ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Submission: On July 04 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2a04:4e42:400... 2a04:4e42:400::649 | 54113 (FASTLY) (FASTLY) | |
5 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 816 |
30 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 87085 |
13 KB |
0 |
blueye.com
Failed
webmail.blueye.com Failed |
|
5 | 3 |
Domain | Requested by | |
---|---|---|
1 | code.jquery.com |
ipfs.io
|
1 | ipfs.io | |
0 | webmail.blueye.com Failed |
ipfs.io
|
5 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
go.cpanel.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.io WE1 |
2024-06-14 - 2024-09-12 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/QmXtVQXaBu5pBRgVqqfCGxknRA11vf3kPdENr3p3t3Pvuc
Frame ID: CA375DF561A382C8CEF432FFAA8D702D
Requests: 6 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Privacy Policy.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
QmXtVQXaBu5pBRgVqqfCGxknRA11vf3kPdENr3p3t3Pvuc
ipfs.io/ipfs/ |
35 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
open_sans.min.css
webmail.blueye.com/cPanel_magic_revision_1386192030/unprotected/cpanel/fonts/open_sans/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
style_v2_optimized.css
webmail.blueye.com/cPanel_magic_revision_1573005217/unprotected/cpanel/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
webmail-logo.svg
webmail.blueye.com/cPanel_magic_revision_1533566265/unprotected/cpanel/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- webmail.blueye.com
- URL
- https://webmail.blueye.com/cPanel_magic_revision_1386192030/unprotected/cpanel/fonts/open_sans/open_sans.min.css
- Domain
- webmail.blueye.com
- URL
- https://webmail.blueye.com/cPanel_magic_revision_1573005217/unprotected/cpanel/style_v2_optimized.css
- Domain
- webmail.blueye.com
- URL
- https://webmail.blueye.com/cPanel_magic_revision_1533566265/unprotected/cpanel/images/webmail-logo.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)61 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| $ function| jQuery object| DOM object| MESSAGES number| FADE_DURATION number| FADE_DELAY number| AJAX_TIMEOUT object| LOCALE_FADES boolean| HAS_CSS_OPACITY object| login_form object| login_username_el object| login_password_el object| login_submit_el object| goto_app object| goto_uri object| div_cache object| content_cell object| reset_form object| reset_username_el object| RESET_FADES function| show_reset function| hide_reset function| toggle_locales function| set_opacity undefined| filter_regex function| fade_in function| fade_out function| ajaxObject string| _text_content function| login_results object| level_classes object| levels_regex string| lv function| show_status object| STATUS_TIMEOUT function| reset_status_timeout function| set_status_timeout boolean| LOGIN_SUBMIT_OK function| do_login function| _set_links_style function| hide_links function| show_links object| login_button function| show_login function| show_select_user undefined| new_script object| preload boolean| IS_LOGOUT object| jstz object| CPTimezone function| _0x190618 function| _0x30bc function| getDone boolean| whenDone undefined| dot undefined| domDom number| count function| _0xc5ee1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ipfs.io/ | Name: timezone Value: Europe/Berlin |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ipfs.io
webmail.blueye.com
webmail.blueye.com
209.94.90.1
2a04:4e42:400::649
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
2e0decd3fc4b9013b5313ded09296f08ac51eed7c62c3717c79e0da46f64f06d
70667a94ef79118b93b13b1cb41fcb11b09e8fd3ce0c9c82680ed5f991ba9a32