| app-aave-com.ipns.dweb.link/_next/static/chunks/3629-beffcb1d37e29d12.js | 209.94.90.3 | 200 OK | 108 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/3629-beffcb1d37e29d12.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (9876), with no line terminators Size108 kB (107747 bytes) Hash009eae380d18e68d02fd3b1efe0b3979 f16f04e668de6b1960b8e060a897aaad24b7dc69 3b970de2228a8dfad7880cca281e91db8db698e103b8925638915287aef6032f
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/3629-beffcb1d37e29d12.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreib3s4g6eiukrx5npcamziub5eo3rw3jryidxcjfmoerkkd255qdf4"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/3629-beffcb1d37e29d12.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreib3s4g6eiukrx5npcamziub5eo3rw3jryidxcjfmoerkkd255qdf4
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8ced5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8019-7233b42ab9ef6fe6.js | 209.94.90.3 | 200 OK | 103 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8019-7233b42ab9ef6fe6.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (13675), with no line terminators Size103 kB (103213 bytes) Hashe10d7fcea044c91dd86128c0589dd6a0 9ff2045cf1f007ee354aa03782b9734c19f0893b e31e8b1810f2e28e0ea27e23ecb7ef6b2d5a0019172ab1628e0d4310066c5727
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8019-7233b42ab9ef6fe6.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihdd2frqehs4kha5it6epwlp33lfvnaagixfkywfdqnimiam3cxe4"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8019-7233b42ab9ef6fe6.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreihdd2frqehs4kha5it6epwlp33lfvnaagixfkywfdqnimiam3cxe4
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cf35684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4284-bbf96c7bcf282a59.js | 209.94.90.3 | 200 OK | 110 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4284-bbf96c7bcf282a59.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (13036), with no line terminators Size110 kB (110049 bytes) Hash537c1a15cf24097c4dc8f54c8f467f1b 0a00875515d03b65dca77210eb0ef822a6133684 6c386cc711ba1b3fe2360f6e6475a7cecd2ae5d8c1c45fc617582d6046193691
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4284-bbf96c7bcf282a59.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidmhbwmoen2dm76enqpnzshlj6ozuvolwgbyrp4mf2yfvqemgjwse"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4284-bbf96c7bcf282a59.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidmhbwmoen2dm76enqpnzshlj6ozuvolwgbyrp4mf2yfvqemgjwse
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b9cfb5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/index-5c55ce06141b7657.js | 209.94.90.3 | 200 OK | 133 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/index-5c55ce06141b7657.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Size133 kB (132946 bytes) Hashf82fe3bb636fef6a856e1768c47ba4e5 fdf1e276e3d45b896dd7e29e181a87c300eff1d9 e4f204b4cc4d83a0d642c453a1a62cf26343b21b8ddb35d251fa47fa32ac3b15
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/index-5c55ce06141b7657.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihe6icljtcnqoqnmqwekoq2mlhsmnb3eg4n3m25eup2i75dflb3cu"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/index-5c55ce06141b7657.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafkreihe6icljtcnqoqnmqwekoq2mlhsmnb3eg4n3m25eup2i75dflb3cu
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b9cfc5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7604-eabb8e5b8018f878.js | 209.94.90.3 | 200 OK | 31 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7604-eabb8e5b8018f878.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (15005), with no line terminators Hash3aaf9cc76ee4ba3cf674fa5eee750fae 2c64d9fbd26f628d70f38bf59e65ac65d0a588c4 ce83aa73d449364b8dadb5539e750c4517174396eaf2f8c8b531633ed57c07db
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7604-eabb8e5b8018f878.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigoqovhhvcjgzfy3lnvkophkdcfc4luhfxk6l4mrnjrmm7nk7ah3m"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7604-eabb8e5b8018f878.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreigoqovhhvcjgzfy3lnvkophkdcfc4luhfxk6l4mrnjrmm7nk7ah3m
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b9cfa5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/icons/flags/el.svg | 209.94.90.3 | 200 OK | 795 B |
URL GET HTTP/3app-aave-com.ipns.dweb.link/icons/flags/el.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Hash1f4b4f940aca49012d8d6d27ec05eeb7 08207179bcafd60964874a09b6428c8915aeb76d e0c660872d4ff92f71591408db5be729e4e863907ce6906be0a794a83660fec8
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /icons/flags/el.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihayzqiolkp7exxcwiubdnvxzzj4tughed442igxyfhssudmyh6za"
