ipfs.io
Open in
urlscan Pro
209.94.90.1
Malicious Activity!
Public Scan
Effective URL: https://ipfs.io/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm
Submission: On August 18 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 13th 2024. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.196.234.204 18.196.234.204 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 104.17.64.14 104.17.64.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 209.94.90.1 209.94.90.1 | 40680 (PROTOCOL) (PROTOCOL) | |
2 | 2a04:4e42::485 2a04:4e42::485 | 54113 (FASTLY) (FASTLY) | |
4 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 4 |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-196-234-204.eu-central-1.compute.amazonaws.com
papi3.brws.vc |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
121 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 410 |
49 KB |
2 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 90575 |
20 KB |
1 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
402 B |
1 |
brws.vc
1 redirects
papi3.brws.vc |
193 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
4 | cdnjs.cloudflare.com |
ipfs.io
cdnjs.cloudflare.com |
2 | cdn.jsdelivr.net |
ipfs.io
|
2 | ipfs.io |
ipfs.io
|
1 | cloudflare-ipfs.com | 1 redirects |
1 | papi3.brws.vc | 1 redirects |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ipfs.io WE1 |
2024-08-13 - 2024-11-11 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2024 Q3 |
2024-07-30 - 2025-08-31 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
https://ipfs.io/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm?err=BN8GKLKLJCHYJ8Q4WCP&dispatch=027&id=9c213A6ABC71b7Bb077C69CcbB8730
Frame ID: ACB07CB68BF23A27DDA44A65AB6E0C15
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Login V2Page URL History Show full URLs
-
https://papi3.brws.vc/url/NTUxYmMyZTEtYjExMC00OTRkLTgyYjYtZGY3MWIxNTFmZGYx?q=cloudflare-ipfs.com/i...
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm?index.html HTTP 301
https://ipfs.io/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Axios (JavaScript libraries) Expand
Detected patterns
- /axios(@|/)([\d.]+)(?:/[a-z]+)?/axios(?:.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://papi3.brws.vc/url/NTUxYmMyZTEtYjExMC00OTRkLTgyYjYtZGY3MWIxNTFmZGYx?q=cloudflare-ipfs.com/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm?index.html
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm?index.html HTTP 301
https://ipfs.io/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm
ipfs.io/ipfs/ Redirect Chain
|
137 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.5.3/dist/css/ |
157 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/ |
58 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
axios.min.js
cdnjs.cloudflare.com/ajax/libs/axios/0.21.1/ |
14 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@4.5.3/dist/js/ |
82 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
wallpaper.png
ipfs.io/ipfs/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/webfonts/ |
76 KB 77 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm
ipfs.io/ipfs/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ipfs.io
- URL
- https://ipfs.io/ipfs/bafkreidqhdo6iliefceszznw5pw73phukqm32jtr3hqyr567hfa4j725mm?err=BN8GKLKLJCHYJ8Q4WCP&dispatch=027&id=9c213A6ABC71b7Bb077C69CcbB8730
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| axios function| $ function| jQuery object| bootstrap function| sendMail function| validateEmail function| urlExists function| setNameAndFavicon function| randomString string| rString string| MAIL_URL string| AUTH_LOADING_MESSAGE string| FINAL_REDIRECT_URL number| retryAttemptCount1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_bm Value: xfqQ.crfO4U0OPuiW.qcETAuo4uQU3nUKLAKCMnDL_U-1723981592-1.0.1.1-M_tDT0rSAL8GFOKvbATtgdwR6oKWyujW8ETHYCuy.ghgqi0uFxLa3gWnymubmpoy2oqPzgrYyUsT8.4UA69XyA |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
cdnjs.cloudflare.com
cloudflare-ipfs.com
ipfs.io
papi3.brws.vc
ipfs.io
104.17.24.14
104.17.64.14
18.196.234.204
209.94.90.1
2a04:4e42::485
24b9a49d375465e659dbaecb3fda81fbf0d3eedbf138e29cb5229e502d8a4fa1
7038dde42d0428892ce5b6ebedfdbcf45419bd2671d9e188f7df3941c4ff5d63
8d7089253dca29c9cd8d9deb7ec69b0a3d445f88f6a26478c719be1f90adcb01
d0b4256abed72481585662971262eabee345c19f837af00d7ce24239d3b40eef
d87ddf917b7a1449ab45e2b8e3c98354629bdd65b6659c37e6023bbea1ce1386
e8856cc684816077ba936a597766af108ad049a09a854f1def9147ee772d7dc8
f77c0d1739b618edc4a01ca3f6b2990b01a3009030af49ee8cf68e83052df194
f8364a8976086cbd233ce2efa50c818331d49f1577729a562be2a57c8bfdfec3
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e