cloudflare-ipfs.com
Open in
urlscan Pro
104.17.64.14
Malicious Activity!
Public Scan
Effective URL: https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/
Submission: On May 10 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by E1 on April 24th 2024. Valid for: 3 months.
This is the only time cloudflare-ipfs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.68.68.54 54.68.68.54 | 16509 (AMAZON-02) (AMAZON-02) | |
1 2 | 67.223.118.114 67.223.118.114 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 5 | 104.17.64.14 104.17.64.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 18.173.187.113 18.173.187.113 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 192.229.133.221 192.229.133.221 | 15133 (EDGECAST) (EDGECAST) | |
5 | 2620:1ec:bdf::67 2620:1ec:bdf::67 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 8 |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-68-68-54.us-west-2.compute.amazonaws.com
clt1682891.benchurl.com |
ASN22612 (NAMECHEAP-NET, US)
PTR: server325-3.web-hosting.com
firstkeygroup.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-173-187-113.muc50.r.cloudfront.net
cdn.socket.io |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
aadcdn.msauth.net | |
logincdn.msauth.net |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 892 logincdn.msauth.net — Cisco Umbrella Rank: 3967 |
8 KB |
5 |
cloudflare-ipfs.com
1 redirects
cloudflare-ipfs.com |
11 KB |
2 |
firstkeygroup.com
1 redirects
firstkeygroup.com |
1 KB |
1 |
gstatic.com
www.gstatic.com |
3 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 909 |
1 KB |
1 |
w3schools.com
www.w3schools.com — Cisco Umbrella Rank: 18892 |
5 KB |
1 |
threemanshop.com
threemanshop.com |
34 KB |
1 |
socket.io
cdn.socket.io — Cisco Umbrella Rank: 36572 |
14 KB |
1 |
benchurl.com
1 redirects
clt1682891.benchurl.com |
153 B |
15 | 9 |
Domain | Requested by | |
---|---|---|
5 | cloudflare-ipfs.com |
1 redirects
firstkeygroup.com
cloudflare-ipfs.com |
4 | aadcdn.msauth.net | |
2 | firstkeygroup.com | 1 redirects |
1 | www.gstatic.com | |
1 | aadcdn.msftauth.net | |
1 | logincdn.msauth.net | |
1 | www.w3schools.com |
threemanshop.com
|
1 | threemanshop.com |
cloudflare-ipfs.com
|
1 | cdn.socket.io |
cloudflare-ipfs.com
|
1 | clt1682891.benchurl.com | 1 redirects |
15 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firstkeygroup.com Sectigo RSA Domain Validation Secure Server CA |
2024-01-06 - 2025-01-09 |
a year | crt.sh |
cloudflare-ipfs.com E1 |
2024-04-24 - 2024-07-23 |
3 months | crt.sh |
cdn.socket.io Amazon RSA 2048 M03 |
2023-10-22 - 2024-11-17 |
a year | crt.sh |
threemanshop.com GTS CA 1P5 |
2024-04-09 - 2024-07-08 |
3 months | crt.sh |
*.w3schools.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-04-03 - 2025-05-04 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2024-04-30 - 2025-04-30 |
a year | crt.sh |
identitycdn.msauth.net Microsoft Azure RSA TLS Issuing CA 03 |
2024-04-11 - 2025-04-06 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2024-04-16 - 2024-07-09 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/
Frame ID: 858A3748B1B351CE9A1064D7C14A76F2
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Authenticating ...Page URL History Show full URLs
-
https://clt1682891.benchurl.com/c/l?u=111069E6&e=18093D0&c=19ADCB&t=1&l=FA052187&email=qgs209jeu2PdzFC6uD293...
HTTP 302
https://firstkeygroup.com/well-known/m?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_me... HTTP 301
https://firstkeygroup.com/well-known/m/?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_m... Page URL
- https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=bt4de4a5I5_gHk_dinWHeBL5Nf._ia2rFyhFH3sWJhY-171536...
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ Page URL
Detected technologies
Socket.io (JavaScript Frameworks) ExpandDetected patterns
- socket\.io.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://clt1682891.benchurl.com/c/l?u=111069E6&e=18093D0&c=19ADCB&t=1&l=FA052187&email=qgs209jeu2PdzFC6uD293PvjvVxU1ApD&seq=1
HTTP 302
https://firstkeygroup.com/well-known/m?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_medium=email HTTP 301
https://firstkeygroup.com/well-known/m/?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_medium=email Page URL
- https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ Page URL
-
https://cloudflare-ipfs.com/cdn-cgi/phish-bypass?atok=bt4de4a5I5_gHk_dinWHeBL5Nf._ia2rFyhFH3sWJhY-1715367741-0.0.1.1-%2Fipfs%2Fbafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e%2F
HTTP 301
https://cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://clt1682891.benchurl.com/c/l?u=111069E6&e=18093D0&c=19ADCB&t=1&l=FA052187&email=qgs209jeu2PdzFC6uD293PvjvVxU1ApD&seq=1 HTTP 302
- https://firstkeygroup.com/well-known/m?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_medium=email HTTP 301
- https://firstkeygroup.com/well-known/m/?utm_source=BenchmarkEmail&utm_campaign=May_10_2024_Email&utm_medium=email
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
firstkeygroup.com/well-known/m/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cf.errors.css
cloudflare-ipfs.com/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
cloudflare-ipfs.com/cdn-cgi/images/ |
452 B 635 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
cloudflare-ipfs.com/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
socket.io.min.js
cdn.socket.io/4.6.0/ |
45 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jsnom.js
threemanshop.com/ |
198 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
w3.css
www.w3schools.com/w3css/4/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
logincdn.msauth.net/shared/1.0/content/images/ |
513 B 823 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_verify_code_b41922ebdaebec16b19999fc6054a15a.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_verify_sms_12b7d768ba76f2e782cc74e328171091.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
250 B 745 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_48.png
www.gstatic.com/recaptcha/api2/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer) Generic Cloudflare (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _0x2c16f1 function| _0x511a function| _0x3d83 object| sc string| sfc0997d18917c076d0b0fcdd2250edaa73aa7381 object| s86faaddaea949234c3ca7eb3843cefec1af9dc4b_663ac881563fccda9bfb79dbc3e47b6af5653419 function| io function| _0x4986 function| _0x32f82 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cloudflare-ipfs.com/ | Name: __cf_mw_byp Value: bt4de4a5I5_gHk_dinWHeBL5Nf._ia2rFyhFH3sWJhY-1715367741-0.0.1.1-/ipfs/bafkreifdwx4lnpygarrbbjyoqznwxytf3flvxxlleiwtpd25ov4n4n6j6e/ |
|
cloudflare-ipfs.com/ | Name: __cf_bm Value: dyLPRt.0VmWBZxKK.dhioSpIJV.KIayitMaYpmAfFxA-1715367746-1.0.1.1-HebpyUwF8ontGk.Ya9nCxTSGEkUurMCIrCP3hMTbgc1OzcYWg.3mPATy0ZodsArENOJgXZUgU38c7ikPGvbvYw |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msftauth.net
cdn.socket.io
cloudflare-ipfs.com
clt1682891.benchurl.com
firstkeygroup.com
logincdn.msauth.net
threemanshop.com
www.gstatic.com
www.w3schools.com
104.17.64.14
18.173.187.113
192.229.133.221
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2620:1ec:bdf::67
2a00:1450:4001:81d::2003
2a06:98c1:3121::3
54.68.68.54
67.223.118.114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