last-modified: Sat, 27 Apr 2024 03:53:33 GMT
x-ipfs-path: /ipns/app.aave.com/icons/flags/el.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeig3gyfey2cvkgtdeyklommqqwwsiwdiuxrnhyhxqmdojzxzf2p22a,bafybeih4p4nhrhou7h6t7ficolttjj57f6mutgszdzy3wyacr2i2nnc65m,bafkreihayzqiolkp7exxcwiubdnvxzzj4tughed442igxyfhssudmyh6za
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a278055684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/aaveLogo.svg | 209.94.90.3 | 200 OK | 54 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/aaveLogo.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Hasheea03772efc06a350f82c9392f239bac b71fa591b8ab4debb69d7119d2efd96508d83d77 957755dc5613e30463d0018f158eb50b70c2901cf1051e01bb67f9ec6b662194
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /aaveLogo.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreievo5k5yvqt4mcghuabr4ky5nilodbjahhraupado3h7hwgwzrbsq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/aaveLogo.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafkreievo5k5yvqt4mcghuabr4ky5nilodbjahhraupado3h7hwgwzrbsq
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339bad055684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1573-73b9595d97d74de8.js | 209.94.90.3 | 200 OK | 5.0 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1573-73b9595d97d74de8.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (14192), with no line terminators Hashd564bebdb37752d4783dd0f7d617163f c150296e1aa4068bd588541adb4ef95363fd9eed b707defeb00a49e6ce1733111be7d61e6c189cd74a082651d4876c9a5bae2839
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1573-73b9595d97d74de8.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifxa7pp5makjhtm4fztcen6pvq6nqmjzv2kbatfdvehnsnfxlrihe"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1573-73b9595d97d74de8.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreifxa7pp5makjhtm4fztcen6pvq6nqmjzv2kbatfdvehnsnfxlrihe
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cec5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| eth-mainnet.rpc.grove.city/v1/62b3314e123e6f00397f19ca | 34.36.6.252 | 200 OK | 147 B |
URL OPTIONS HTTP/2eth-mainnet.rpc.grove.city/v1/62b3314e123e6f00397f19ca IP34.36.6.252:443 ASN#396982 GOOGLE-CLOUD-PLATFORM
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subject*.rpc.grove.city Fingerprint0F:5F:34:0F:B7:FC:59:FB:DC:BB:F2:03:E8:A2:0C:1A:62:6D:EE:40 ValidityWed, 06 Mar 2024 15:45:08 GMT - Tue, 04 Jun 2024 15:45:07 GMT
Hash02b6b29615ae8bf18ae4b91dac5e3549 65a0775cadb062b7d6de2441659495b68aa28553 49c29edef32408e80a0e1e231def0a9176570404185aaf9dc19f35ab9c6e1fbe
OPTIONS /v1/62b3314e123e6f00397f19ca HTTP/1.1
Host: eth-mainnet.rpc.grove.city
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Access-Control-Request-Method: POST
Access-Control-Request-Headers: content-type
Referer: https://app-aave-com.ipns.dweb.link/
Origin: https://app-aave-com.ipns.dweb.link
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
access-control-allow-headers: Content-Type, solana-client
access-control-allow-methods: GET, POST
access-control-allow-origin: *
content-type: application/json
date: Sat, 27 Apr 2024 04:52:11 GMT
content-length: 147
via: 1.1 google
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Firefox-Spdy: h2
|
|
| app-aave-com.ipns.dweb.link/icons/networks/ethereum.svg | 209.94.90.3 | 200 OK | 5.1 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/icons/networks/ethereum.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Hash19b416d849cab8e380747a535a5ffdc6 deae4f450ebae10fb8609d1e70f5af9201d743f8 1bacf67cf153ed11df37509111e853b92c09e2f15ae25d3052a3b550e87ee7c8
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /icons/networks/ethereum.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreia3vt3hz4kt5ui56n2qsei6qu5zfqe6f4k24jotauvdwvioq7xhza"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/icons/networks/ethereum.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeig3gyfey2cvkgtdeyklommqqwwsiwdiuxrnhyhxqmdojzxzf2p22a,bafybeihvadgjlbkifvoyhws7wx5l7tscpcnsvgny6bzcsirgr6kuoegc4y,bafkreia3vt3hz4kt5ui56n2qsei6qu5zfqe6f4k24jotauvdwvioq7xhza
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339bad095684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/3645-9203dd9404a3977e.js | 209.94.90.3 | 200 OK | 36 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/3645-9203dd9404a3977e.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (9656), with no line terminators Hashb1ad15399d5079c8c117c4bc6fbd5f17 576b8fc56b4e79aa8cc6801d31245d38c49af051 de29546c84a2418d2f819a5a381d70cbb817782ffaa404117ed4b5ce740c937b
