bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Effective URL: https://bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ssllyyhr.html
Submission: On January 05 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on February 17th 2023. Valid for: a year.
This is the only time bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 195.252.110.154 195.252.110.154 | 6700 (BEOTEL-AS...) (BEOTEL-AS www.beotel.net) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 5 |
ASN13335 (CLOUDFLARENET, US)
cf-ipfs.com | |
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com |
ASN6700 (BEOTEL-AS www.beotel.net, RS)
PTR: cpanel14.beotel.net
biofor.rs |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cf-ipfs.com
1 redirects
cf-ipfs.com bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com |
21 KB |
2 |
biofor.rs
biofor.rs |
|
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 708 |
30 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 4303 |
25 KB |
6 | 4 |
Domain | Requested by | |
---|---|---|
2 | biofor.rs |
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
|
2 | bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com |
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
|
1 | ajax.googleapis.com |
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
|
1 | stackpath.bootstrapcdn.com |
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
|
1 | cf-ipfs.com | 1 redirects |
6 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cf-ipfs.com Cloudflare Inc ECC CA-3 |
2023-02-17 - 2024-02-17 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2023-11-30 - 2024-02-28 |
3 months | crt.sh |
biofor.rs cPanel, Inc. Certification Authority |
2024-01-01 - 2024-03-31 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-11-20 - 2024-02-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ssllyyhr.html
Frame ID: 9D169BFCA04D09B4AA53625B58246296
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Webmail Portal AccessPage URL History Show full URLs
-
https://cf-ipfs.com/ipfs/QmPZKoerZVZG9R9MGe8T7acbcsdegJdWuJpT7uQEdGkiJA/ssllyyhr.html
HTTP 301
https://bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ssllyyhr.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cf-ipfs.com/ipfs/QmPZKoerZVZG9R9MGe8T7acbcsdegJdWuJpT7uQEdGkiJA/ssllyyhr.html
HTTP 301
https://bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ssllyyhr.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
ssllyyhr.html
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ Redirect Chain
|
34 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
box.png
biofor.rs/sZxCvBnMhR/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
avast.png
biofor.rs/sZxCvBnMhR/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-image.jpg
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/img/ |
188 B 188 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cf-ipfs.com/ | Name: __cf_bm Value: Jelm6C3FQGtPB1hYKhuYfBfIsHe_St8VBH.O13S2ks0-1704494551-1-ASqsGXzC/2sMhUmFOJ4HfIIVjtaO4qK70TDrnUS3dy17QWLUWRsr9KRhUuqKrfPKgnZNaIsMrmiU8XHtxxLJUPE= |
|
.bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com/ | Name: __cf_bm Value: NckEuZI3d5IyJ8IOazzwiwdtG13wjpmg.eAoZmkiAHE-1704494551-1-AbhwAtzbwzP+NL1huHSeLVnx7rf+Lk64IGMJObF75Hj+v1rPg9lG+XDJXN4KRidWk6w3mQNcHMKstvdGuwuHl5M= |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bafybeiasdloltwpmv62aq2s7ja4zj2np6nn7w7wx6aadxxpsjhpwumdur4.ipfs.cf-ipfs.com
biofor.rs
cf-ipfs.com
stackpath.bootstrapcdn.com
195.252.110.154
2606:4700::6811:400e
2606:4700::6812:bcf
2a00:1450:4001:808::200a
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2d1c6efc7ba8d7b7a3bd04a9e11a7761c112e4bbc23f74937749067acea91d70
5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
644e3788d25b15eabff9cf210b77cee4c3baeafd8dadce510204f13a901bb13b
9888d594303c24b94a1da47f5c792ba834e82d2d430b61b4dd7faa696f578538
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855