cloudflare-ipfs.com
Open in
urlscan Pro
2606:4700::6811:400e
Malicious Activity!
Public Scan
Submission: On March 23 via api from BY — Scanned from DE
Summary
TLS certificate: Issued by E1 on February 25th 2024. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online) Microsoft (Consumer) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 2606:4700::68... 2606:4700::6811:400e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:440... 2606:4700:4400::ac40:93bc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 54.87.211.83 54.87.211.83 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2620:1ec:bdf::45 2620:1ec:bdf::45 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2606:4700:e6:... 2606:4700:e6::ac40:cc14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 151.101.66.132 151.101.66.132 | 54113 (FASTLY) (FASTLY) | |
20 | 11 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-87-211-83.compute-1.amazonaws.com
weak-root-tartan.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 3290 ka-f.fontawesome.com — Cisco Umbrella Rank: 7004 |
188 KB |
5 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
11 KB |
3 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1217 |
132 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 ajax.googleapis.com — Cisco Umbrella Rank: 716 |
31 KB |
1 |
glitch.global
cdn.glitch.global — Cisco Umbrella Rank: 452459 |
17 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1828 |
14 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 387 |
7 KB |
1 |
msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 2249 |
17 KB |
1 |
glitch.me
weak-root-tartan.glitch.me |
151 KB |
20 | 9 |
Domain | Requested by | |
---|---|---|
5 | ka-f.fontawesome.com |
kit.fontawesome.com
cloudflare-ipfs.com |
5 | cloudflare-ipfs.com |
1 redirects
cloudflare-ipfs.com
|
3 | code.jquery.com |
cloudflare-ipfs.com
|
1 | cdn.glitch.global |
cloudflare-ipfs.com
|
1 | maxcdn.bootstrapcdn.com |
cloudflare-ipfs.com
|
1 | cdnjs.cloudflare.com |
cloudflare-ipfs.com
|
1 | ajax.googleapis.com |
cloudflare-ipfs.com
|
1 | aadcdn.msauth.net |
cloudflare-ipfs.com
|
1 | weak-root-tartan.glitch.me |
cloudflare-ipfs.com
|
1 | kit.fontawesome.com |
cloudflare-ipfs.com
|
1 | fonts.googleapis.com |
cloudflare-ipfs.com
|
20 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cloudflare-ipfs.com E1 |
2024-02-25 - 2024-05-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-02-26 - 2024-05-20 |
3 months | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-12-04 - 2025-01-03 |
a year | crt.sh |
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2024-01-29 - 2025-01-29 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-01-28 - 2024-04-27 |
3 months | crt.sh |
ka-f.fontawesome.com GTS CA 1P5 |
2024-03-05 - 2024-06-03 |
3 months | crt.sh |
cdn.glitch.global R3 |
2024-01-31 - 2024-04-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html
Frame ID: 1B7153AF1DB2497E24EBF068185B0F82
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
Microsoft | LoginPage URL History Show full URLs
- https://cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=hn12IR7ROMdNno7XXzS8KJJtokkEmUDhWQhhsS6HYKc-171118...
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=hn12IR7ROMdNno7XXzS8KJJtokkEmUDhWQhhsS6HYKc-1711186007-0.0.1.1-%2Fipfs%2Fbafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq%2Foutlook.html
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
outlook.html
cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
cloudflare-ipfs.com/cdn-cgi/images/ |
452 B 540 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
outlook.html
cloudflare-ipfs.com/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/ Redirect Chain
|
15 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 903 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b0ed66295e.js
kit.fontawesome.com/ |
12 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
weak-root-tartan.glitch.me/ |
151 KB 151 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon_a_eupayfgghqiai7k9sol6lg2.ico
aadcdn.msauth.net/ests/2.1/content/images/ |
17 KB 17 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.js
code.jquery.com/ |
265 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
101 KB 23 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
27 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v5-font-face.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
823 B 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-font-face.min.css
ka-f.fontawesome.com/releases/v6.5.1/css/ |
2 KB 1 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
big.jfif
cdn.glitch.global/3d84498b-ce05-4ed1-b6d4-eca1b12d557e/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-fa-solid-900.woff2
ka-f.fontawesome.com/releases/v6.5.1/webfonts/ |
153 KB 153 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online) Microsoft (Consumer) Generic Cloudflare (Online)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| FontAwesomeKitConfig undefined| _z9TJMJ0kC__2UPtMy object| _NG string| _2A string| _VzR string| _JVbl string| _G7Y string| _9Ikq string| _5Jn7 string| _u4 string| _MM6 string| _Fh0 number| _syLx string| _La number| _p74h function| $ function| jQuery function| Popper object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_mw_byp Value: hn12IR7ROMdNno7XXzS8KJJtokkEmUDhWQhhsS6HYKc-1711186007-0.0.1.1-/ipfs/bafybeiheswucszndkhqhsqug6awgiiejkb5qwgqp3syh7xn5glogqn7ziq/outlook.html |
|
cloudflare-ipfs.com/ | Name: __cf_bm Value: rjnbAEQYQi6T2n8HTR9ziAxjc57fCKNaxPNqRjmQiSQ-1711186013-1.0.1.1-_n9ECkUxczTPLzca.YUF2CZTqLp23a1H60rB2KQ7pWQXpqdEh1OHJdLEJbxBpHE2tjm1cElAhHSStbd6HelIwA |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
ajax.googleapis.com
cdn.glitch.global
cdnjs.cloudflare.com
cloudflare-ipfs.com
code.jquery.com
fonts.googleapis.com
ka-f.fontawesome.com
kit.fontawesome.com
maxcdn.bootstrapcdn.com
weak-root-tartan.glitch.me
151.101.66.132
2606:4700:4400::ac40:93bc
2606:4700::6811:180e
2606:4700::6811:400e
2606:4700::6812:bcf
2606:4700:e6::ac40:cc14
2620:1ec:bdf::45
2a00:1450:4001:800::200a
2a00:1450:4001:803::200a
2a04:4e42:600::649
54.87.211.83
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
14493b458a88499830fdddfe3b8cfdfffbfb6421b2c484365e17142c1e77b8f1
5031c11dd77875afefe4eeddfaa320af07fdccea327f7416a5ee8980674c9c76
6530f32fa70a330cd76547497f20048ae081dcc897af26befc84600357ba06be
674d14e12049349e0cf4df9ed8cb7f4dca59c3e04d3aca627e1da6389e80723f
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
a93f7f459e0dabc5d86e6b6e3936c07d2dd02b52369f26bb7e8c0005a5d26368
aae65c231008861c6430ebe296c926e728c4d2ccb1492f86e42d760e9b67d9a5
b0e730aae2ce864abc2b5d92511ccefbb5b8806bdce7ec6c534f5146d5eb6242
b2bfe99e2e78f71c88eb00c49e1392a15531fb6486d0d0c2ea71937dda34deab
cef6b9bd0f179dfdd7143a323d2c7bd80b9f006eb6e1380b8e64bf6cb1e5183b
d8aa24ecc6cecb1a60515bc093f1c9da38a0392612d9ab8ae0f7f36e6eee1fad
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
f581083ac72ae169a698cd0cb7f02d8bb2e079844bfad68cc98df5b3c4692408