bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Effective URL: https://bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/
Submission: On January 23 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by E1 on January 18th 2024. Valid for: 3 months.
This is the only time bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.71.248.151 198.71.248.151 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
1 1 | 202.182.124.118 202.182.124.118 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3033::ac43:8e06 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.77.64.70 51.77.64.70 | 16276 (OVH) (OVH) | |
7 | 6 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: 151.248.71.198.host.secureserver.net
gem.godaddy.com |
ASN13335 (CLOUDFLARENET, US)
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com |
ASN13335 (CLOUDFLARENET, US)
b6e68pdgxm9.tomxboedxout.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5772 |
480 B |
1 |
tomxboedxout.online
b6e68pdgxm9.tomxboedxout.online |
193 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
78 KB |
1 |
cf-ipfs.com
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com |
6 KB |
1 |
rjmbrand.com
1 redirects
justmybrand.rjmbrand.com |
267 B |
1 |
godaddy.com
1 redirects
gem.godaddy.com — Cisco Umbrella Rank: 145570 |
670 B |
0 |
jzlxvnd7zolk.online
Failed
53s8uk4z1t.jzlxvnd7zolk.online Failed |
|
7 | 8 |
Domain | Requested by | |
---|---|---|
1 | pro.ip-api.com |
code.jquery.com
|
1 | b6e68pdgxm9.tomxboedxout.online | |
1 | cdnjs.cloudflare.com |
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com
|
1 | code.jquery.com |
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com
|
1 | bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com | |
1 | justmybrand.rjmbrand.com | 1 redirects |
1 | gem.godaddy.com | 1 redirects |
0 | 53s8uk4z1t.jzlxvnd7zolk.online Failed |
code.jquery.com
|
7 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cf-ipfs.com E1 |
2024-01-18 - 2024-04-17 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
tomxboedxout.online GTS CA 1P5 |
2024-01-22 - 2024-04-21 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/
Frame ID: 4F802907E6FF718B8AAB8A2B6D449987
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://gem.godaddy.com/signups/activate/MS0tZjVnN3dpalA1ckN5RnQxWjJ5bGRlaFVZenNWNmtQcFVpMGJRSlM1QW5...
HTTP 302
https://justmybrand.rjmbrand.com/ HTTP 301
https://bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://gem.godaddy.com/signups/activate/MS0tZjVnN3dpalA1ckN5RnQxWjJ5bGRlaFVZenNWNmtQcFVpMGJRSlM1QW5WT1VsVHNXRG5sV2lyQjVSTUdxc1hmSUdGL3J6bVBBbHZudDFoZGNvelFpaTY5TXRlcz0tLUtyK3NoT2x0UjNDbEJ0bHYtLTdXK3Foa2dmb1dXS3YrYjFpN09yTHc9PQ==?signup=10651486
HTTP 302
https://justmybrand.rjmbrand.com/ HTTP 301
https://bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/ Redirect Chain
|
15 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
preload-outlook.gif
53s8uk4z1t.jzlxvnd7zolk.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
b6e68pdgxm9.tomxboedxout.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
324 B 480 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
53s8uk4z1t.jzlxvnd7zolk.online/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 53s8uk4z1t.jzlxvnd7zolk.online
- URL
- https://53s8uk4z1t.jzlxvnd7zolk.online/static/media/preload-outlook.gif
- Domain
- 53s8uk4z1t.jzlxvnd7zolk.online
- URL
- https://53s8uk4z1t.jzlxvnd7zolk.online/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x1e6e function| _0x36f578 function| _0xe8b779 function| _0x57f34d function| _0xe33461 function| _0x1c41bf function| _0xe93e7f function| _0x58c70a function| _0x78d530 function| _0x5f0258 function| _0x55ea70 function| _0x7ebfad function| _0x429af7 function| _0x26b671 function| _0x1f21f8 function| _0x3ea08e function| _0x14f93e function| _0x473936 function| _0x410127 object| div1 string| Page_type string| IGOBZL string| cbbg function| _0x455f string| omDqmvCE string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr function| $ function| jQuery object| CryptoJS1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/ | Name: __cf_bm Value: kVqu92rZZAP7lRVDl6YyGXPFr8SjyVjoMBYDvLx5duI-1705979996-1-AXThKeVc4dnQwjQ70tQq52xdfaH/belmjYla+paCkOSwiEO+RTz4eVp4qfjw+1bXxc/QDgj7fB7rQj7+Uby9D1g= |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
53s8uk4z1t.jzlxvnd7zolk.online
b6e68pdgxm9.tomxboedxout.online
bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com
cdnjs.cloudflare.com
code.jquery.com
gem.godaddy.com
justmybrand.rjmbrand.com
pro.ip-api.com
53s8uk4z1t.jzlxvnd7zolk.online
198.71.248.151
202.182.124.118
2606:4700:3033::ac43:8e06
2606:4700::6811:190e
2606:4700::6811:400e
2a04:4e42::649
51.77.64.70
3911bf272e584e856900051c3f26c79e1078325dd7091c4ac391fa8aa2a7e033
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
ed0969c0f7b8ea3d523bc8df2af00fe2f53212f4706de83e93541a09490a266b