs.runfission.com
Open in
urlscan Pro
3.211.217.6
Malicious Activity!
Public Scan
Effective URL: https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/thgz12.html
Submission: On July 02 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on November 19th 2023. Valid for: a year.
This is the only time ipfs.runfission.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 3.211.217.6 3.211.217.6 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
2 | 18.239.36.13 18.239.36.13 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 142.250.186.100 142.250.186.100 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::2004 | 15169 (GOOGLE) (GOOGLE) | |
7 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-211-217-6.compute-1.amazonaws.com
ipfs.runfission.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-239-36-13.ams58.r.cloudfront.net
logo.clearbit.com |
ASN15169 (GOOGLE, US)
PTR: fra24s06-in-f4.1e100.net
www.google.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
runfission.com
1 redirects
ipfs.runfission.com |
28 KB |
2 |
clearbit.com
logo.clearbit.com — Cisco Umbrella Rank: 27809 |
1011 B |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 816 |
30 KB |
1 |
gstatic.com
t3.gstatic.com |
667 B |
1 |
google.com
1 redirects
www.google.com — Cisco Umbrella Rank: 5 |
19 B |
7 | 5 |
Domain | Requested by | |
---|---|---|
3 | ipfs.runfission.com |
1 redirects
ipfs.runfission.com
|
2 | logo.clearbit.com |
ipfs.runfission.com
|
2 | code.jquery.com |
ipfs.runfission.com
|
1 | t3.gstatic.com | |
1 | www.google.com | 1 redirects |
7 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.runfission.com Amazon RSA 2048 M03 |
2023-11-19 - 2024-12-16 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
clearbit.com Amazon RSA 2048 M03 |
2024-01-22 - 2025-02-18 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/thgz12.html
Frame ID: 7C5A40D9D08ED9BF5C8BFC74AC6082AF
Requests: 4 HTTP requests in this frame
Frame:
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/thgz12.html
Frame ID: 7C327360FD7D6AE9DB5177CF35555EEC
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
Session Expired!Page URL History Show full URLs
-
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu//thgz12.html
HTTP 301
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/thgz12.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu//thgz12.html
HTTP 301
https://ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/thgz12.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://www.google.com/s2/favicons?domain=microsoft.com HTTP 301
- https://t3.gstatic.com/faviconV2?client=SOCIAL&type=FAVICON&fallback_opts=TYPE,SIZE,URL&url=http://microsoft.com&size=16
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
thgz12.html
ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/ Redirect Chain
|
13 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
live.com
logo.clearbit.com/ |
618 B 1011 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
thgz12.html
ipfs.runfission.com/ipfs/bafybeiajuxq27axdpsrkhvi4sroijeoxs7x7t6uu6jb7akn7aswzgdkmfu/ Frame 7C32 |
13 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
code.jquery.com/ Frame 7C32 |
85 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
live.com
logo.clearbit.com/ Frame 7C32 |
618 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faviconV2
t3.gstatic.com/ Redirect Chain
|
123 B 667 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 undefined| event object| fence object| sharedStorage function| $ function| jQuery function| stopHtmlRender function| randomString function| isBase64 function| _0x23c5db function| _0x5dde function| _0x2cf3 function| checkImage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipfs.runfission.com
logo.clearbit.com
t3.gstatic.com
www.google.com
142.250.186.100
18.239.36.13
2a00:1450:4001:82f::2004
2a04:4e42::649
3.211.217.6
352a123b5fc60b04834709b12bd417da8aec2c4319e6486c31f6826e9e591eed
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
a1fab8fc3cf9fb9554b6d0fcab8236be7a22ceadec82ce0704cf79d3973c1139
ab8d3feddcd4a0ea73237648451e573ad5ac676a683f347e16f755ad1ea62da9