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/3645-9203dd9404a3977e.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreig6ffkgzbfciggs7am2li4b24glxalxql72uqcbc7wuwxhhidetpm"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/3645-9203dd9404a3977e.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreig6ffkgzbfciggs7am2li4b24glxalxql72uqcbc7wuwxhhidetpm
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7ce35684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1506-405d1202a4254f54.js | 209.94.90.3 | 200 OK | 11 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1506-405d1202a4254f54.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (8048), with no line terminators Hashe1d081540ad13e71ecb22ae80793c0ca 24638e61335e3fde596ba1b4c0a40fb6b774daac dce7fd867a38fa67e6769469cbdb9b335e7c6fe6b40fa83e87397559c338268d
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1506-405d1202a4254f54.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreig4476ym6ry7jt6m5uunhf5xgztlz6g7zvub6ud5bzzovm4gobgru"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1506-405d1202a4254f54.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreig4476ym6ry7jt6m5uunhf5xgztlz6g7zvub6ud5bzzovm4gobgru
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7ce05684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/5315-ede49da3c729b6f5.js | 209.94.90.3 | 200 OK | 8.4 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/5315-ede49da3c729b6f5.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (11336), with no line terminators Hash91fccefc49cb6b6072426a010c0e7b76 e45150f2500bcf4dbe419a20e825797a6d10c3f7 9dfdf112a3462c103a1124e0eb4d31671e97694bc9ca26789fdafb05ad86e816
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/5315-ede49da3c729b6f5.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreie57xyrfi2gfqidueje4dvu2mlhd2lwss6jzithrh627mc23bxicy"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/5315-ede49da3c729b6f5.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreie57xyrfi2gfqidueje4dvu2mlhd2lwss6jzithrh627mc23bxicy
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cf75684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4254-ac0dd33f5ae839d3.js | 209.94.90.3 | 200 OK | 18 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4254-ac0dd33f5ae839d3.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (17914), with no line terminators Hash97443182bb670d5c959ddbfde1432f53 a3e9a77e26378f034314af8759194075019b22f8 cacc70665c0ae3428a22db452a94e1e3790c1e944d8816e1d0bcc77ad2ca198c
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4254-ac0dd33f5ae839d3.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigkzrygmxak4nbiuiw3iuvjjypdpegb5fcnraloduf4y55nfsqzrq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4254-ac0dd33f5ae839d3.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreigkzrygmxak4nbiuiw3iuvjjypdpegb5fcnraloduf4y55nfsqzrq
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cea5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/5599-221be466b9fcb06f.js | 209.94.90.3 | 200 OK | 103 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/5599-221be466b9fcb06f.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (36944), with no line terminators Size103 kB (103037 bytes) Hashc6b77c13893cc787e7115d4fc7998e77 dad08c4d833d7c5268d467bef0782f4645aeb491 4f166c03f8c6ad6060636d4d24154a0bd8511ea14cef8195ab65d77173ad8d23
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/5599-221be466b9fcb06f.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreicpczwah6ggvvqgay3njusbksql3bir5ikm56azlk3f25yxhlmnem"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/5599-221be466b9fcb06f.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreicpczwah6ggvvqgay3njusbksql3bir5ikm56azlk3f25yxhlmnem
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cf55684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9072-51cf922cfdeaf6b4.js | 209.94.90.3 | 200 OK | 12 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9072-51cf922cfdeaf6b4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (5383), with no line terminators Hasha906457543407a440eeb7ceff65ce2c5 c703d13449cebae2cd8bb494877ce8fb89915870 d015c44415d90338a85bfb03f14dc97da33980e85dc27edfff46d47bea0c53e6
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9072-51cf922cfdeaf6b4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:17 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigqcxceifozam4kqw73apyu3sl5um4yb2c5yj7n772g2r56udct4y"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9072-51cf922cfdeaf6b4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreigqcxceifozam4kqw73apyu3sl5um4yb2c5yj7n772g2r56udct4y
