Submitted URL: https://cloudflare-ipfs.com/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Effective URL: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Submission: On July 31 via api from US — Scanned from CA

Summary

This website contacted 5 IPs in 2 countries across 7 domains to perform 6 HTTP transactions. The main IP is 209.94.90.1, located in United States and belongs to PROTOCOL, US. The main domain is ipfs.io. The Cisco Umbrella rank of the primary domain is 90575.
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 104.17.96.13 13335 (CLOUDFLAR...)
1 209.94.90.1 40680 (PROTOCOL)
1 2a04:4e42:200... 54113 (FASTLY)
1 2600:9000:21d... 16509 (AMAZON-02)
1 2607:f8b0:400... 15169 (GOOGLE)
6 5
Apex Domain
Subdomains
Transfer
1 googleapis.com
firebasestorage.googleapis.com — Cisco Umbrella Rank: 6369
1 KB
1 imagekit.io
ik.imagekit.io — Cisco Umbrella Rank: 22881
55 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211
29 KB
1 ipfs.io
ipfs.io — Cisco Umbrella Rank: 90575
7 KB
1 cloudflare-ipfs.com
cloudflare-ipfs.com
404 B
0 alphatrade-options.com Failed
alphatrade-options.com Failed
0 fortinet.com Failed
fac.corp.fortinet.com Failed
6 7
Domain Requested by
1 firebasestorage.googleapis.com ipfs.io
1 ik.imagekit.io ipfs.io
1 code.jquery.com ipfs.io
1 ipfs.io
1 cloudflare-ipfs.com 1 redirects
0 alphatrade-options.com Failed
0 fac.corp.fortinet.com Failed ipfs.io
6 7

This site contains no links.

Subject Issuer Validity Valid
ipfs.io
WE1
2024-06-14 -
2024-09-12
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh
*.imagekit.io
Amazon RSA 2048 M02
2024-01-23 -
2025-02-19
a year crt.sh
upload.video.google.com
WR2
2024-07-30 -
2024-10-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Frame ID: FFE23A875AB696F281C3C0FCEF6F02E3
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Webmail - Login

Page URL History Show full URLs

  1. https://cloudflare-ipfs.com/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq HTTP 301
    https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • (?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

67 %
HTTPS

60 %
IPv6

7
Domains

7
Subdomains

5
IPs

2
Countries

92 kB
Transfer

156 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://cloudflare-ipfs.com/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq HTTP 301
    https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
ipfs.io/ipfs/
Redirect Chain
  • https://cloudflare-ipfs.com/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
  • https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
18 KB
7 KB
Document
General
Full URL
https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
209.94.90.1 , United States, ASN40680 (PROTOCOL, US),
Reverse DNS
Software
cloudflare /
Resource Hash
441cc5d84b16eff7f89e2fc1b91527b7dc08b032e472d33f29c51f7896b230b2

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET HEAD OPTIONS
access-control-allow-origin
*
access-control-expose-headers
Content-Length Content-Range X-Chunked-Output X-Ipfs-Path X-Ipfs-Roots X-Stream-Output
age
143389
alt-svc
h3=":443"; ma=86400
cache-control
public, max-age=29030400, immutable
cf-cache-status
HIT
cf-ray
8abe842d0970ab90-YYZ
content-encoding
br
content-type
text/html
date
Wed, 31 Jul 2024 15:10:37 GMT
server
cloudflare
vary
Accept-Encoding
x-ipfs-path
/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
x-ipfs-pop
rainbow-dc13-08
x-ipfs-roots
bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq

Redirect headers

alt-svc
h3=":443"; ma=86400
cf-ray
8abe842c5d98ab69-YYZ
content-length
0
date
Wed, 31 Jul 2024 15:10:37 GMT
location
https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
server
cloudflare
vary
Accept-Encoding
jquery-2.2.4.min.js
code.jquery.com/
84 KB
29 KB
Script
General
Full URL
https://code.jquery.com/jquery-2.2.4.min.js
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:200::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

