cloudflare-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Effective URL: https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
Submission: On September 06 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 29th 2022. Valid for: a year.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Naver (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.187.29.19 198.187.29.19 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 79.141.166.233 79.141.166.233 | 201525 (HZ-CA-AS) (HZ-CA-AS) | |
1 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 3 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server124-1.web-hosting.com
plu.sh |
ASN201525 (HZ-CA-AS, BG)
PTR: acoverter.store
user.urtyu.kilot.mutyki.run.place |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
cloudflare-ipfs.com
cloudflare-ipfs.com |
154 KB |
1 |
run.place
user.urtyu.kilot.mutyki.run.place |
576 B |
1 |
plu.sh
1 redirects
plu.sh |
202 B |
2 | 3 |
Domain | Requested by | |
---|---|---|
1 | cloudflare-ipfs.com |
user.urtyu.kilot.mutyki.run.place
|
1 | user.urtyu.kilot.mutyki.run.place | |
1 | plu.sh | 1 redirects |
2 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.naver.com |
nid.naver.com |
m.site.naver.com |
help.naver.com |
www.navercorp.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-11-29 - 2023-11-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
Frame ID: 9D58F7429EF323E0122B073085A7F5BD
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
네이버 : 로그인....Page URL History Show full URLs
-
https://plu.sh/t6kcq
HTTP 301
http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/ Page URL
Page Statistics
11 Outgoing links
These are links going to different origins than the main page.
Title: 본문 바로가기
Search URL Search Domain Scan URL
Title: IP보안
Search URL Search Domain Scan URL
Title: 비밀번호 찾기
Search URL Search Domain Scan URL
Title: 아이디 찾기
Search URL Search Domain Scan URL
Title: 회원가입
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 이용약관
Search URL Search Domain Scan URL
Title: 개인정보처리방침
Search URL Search Domain Scan URL
Title: 책임의 한계와 법적고지
Search URL Search Domain Scan URL
Title: 회원정보 고객센터
Search URL Search Domain Scan URL
Title: 네이버
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://plu.sh/t6kcq
HTTP 301
http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html Page URL
- https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://plu.sh/t6kcq HTTP 301
- http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.html
user.urtyu.kilot.mutyki.run.place/stv/nav/ Redirect Chain
|
308 B 576 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/ |
221 KB 154 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
65 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
75 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Naver (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: x_6db0KEd8auVyzthetceXEINnUFofx_nD21PUItu9Y-1694017909-0-Aa6v7w+pcx6r2Vn9gqjXfsZGB9eUvtXczy3twjXlhf7iEG/Ggn5ueA55L6193FImHE9h3oequbLL2F2PL3bqnHc= |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cloudflare-ipfs.com
plu.sh
user.urtyu.kilot.mutyki.run.place
198.187.29.19
2606:4700::6811:400e
79.141.166.233
8a92d63d31496759a0f4938e99d55e01f1d12893572e0953167faa3481b91cfb
d9e8bb6edada840a04fab1e17e14596fb9fcdea4019297a8596e887183829efc
efa2df13da0fa1043fe6d4fa6cff2c6ff2f908c9708b65b905602822870c6737
f58f114b9d173c25cc4bb0139fbc52a62a6b868cbb0fbb9b456fc346696a807f