cloudflare-ipfs.com
Open in
urlscan Pro
104.17.96.13
Malicious Activity!
Public Scan
Submission: On August 20 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 20th 2024. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 104.17.96.13 104.17.96.13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.18.30.78 104.18.30.78 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:e606 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 151.101.194.6 151.101.194.6 | 54113 (FASTLY) (FASTLY) | |
1 | 2a02:26f0:710... 2a02:26f0:7100::213:c673 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2606:4700::68... 2606:4700::6812:1f13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2600:9000:20a... 2600:9000:20ae:8400:1b:9b5:7e00:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
16 | 8 |
ASN20940 (AKAMAI-ASN1, NL)
cedexis-test.akamaized.net |
ASN16509 (AMAZON-02, US)
p29.cedexis-test.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
17 KB |
2 |
cedexis-test.com
fastly.cedexis-test.com — Cisco Umbrella Rank: 16759 p29.cedexis-test.com — Cisco Umbrella Rank: 17211 |
201 KB |
2 |
cloudflare.com
performance.radar.cloudflare.com — Cisco Umbrella Rank: 82989 invalid.rpki.cloudflare.com Failed valid.rpki.cloudflare.com — Cisco Umbrella Rank: 346817 |
4 KB |
1 |
compute-pipe.com
benchmarks.cdn.compute-pipe.com — Cisco Umbrella Rank: 220782 |
100 KB |
1 |
akamaized.net
cedexis-test.akamaized.net — Cisco Umbrella Rank: 247090 |
100 KB |
0 |
1e100cdn.net
Failed
benchmark.1e100cdn.net Failed |
|
16 | 6 |
Domain | Requested by | |
---|---|---|
9 | cloudflare-ipfs.com |
1 redirects
cloudflare-ipfs.com
|
1 | p29.cedexis-test.com | |
1 | benchmarks.cdn.compute-pipe.com | |
1 | cedexis-test.akamaized.net | |
1 | fastly.cedexis-test.com | |
1 | valid.rpki.cloudflare.com |
performance.radar.cloudflare.com
|
1 | performance.radar.cloudflare.com |
cloudflare-ipfs.com
|
0 | benchmark.1e100cdn.net Failed | |
0 | invalid.rpki.cloudflare.com Failed |
performance.radar.cloudflare.com
|
16 | 9 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
cloudflare-ipfs.com WE1 |
2024-08-20 - 2024-11-18 |
3 months | crt.sh |
radar.cloudflare.com E6 |
2024-07-18 - 2024-10-16 |
3 months | crt.sh |
rpki.cloudflare.com WE1 |
2024-08-11 - 2024-11-09 |
3 months | crt.sh |
fastly.cedexis-test.com GlobalSign Atlas R3 DV TLS CA 2024 Q1 |
2024-04-03 - 2025-05-05 |
a year | crt.sh |
a248.e.akamai.net DigiCert TLS RSA SHA256 2020 CA1 |
2024-04-18 - 2025-04-19 |
a year | crt.sh |
benchmarks.cdn.compute-pipe.com WE1 |
2024-08-17 - 2024-11-15 |
3 months | crt.sh |
p29.cedexis-test.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-01-10 - 2025-01-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4
Frame ID: 7318AB906625C5070733A56B8CFA85D5
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Access deniedPage URL History Show full URLs
- https://cloudflare-ipfs.com/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4 Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=ZDXmB9rpIx41WrFjLDN0jPhYJI2KAQaWbGr_kVxZj0Q-172416...
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4 Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://cloudflare-ipfs.com/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4 Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=ZDXmB9rpIx41WrFjLDN0jPhYJI2KAQaWbGr_kVxZj0Q-1724161237-0.0.1.1-%2Fipfs%2Fbafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4
cloudflare-ipfs.com/ipfs/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
cloudflare-ipfs.com/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
cloudflare-ipfs.com/ |
6 KB 2 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4
cloudflare-ipfs.com/ipfs/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
beacon.js
performance.radar.cloudflare.com/ |
8 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
external.png
cloudflare-ipfs.com/cdn-cgi/images/ |
265 B 448 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
187 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
invalid.rpki.cloudflare.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
cloudflare-ipfs.com/ |
6 KB 2 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
valid.rpki.cloudflare.com/ |
60 B 517 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
r20-100KB.png
fastly.cedexis-test.com/img/20367/ |
100 KB 101 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
r20-100KB.png
cedexis-test.akamaized.net/img/ |
100 KB 100 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
r20-100KB.png
benchmarks.cdn.compute-pipe.com/ |
100 KB 100 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
r20-100KB.png
p29.cedexis-test.com/img/ |
100 KB 101 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
r20-100KB.png
benchmark.1e100cdn.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- invalid.rpki.cloudflare.com
- URL
- https://invalid.rpki.cloudflare.com/?r=58243825
- Domain
- benchmark.1e100cdn.net
- URL
- https://benchmark.1e100cdn.net/r20-100KB.png?r=50300581
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: H0kyOcgyCcUCMxP4l1FXMcRhj36jcZOn61wzcro4KhE-1724161238-1.0.1.1-sKUTnjB7RiVeGs_D6bmvs1ECbovZpXzRKJg2kfh2K76B1cfc3NOkImb6nmtJI6OHoSP4XZHB_62yNqKX4f8d3g |
|
cloudflare-ipfs.com/ | Name: __cf_mw_byp Value: ZDXmB9rpIx41WrFjLDN0jPhYJI2KAQaWbGr_kVxZj0Q-1724161237-0.0.1.1-/ipfs/bafybeigkgo5zisyhn5lybmkwij44qun66wnyee2udueafp6alujhx264q4 |
|
.radar.cloudflare.com/ | Name: __cf_bm Value: VaIrXptvrbRO7KwUdI4zkYI0m2FPFopy_YMjZtVoecw-1724161242-1.0.1.1-Qsg1BsaOvaF7szohEKs_nIn1CORY5pHaCCG9casvlHgYO5I2foxG0oSUrJPn4TcPGoj31u5.Pjzm57vAOa3r3Q |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
benchmark.1e100cdn.net
benchmarks.cdn.compute-pipe.com
cedexis-test.akamaized.net
cloudflare-ipfs.com
fastly.cedexis-test.com
invalid.rpki.cloudflare.com
p29.cedexis-test.com
performance.radar.cloudflare.com
valid.rpki.cloudflare.com
benchmark.1e100cdn.net
invalid.rpki.cloudflare.com
104.17.96.13
104.18.30.78
151.101.194.6
2600:9000:20ae:8400:1b:9b5:7e00:93a1
2606:4700::6811:e606
2606:4700::6812:1f13
2a02:26f0:7100::213:c673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