bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Submission: On April 20 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on March 27th 2023. Valid for: 3 months.
This is the only time bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 69.16.175.42 69.16.175.42 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 99.84.37.96 99.84.37.96 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 82.165.229.87 82.165.229.87 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 74.208.232.20 74.208.232.20 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 104.16.88.20 104.16.88.20 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 6 |
ASN40680 (PROTOCOL, US)
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link |
ASN16509 (AMAZON-02, US)
PTR: server-99-84-37-96.ewr52.r.cloudfront.net
logo.clearbit.com |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
PTR: redir-bs.web.de
mail.com |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
PTR: www.mail.com
www.mail.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
mail.com
1 redirects
mail.com — Cisco Umbrella Rank: 24393 www.mail.com — Cisco Umbrella Rank: 179743 |
129 B |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3240 |
39 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 474 |
414 KB |
1 |
clearbit.com
logo.clearbit.com — Cisco Umbrella Rank: 34131 |
3 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 997 |
31 KB |
1 |
dweb.link
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link |
4 KB |
7 | 6 |
Domain | Requested by | |
---|---|---|
2 | stackpath.bootstrapcdn.com |
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
|
1 | cdn.jsdelivr.net |
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
|
1 | www.mail.com |
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
|
1 | mail.com | 1 redirects |
1 | logo.clearbit.com |
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
|
1 | code.jquery.com |
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
|
1 | bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link | |
7 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.i.ipfs.io R3 |
2023-03-27 - 2023-06-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
clearbit.com Amazon RSA 2048 M02 |
2023-02-21 - 2024-03-21 |
a year | crt.sh |
*.mail.com GeoTrust RSA CA 2018 |
2022-09-27 - 2023-10-28 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link/index.html
Frame ID: E9D4BB74FE79E721B162364544F9C457
Requests: 6 HTTP requests in this frame
Frame:
https://www.mail.com/
Frame ID: 269DED2E851DE09D4BA3F3F55FAC0E56
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Webmail Portal AccessDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://mail.com/ HTTP 301
- https://www.mail.com/
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.4.min.js
code.jquery.com/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mail.com
logo.clearbit.com/https:// |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.mail.com/ Frame 269D Redirect Chain
|
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-image-1.jpg
cdn.jsdelivr.net/gh/pandag90/cdn/ |
413 KB 414 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| bootstrap function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bafybeib5jvxytzbcnp7cw4u7zysib2l7ad7qbc2cdqipcm7gpjssfhka54.ipfs.dweb.link
cdn.jsdelivr.net
code.jquery.com
logo.clearbit.com
mail.com
stackpath.bootstrapcdn.com
www.mail.com
104.16.88.20
104.18.10.207
209.94.90.1
69.16.175.42
74.208.232.20
82.165.229.87
99.84.37.96
0b1774865cbe4c3ea59965618df2c25cf67bf6c0a9b943cd504d44e91d08fa57
438f4596442a96a8e8d2aeab265988d19ed860dd87972b3767fb3d80e78ceba8
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
a0fe8723dcf55da64d06b25446d0a8513e52527c45afcb37073465f9c6f352af
fc17763fe93d05bb3b8f95898fd1ac8c43c5fc75130a40fcfee8da4432f70743