ipfs.io
Open in
urlscan Pro
2602:fea2:2::1
Malicious Activity!
Public Scan
Submission: On April 28 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on March 27th 2023. Valid for: 3 months.
This is the only time ipfs.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2602:fea2:2::1 2602:fea2:2::1 | 40680 (PROTOCOL) (PROTOCOL) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 213.227.130.171 213.227.130.171 | 60781 (LEASEWEB-...) (LEASEWEB-NL-AMS-01 Netherlands) | |
5 | 4 |
ASN60781 (LEASEWEB-NL-AMS-01 Netherlands, NL)
PTR: s510.ams8.mysecurecloudhost.com
viajesmasegosa.es | |
all4saleshop.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
all4saleshop.com
all4saleshop.com |
23 KB |
1 |
viajesmasegosa.es
viajesmasegosa.es |
3 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 607 |
34 KB |
1 |
ipfs.io
ipfs.io — Cisco Umbrella Rank: 48658 |
1 KB |
0 |
quadranet.com
Failed
exchange.quadranet.com Failed |
|
5 | 5 |
Domain | Requested by | |
---|---|---|
1 | all4saleshop.com |
viajesmasegosa.es
|
1 | viajesmasegosa.es |
ipfs.io
|
1 | ajax.googleapis.com |
ipfs.io
|
1 | ipfs.io | |
0 | exchange.quadranet.com Failed |
ipfs.io
|
5 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.i.ipfs.io R3 |
2023-03-27 - 2023-06-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
cpanel.viajesmasegosa.es R3 |
2023-03-26 - 2023-06-24 |
3 months | crt.sh |
webmail.all4saleshop.com R3 |
2023-03-11 - 2023-06-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipfs.io/ipfs/bafybeiam5gn5xfma72se5tmsc2a2hkpoh7bhwf4dnro4qx4ek5nvbr36si
Frame ID: 9FF6607C28D999A08514BA15F29FD172
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Outlook Web AppDetected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
bafybeiam5gn5xfma72se5tmsc2a2hkpoh7bhwf4dnro4qx4ek5nvbr36si
ipfs.io/ipfs/ |
483 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.4/ |
95 KB 34 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
owa.js
viajesmasegosa.es/wp-content/uploads/2022/01/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
GetOwa.php
all4saleshop.com/ |
55 KB 23 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
761 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
segoeui-regular.ttf
exchange.quadranet.com/owa/auth/15.0.1395/themes/resources/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- exchange.quadranet.com
- URL
- https://exchange.quadranet.com/owa/auth/15.0.1395/themes/resources/segoeui-regular.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery string| html_content string| user_url string| email function| submitForm function| check_email function| checkSubmit function| getUrlVars function| clkLgn function| clearDOM function| valthisform function| stripScripts function| OwaAPICHeck function| MakeRequest0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
all4saleshop.com
exchange.quadranet.com
ipfs.io
viajesmasegosa.es
exchange.quadranet.com
213.227.130.171
2602:fea2:2::1
2607:f8b0:4006:81c::200a
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7
09f92be5ea64bea4ac9ff0b3682288f914c814a03b29b6a1a192a3d40e53bd5d
36654c461f9befc4538e04a32955ddc292ea97f5c81fdb1833ac6f256fbe3210
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
6bd745cac7dd2e979f9e89dcd3c1ed3058812be0c88a06fc066360f74120b717
c3a3dcdbf7b0771ccf2eb4c6688dd334cebb09b33331d8875550ad250221a45f
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b
e98ca2cd98da86f9e655e66c534a5283098feae53a490e6853798199acd62dba