bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Submission Tags: analytics-framework
Submission: On April 24 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 27th 2023. Valid for: 3 months.
This is the only time bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
3 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 20.191.229.231 20.191.229.231 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:400... 2a04:4e42:400::485 | 54113 (FASTLY) (FASTLY) | |
2 | 2a02:26f0:350... 2a02:26f0:3500:594::356e | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 64.185.227.155 64.185.227.155 | () () | |
12 | 9 |
ASN40680 (PROTOCOL, US)
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
ASN20940 (AKAMAI-ASN1, NL)
c.s-microsoft.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1289 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3240 |
42 KB |
2 |
s-microsoft.com
c.s-microsoft.com — Cisco Umbrella Rank: 9604 |
62 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 997 |
33 KB |
1 |
ipify.org
api.ipify.org |
155 B |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 474 |
19 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 344 |
7 KB |
1 |
cytrack.com
web.cytrack.com |
17 KB |
1 |
dweb.link
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link |
7 KB |
12 | 8 |
Domain | Requested by | |
---|---|---|
2 | c.s-microsoft.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
2 | code.jquery.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
2 | stackpath.bootstrapcdn.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
1 | api.ipify.org |
code.jquery.com
|
1 | cdn.jsdelivr.net |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
1 | cdnjs.cloudflare.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
1 | web.cytrack.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
1 | maxcdn.bootstrapcdn.com |
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
|
1 | bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link | |
12 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.i.ipfs.io R3 |
2023-03-27 - 2023-06-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
web.cytrack.com R3 |
2022-09-18 - 2022-12-17 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2022 Q4 |
2022-12-23 - 2024-01-24 |
a year | crt.sh |
www.microsoft.com Microsoft Azure TLS Issuing CA 06 |
2022-10-04 - 2023-09-29 |
a year | crt.sh |
*.ipify.org Sectigo RSA Domain Validation Secure Server CA |
2023-02-07 - 2024-02-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link/
Frame ID: FED9FFDB6159EEF00F579F4475DC815A
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Signin Outlook WebApp SettingsDetected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
SweetAlert2 (JavaScript Libraries) Expand
Detected patterns
- /npm/sweetalert2@([\d.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery Migrate (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link/ |
19 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft-outlook-logo.jpg
web.cytrack.com/wpv1/wp-content/uploads/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-migrate-3.1.0.min.js
code.jquery.com/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/ |
49 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sweetalert2@9
cdn.jsdelivr.net/npm/ |
66 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/normal/ |
33 KB 34 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
latest.woff2
c.s-microsoft.com/static/fonts/segoe-ui/west-european/semibold/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
21 B 155 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery function| Popper object| bootstrap function| Sweetalert2 function| SweetAlert function| Swal function| sweetAlert function| swal string| currentBrowser string| OSName0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.ipify.org
bafybeidgeax5vd7puwy3o37bx7jyx2jtyoh7phkw7som6hincbfqqxnppu.ipfs.dweb.link
c.s-microsoft.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
maxcdn.bootstrapcdn.com
stackpath.bootstrapcdn.com
web.cytrack.com
20.191.229.231
2001:4de0:ac18::1:a:3b
2602:fea2:2::1
2606:4700::6811:180e
2606:4700::6812:acf
2a02:26f0:3500:594::356e
2a04:4e42:400::485
64.185.227.155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