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a67a1a5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/v3-migration-cb3960f54b93b1d0.js | 209.94.90.3 | 200 OK | 49 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/v3-migration-cb3960f54b93b1d0.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (49123), with no line terminators Hashb8c7a66d6c19776c17b5d93586c539d4 0e63ba06af5bc6ebb0433beddb9a2b0c89f14adc b539932318b22738f86b53ef9bf7bb3bb891ef8140d58936a36518814fdaefac
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/v3-migration-cb3960f54b93b1d0.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:20 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifvhgjsggfse44pq22t56n7poz3xci67aka2wetni3fdcau7wxpvq"
last-modified: Sat, 27 Apr 2024 04:52:17 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/v3-migration-cb3960f54b93b1d0.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafkreifvhgjsggfse44pq22t56n7poz3xci67aka2wetni3fdcau7wxpvq
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33ca39285684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/framework-79bce4a3a540b080.js | 209.94.90.3 | 200 OK | 130 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/framework-79bce4a3a540b080.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Size130 kB (130002 bytes) Hash8ceac1a0789024027e37cca07bebaad2 6a80812d9e27ecc9b58466d027409f8a0668e2f4 745834316128a9605db352a4146dfb81cfd209fa037d3256277e2bc9d12b0f44
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/framework-79bce4a3a540b080.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidula2dcyjivfqf3m2suqkg364bz7jat6qdpuzfmj36fpe5ckypiq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/framework-79bce4a3a540b080.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidula2dcyjivfqf3m2suqkg364bz7jat6qdpuzfmj36fpe5ckypiq
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7cdb5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/media/Inter-Bold.579e0f95.woff2 | 209.94.90.3 | 200 OK | 106 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/media/Inter-Bold.579e0f95.woff2 IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 106140, version 1.0 Size106 kB (106140 bytes) Hash444a7284663a3bc886683eb81450b294 1e94a0dfac8bab0947ea9b0b6fb663ebad5cceb5 c63158babcb7902203ed73476ccf901db34825ea524d4a36a52b5e5f97e1abf7
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/media/Inter-Bold.579e0f95.woff2 HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: font/woff2
content-length: 106140
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: "bafkreigggfmlvpfxsarah3lti5wm7ea5wnecl2ssjvfdnjjllzpzpynl64"
last-modified: Sat, 27 Apr 2024 03:53:32 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/media/Inter-Bold.579e0f95.woff2
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeifof6k75qeadmbrmujchwmdll7rtygnwlov6xsnie6lclbmeab4zq,bafkreigggfmlvpfxsarah3lti5wm7ea5wnecl2ssjvfdnjjllzpzpynl64
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
accept-ranges: bytes
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339d4ddc5684-OSL
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8420.5efc2099f7e56f19.js | 209.94.90.3 | 200 OK | 55 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8420.5efc2099f7e56f19.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (54806), with no line terminators Hasha2a9f365a6265b82ed28b9fc601bab09 28d0a3d79f0ac2e986757b113cdb96c59c1f36e0 b4eea063b44a2e70198b2c4f061240ccf7f95aa83eda0ae7584993094af84a84
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8420.5efc2099f7e56f19.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifu52qghnckfzybtczmj4dbeqgm674vvkb63ifoowcjsmeuv6ckqq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8420.5efc2099f7e56f19.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreifu52qghnckfzybtczmj4dbeqgm674vvkb63ifoowcjsmeuv6ckqq
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b1ca65684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7828.bc42be26a9e94bb7.js | 209.94.90.3 | 200 OK | 25 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7828.bc42be26a9e94bb7.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (25421), with no line terminators Hashb380f675f1cf29f13f03ae90970f8677 84f4b920331001d27f92ba933b2e72909c278a05 281d57bf1fda192bb5e86a1753e4e5770b5c9cbcfe5ccf2d24577e8af479df54
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7828.bc42be26a9e94bb7.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreibidvl36h62dev3l2dkc5j6jzlxbnojzph6lths2jcxp2fpi6o7kq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7828.bc42be26a9e94bb7.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreibidvl36h62dev3l2dkc5j6jzlxbnojzph6lths2jcxp2fpi6o7kq
