![](/screenshots/e0d36160-cb51-402a-ac8f-2dbbb4e5d779.png)
ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa
Submission: On July 14 via api from LU — Scanned from IT
Summary
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 104.17.96.13 104.17.96.13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 151.101.66.137 151.101.66.137 | 54113 (FASTLY) (FASTLY) | |
2 | 142.250.185.161 142.250.185.161 | 15169 (GOOGLE) (GOOGLE) | |
6 | 5 |
ASN15169 (GOOGLE, US)
PTR: fra16s51-in-f1.1e100.net
lh3.googleusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
googleusercontent.com
lh3.googleusercontent.com — Cisco Umbrella Rank: 110 |
193 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 736 |
78 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 240 |
14 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 108253 |
15 KB |
1 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
379 B |
0 |
lopapscop.ws
Failed
ekvxde96lb.lopapscop.ws Failed |
|
6 | 6 |
Domain | Requested by | |
---|---|---|
2 | lh3.googleusercontent.com | |
1 | code.jquery.com |
ipfs.io
|
1 | cdnjs.cloudflare.com |
ipfs.io
|
1 | ipfs.io | |
1 | cloudflare-ipfs.com | 1 redirects |
0 | ekvxde96lb.lopapscop.ws Failed |
code.jquery.com
|
6 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.io WE1 |
2024-06-14 - 2024-09-12 |
3 months | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
*.googleusercontent.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa
Frame ID: 4260E52146DF4B5BBE1D6D4324CE6E12
Requests: 6 HTTP requests in this frame
Screenshot
![](/screenshots/e0d36160-cb51-402a-ac8f-2dbbb4e5d779.png)
Page URL History Show full URLs
-
https://cloudflare-ipfs.com/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa
HTTP 301
https://ipfs.io/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa Page URL
Detected technologies
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cloudflare-ipfs.com/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa
HTTP 301
https://ipfs.io/ipfs/bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bafkreiea3a4n3ttdfujbc3rmnytl3klwq45cvrqmhnnwmczepk5wuavkaa
ipfs.io/ipfs/ Redirect Chain
|
28 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/ |
47 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.9.1.js
code.jquery.com/ |
262 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AJFCJaXhZo6cUCNh1ssNQzSV3jc1ppd5Vt2HN5GjHL82rJR25OrOigrMWVvBpwQN6BD4T_qHdwh2spOZ9bKA-BqcHsttYMUy5sxc-E99nKe9pgDJsCX0icydpRhjm97W_S4_6cism2sTCOp-Oxa807yjCEw=w1580-h720-s-no
lh3.googleusercontent.com/pw/ |
192 KB 193 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AMWts8CjWLE-4lSHnzZVyyi38RiG_iHUev92wvk3GXVlZur4_v68tJc5TxPcsfc6Vo4P2_Sa5_Dg4wBjO9x0q0xYFQKyjpg1zURhvOLxyPhDhPJg_Z8XDFduSWtavIhhZp_z9dX4zrOp2jk9GCWUmL_6qus=s128-no
lh3.googleusercontent.com/pw/ |
330 B 647 B |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST |
/
ekvxde96lb.lopapscop.ws/obufsssssssscaaatoion/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ekvxde96lb.lopapscop.ws
- URL
- https://ekvxde96lb.lopapscop.ws/obufsssssssscaaatoion/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CryptoJS string| encrypted string| key string| iv object| keyBytes object| ivBytes object| decrypted string| decryptedString object| s object| _0x129a string| IGOBZL string| kaka90nal string| ka45k459final2 string| kak0011afinal number| countttingerr function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: nqOkU1Uk_RvDxzMhuXgR9pGYL2xtsJVkQZA2apojvD8-1720932463-1.0.1.1-VdPp6xmuk9207pnh3r5_1zdIaVuaWzrGjiqv95e1TQLh8HpZ9.q8Jl.8aU8eWD83QFF9CoV2AGrwonz6.wu_hA |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
cloudflare-ipfs.com
code.jquery.com
ekvxde96lb.lopapscop.ws
ipfs.io
lh3.googleusercontent.com
ekvxde96lb.lopapscop.ws
104.17.25.14
104.17.96.13
142.250.185.161
151.101.66.137
209.94.90.1
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
80d838ddce632d12116e2c6e26bda976873a2ac60c3b5b660b247abb6a02aa00
8e3b0117f4df4be452c0b6af5b8f0a0acf9d4ade23d08d55d7e312af22077762
c51ecfdbb39612d629bbbfa57896c63dc52971d7bcf78f1795944be16274a8eb
fea8fbaec75213e1af8005edfcdc94e7b5d7dca6ddb4e262d66e4756bda96d54