Referer
https://ipfs.io/
Origin
https://ipfs.io
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Wed, 31 Jul 2024 15:10:37 GMT
content-encoding
gzip
via
1.1 varnish, 1.1 varnish
age
1312356
x-cache
HIT, HIT
cross-origin-resource-policy
cross-origin
content-length
29811
x-served-by
cache-lga21935-LGA, cache-yul1970022-YUL
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
server
nginx
x-timer
S1722438638.792595,VS0,VE0
etag
W/"28feccc0-14e4a"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=604800
accept-ranges
bytes
x-cache-hits
49330, 58842
Rolling-1s-200px__1__trHCWXy9jD.gif
ik.imagekit.io/escrowmade/
54 KB
55 KB
Image
General
Full URL
https://ik.imagekit.io/escrowmade/Rolling-1s-200px__1__trHCWXy9jD.gif
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:21dd:3000:15:c281:3500:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
669c17cde38dd0ab9673de77a674c5b192e934399bbee3ebed65bd70b05bff5f

Request headers

Referer
https://ipfs.io/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Sun, 30 Jun 2024 19:42:24 GMT
via
1.1 16d910967d343c8da7828222a653755e.cloudfront.net (CloudFront), 1.1 48d2977daea5b632b090c1400ef6bfcc.cloudfront.net (CloudFront)
x-amz-cf-pop
EWR53-C2
age
2662093
x-cache
Hit from cloudfront
alt-svc
h3=":443"; ma=86400
content-length
55202
x-request-id
9474d843-8f1f-45e7-be98-f55a0a811072
last-modified
Sun, 30 Jun 2024 19:38:51 GMT
etag
"d536d58ea2f4cfe5d5b734e7893fb09e"
vary
Accept
access-control-allow-methods
GET
content-type
image/gif
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=31536000, must-revalidate
x-server
ImageKit.io
timing-allow-origin
*
access-control-allow-headers
*
x-amz-cf-id
ShLu1EB56hYvRrtw1UjJ_qh6RVQP3tA0Tb_cj-OwUKJTQoUO3CFzAA==
favicons.png
firebasestorage.googleapis.com/v0/b/portal-aa363.appspot.com/o/
492 B
1 KB
Image
General
Full URL
https://firebasestorage.googleapis.com/v0/b/portal-aa363.appspot.com/o/favicons.png?alt=media&token=805fb0ef-a2d9-4a7f-85e6-d68384e166e3
Requested by
Host: ipfs.io
URL: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:400d:c0e::5f Morganton, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
UploadServer /
Resource Hash
2e30ff33270fd8687b0eb4d12652bfd967f23975f158bf8da93bece2ba4ab947

Request headers

Referer
https://ipfs.io/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Wed, 31 Jul 2024 15:10:38 GMT
x-guploader-uploadid
AHxI1nNc3BF9lppaH8mxHHSeC2cMcq--zSKC44cF7k9y7SUhsqxmrRxxCLurcPeGx4xsiv7b7CxNztrqwg
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''favicons.png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
492
last-modified
Mon, 01 Nov 2021 22:20:02 GMT
server
UploadServer
etag
"3ca64f83fdcf25135d87e08af65e68c9"
x-goog-generation
1635805202317844
content-type
image/png
x-goog-hash
crc32c=8ZCI3A==, md5=PKZPg/3PJRNdh+CK9l5oyQ==
cache-control
private, max-age=0
x-goog-stored-content-length
492
x-goog-meta-firebasestoragedownloadtokens
805fb0ef-a2d9-4a7f-85e6-d68384e166e3
accept-ranges
bytes
expires
Wed, 31 Jul 2024 15:10:38 GMT
/
fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
0
0

favicon.png
alphatrade-options.com/git/rand/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fac.corp.fortinet.com
URL
https://fac.corp.fortinet.com/customviews/image/password_hidden:93edf7d3ceb704be92ee084ecc62c6c8/
Domain
alphatrade-options.com
URL
https://alphatrade-options.com/git/rand/favicon.png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| $ function| jQuery function| _0x34d7a0 function| _0x2e20a0 object| _0x29a3 function| _0x40b2 function| _0x3169 function| setVisibility function| _0x4283 function| hidePassword function| _0x1831da string| html function| _0x1c4f object| container function| _0x33e7

1 Cookies

Domain/Path Name / Value
cloudflare-ipfs.com/ Name: __cf_bm
Value: 0mWNuk6_m.h4XBKajroyQ5Dl2.elWK1QGKlV15rR5L8-1722438637-1.0.1.1-J3o__ewUvZVYY.7iWE3psLPWLzLylUrjmOpJ3LFAKufko54k3TNY1gWQw76btWwz8BFgBqV9ZwFRzZCocDojIw

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://ipfs.io/ipfs/bafkreiaguopnnneqsticc4ryd7lghgaiaz2pqoylhglz6q4cdtrykw52hq
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o