bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com
Open in
urlscan Pro
2606:4700::6811:600d
Malicious Activity!
Public Scan
Effective URL: https://bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/
Submission: On January 22 via api from US — Scanned from US
Summary
TLS certificate: Issued by E1 on January 18th 2024. Valid for: 3 months.
This is the only time bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3033::6815:1cd9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:600d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3033::ac43:8e06 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 38.91.101.241 38.91.101.241 | 63023 (AS-GLOBAL...) (AS-GLOBALTELEHOST) | |
9 | 7 |
ASN13335 (CLOUDFLARENET, US)
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com |
ASN13335 (CLOUDFLARENET, US)
f2kig0y5b2q.tomxboedxout.online |
ASN63023 (AS-GLOBALTELEHOST, US)
PTR: us-ny-1.pro.ip-api.com
pro.ip-api.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
ip-api.com
pro.ip-api.com — Cisco Umbrella Rank: 5772 |
480 B |
1 |
tomxboedxout.online
f2kig0y5b2q.tomxboedxout.online |
193 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
78 KB |
1 |
cf-ipfs.com
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com |
7 KB |
1 |
associateair.site
www.associateair.site |
576 B |
0 |
jzlxvnd7zolk.online
Failed
eo5yq483awi.jzlxvnd7zolk.online Failed |
|
9 | 7 |
Domain | Requested by | |
---|---|---|
1 | pro.ip-api.com |
code.jquery.com
|
1 | f2kig0y5b2q.tomxboedxout.online | |
1 | cdnjs.cloudflare.com |
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com
|
1 | code.jquery.com |
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com
|
1 | bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com |
www.associateair.site
|
1 | www.associateair.site | |
0 | eo5yq483awi.jzlxvnd7zolk.online Failed |
code.jquery.com
|
9 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
associateair.site GTS CA 1P5 |
2024-01-22 - 2024-04-21 |
3 months | crt.sh |
cf-ipfs.com E1 |
2024-01-18 - 2024-04-17 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
tomxboedxout.online GTS CA 1P5 |
2024-01-22 - 2024-04-21 |
3 months | crt.sh |
*.ip-api.com Sectigo RSA Domain Validation Secure Server CA |
2023-12-21 - 2025-01-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/
Frame ID: 8DD6A2686888A470AB011BECD33D7F61
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.associateair.site/ Page URL
- https://bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.associateair.site/ Page URL
- https://bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
www.associateair.site/ |
150 B 576 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/ |
15 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
preload-outlook.gif
eo5yq483awi.jzlxvnd7zolk.online/static/media/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preload-outlook.gif
f2kig0y5b2q.tomxboedxout.online/static/media/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
pro.ip-api.com/json/ |
324 B 480 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
eo5yq483awi.jzlxvnd7zolk.online/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
eo5yq483awi.jzlxvnd7zolk.online/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- eo5yq483awi.jzlxvnd7zolk.online
- URL
- https://eo5yq483awi.jzlxvnd7zolk.online/static/media/preload-outlook.gif
- Domain
- eo5yq483awi.jzlxvnd7zolk.online
- URL
- https://eo5yq483awi.jzlxvnd7zolk.online/obufsssssssscaaatoion/
- Domain
- eo5yq483awi.jzlxvnd7zolk.online
- URL
- https://eo5yq483awi.jzlxvnd7zolk.online/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)32 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x496f82 function| _0x694044 function| _0x1a3742 function| _0x59b575 function| _0xed2982 function| _0x3aa482 function| _0xd840a2 function| _0x5e4aba function| _0x56469a function| _0x699960 function| _0x20d50d function| _0x270191 function| _0x46b1d5 function| _0x546eac function| _0x21b917 function| _0x45cb6d function| _0x590f25 function| _0x4a40 function| _0x5e53 object| div1 string| Page_type string| IGOBZL string| cbbg string| nMdsGJvq string| kaka90nal string| ka45k459final2 string| kak0011afinal string| getjsonnn number| countttingerr object| CryptoJS function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com/ | Name: __cf_bm Value: .imCkIyM8Kdk5BpQiR7xvYrZ7UZxtIZZELlp7RR8nP0-1705961430-1-Ad43av9CZEtZxrNJpZLcPBcrtgonp8IKeUGCjaO8WmfSzvZhtqAME23nVpu4wWGd9k4HJXJVXM49WbHFsUB9eTY= |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bafkreig5obqcqhlbceqrucltkndukusox2hncwnupnjnf6cevt5oo6ozhi.ipfs.cf-ipfs.com
cdnjs.cloudflare.com
code.jquery.com
eo5yq483awi.jzlxvnd7zolk.online
f2kig0y5b2q.tomxboedxout.online
pro.ip-api.com
www.associateair.site
eo5yq483awi.jzlxvnd7zolk.online
2606:4700:3033::6815:1cd9
2606:4700:3033::ac43:8e06
2606:4700::6811:190e
2606:4700::6811:600d
2a04:4e42:400::649
38.91.101.241
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
965346dd8de38244ea166b3875a9baa3fa3fceee951f639c2ca2cd7b60b11be2
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
dd7060281d6111211a0973534745524ebe8ed159b47b52d2f844acfae779d93a