cloudflare-ipfs.com Open in urlscan Pro
104.17.64.14  Malicious Activity! Public Scan

Submitted URL: http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html
Effective URL: https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
Submission: On September 06 via automatic, source openphish — Scanned from CA

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 104.17.64.14, located in and belongs to CLOUDFLARENET, US. The main domain is cloudflare-ipfs.com.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 29th 2022. Valid for: a year.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Naver (Online)

Domain & IP information

IP Address AS Autonomous System
1 79.141.166.233 201525 (HZ-CA-AS)
1 104.17.64.14 13335 (CLOUDFLAR...)
2 3
Apex Domain
Subdomains
Transfer
1 cloudflare-ipfs.com
cloudflare-ipfs.com
154 KB
1 run.place
user.urtyu.kilot.mutyki.run.place
576 B
2 2
Domain Requested by
1 cloudflare-ipfs.com user.urtyu.kilot.mutyki.run.place
1 user.urtyu.kilot.mutyki.run.place
2 2

This site contains links to these domains. Also see Links.

Domain
www.naver.com
nid.naver.com
m.site.naver.com
help.naver.com
www.navercorp.com
Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-11-29 -
2023-11-29
a year crt.sh

This page contains 1 frames:

Primary Page: https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
Frame ID: CF09D10590A290A715DF5562574910C5
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

네이버 : 로그인....

Page URL History Show full URLs

  1. http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html Page URL
  2. https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/ Page URL

Page Statistics

2
Requests

50 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

154 kB
Transfer

373 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html Page URL
  2. https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
index.html
user.urtyu.kilot.mutyki.run.place/stv/nav/
308 B
576 B
Document
General
Full URL
http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html
Protocol
HTTP/1.1
Server
79.141.166.233 Toronto, Canada, ASN201525 (HZ-CA-AS, BG),
Reverse DNS
acoverter.store
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.179 Safari/537.36
accept-language
en-CA,en;q=0.9

Response headers

Accept-Ranges
bytes
Connection
Upgrade, Keep-Alive
Content-Encoding
gzip
Content-Length
229
Content-Type
text/html
Date
Wed, 06 Sep 2023 16:30:32 GMT
ETag
"134-604a6df76581a-gzip"
Keep-Alive
timeout=5, max=100
Last-Modified
Wed, 06 Sep 2023 01:43:40 GMT
Server
Apache
Upgrade
h2,h2c
Vary
Accept-Encoding
Primary Request /
cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
221 KB
154 KB
Document
General
Full URL
https://cloudflare-ipfs.com/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
Requested by
Host: user.urtyu.kilot.mutyki.run.place
URL: http://user.urtyu.kilot.mutyki.run.place/stv/nav/index.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.64.14 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
efa2df13da0fa1043fe6d4fa6cff2c6ff2f908c9708b65b905602822870c6737

Request headers

Referer
http://user.urtyu.kilot.mutyki.run.place/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.179 Safari/537.36
accept-language
en-CA,en;q=0.9

Response headers

access-control-allow-headers
Content-Type Range User-Agent X-Requested-With
access-control-allow-methods
GET
access-control-allow-origin
*
access-control-expose-headers
Content-Length Content-Range X-Chunked-Output X-Ipfs-Path X-Ipfs-Roots X-Stream-Output
age
24305
alt-svc
h3=":443"; ma=86400
cache-control
public, max-age=29030400, immutable
cf-cache-status
HIT
cf-ray
802818e019d536d2-YYZ
content-encoding
br
content-type
text/html
date
Wed, 06 Sep 2023 16:30:33 GMT
etag
W/"bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq"
server
cloudflare
vary
Accept-Encoding
x-cf-ipfs-cache-status
hit
x-ipfs-path
/ipfs/bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq/
x-ipfs-roots
bafybeiaoybcrfgs43tpuoeaiw3cf5zb5xi6cyedci2hg5bu24wk7xpq3kq
truncated
/
13 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8a92d63d31496759a0f4938e99d55e01f1d12893572e0953167faa3481b91cfb

Request headers

accept-language
en-CA,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.179 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
75 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f58f114b9d173c25cc4bb0139fbc52a62a6b868cbb0fbb9b456fc346696a807f

Request headers

accept-language
en-CA,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.179 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
65 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9e8bb6edada840a04fab1e17e14596fb9fcdea4019297a8596e887183829efc

Request headers

accept-language
en-CA,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.179 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Naver (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

1 Cookies

Domain/Path Name / Value
cloudflare-ipfs.com/ Name: __cf_bm
Value: FRguQuHN6x06KcUFWzajYpKB84HwoN3N5K2RGJhtXaM-1694017833-0-AYKNq/xYZzsQihP0cQqmM+ZbKgaLxuX86wLZ8E28z39S1+cMwZuuUJJsrd64jbIhYYGhM6FFHsntmHzn+u4QoqI=