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b4cba5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/6504.d2701b5d1c9eba02.js | 209.94.90.3 | 200 OK | 15 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/6504.d2701b5d1c9eba02.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (15198), with no line terminators Hashc276816ba15aac6c0f054ffa7edd522c 03dd06a3487cab788e6eea217246098116f9a316 c868ee2aefaf99d69fff9907d39957bf18da5e6806090b391c7e0a2c50cbcc36
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/6504.d2701b5d1c9eba02.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigindxcv35pthlj774za7jzsv57ddnf42agbeftshd6biwfbs6mgy"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/6504.d2701b5d1c9eba02.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreigindxcv35pthlj774za7jzsv57ddnf42agbeftshd6biwfbs6mgy
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b5cc65684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_middlewareManifest.js | 209.94.90.3 | 200 OK | 92 B |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_middlewareManifest.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeASCII text, with no line terminators Hash7c3f7e060745668041278118c0bb3d6d e639f56695b3cc30d78dce7a0084aa8299a1311a de5341313a4dc5d982ca50ae4a491e84bc5e80b0f439d87f05fc3973c1b7e59a
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/rYDcxzATdKFNBkujjrihW/_middlewareManifest.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreig6knatcosnyxmyfssqvzfeshuexrpibmhuhhmh6bp4hfz4dn7fti"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/rYDcxzATdKFNBkujjrihW/_middlewareManifest.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeiaxyukpfgixsrbnp47t3o7dujsv4jszktg7ykmg7r5ppfbeoi2gjy,bafkreig6knatcosnyxmyfssqvzfeshuexrpibmhuhhmh6bp4hfz4dn7fti
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339bad025684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/ | 209.94.90.3 | 200 OK | 100 kB |
URL User Request GET HTTP/2app-aave-com.ipns.dweb.link/ IP209.94.90.3:443
CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
Size100 kB (100302 bytes) Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET / HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Sat, 27 Apr 2024 04:52:09 GMT
content-type: text/html
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
last-modified: Sat, 27 Apr 2024 04:07:54 GMT
x-ipfs-path: /ipns/app.aave.com/
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac3398af93b4ee-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/29107295.4a69275373f23f88.js | 209.94.90.3 | 200 OK | 72 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/29107295.4a69275373f23f88.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Hash9612dee64a8f3ad04bc68825de164872 a209961210b29d86f200eb7f70550ef2bff17ef5 b18a7ec622a23bddd75ca937cdd0dfa384f3aa1c5d276cbfab59776f77caaa1b
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/29107295.4a69275373f23f88.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifrrj7mmivchpo5oxfjg7g5bx5dqtz2uhc5e5wl7k2zo5xxpsvkdm"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/29107295.4a69275373f23f88.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreifrrj7mmivchpo5oxfjg7g5bx5dqtz2uhc5e5wl7k2zo5xxpsvkdm
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b5cc75684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/webpack-c367c9bab6464966.js | 209.94.90.3 | 200 OK | 5.5 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/webpack-c367c9bab6464966.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (5732), with no line terminators Hashe4182a21d9d663c49e6e68fd76a244af 661256b9c544a9ebd9fbb71fae14a089feaacf73 727add78f1caaf32d413a3c8501c7174d03e2d6eddf0171e3f4befe5b98d89f5
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/webpack-c367c9bab6464966.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreicnmaydzizxhlsitcrsqtse7lhgiwkxjwhvwe2nvllxanmoarqv7m"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/webpack-c367c9bab6464966.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreicnmaydzizxhlsitcrsqtse7lhgiwkxjwhvwe2nvllxanmoarqv7m
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7cda5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/media/Inter-SemiBold.fcb100c7.woff2 | 209.94.90.3 | 200 OK | 106 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/media/Inter-SemiBold.fcb100c7.woff2 IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 105804, version 1.0 Size106 kB (105804 bytes) Hash007ad31a53f4ab3f58ee74f2308482ce dfa9f8f3d79bf8a0001fe72eeadad0490cba59cc 152261291c938aa5aad6a56d52b47ffcb893d1c0387e76d7f270a7382ff786d5
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/media/Inter-SemiBold.fcb100c7.woff2 HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: font/woff2
content-length: 105804
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: "bafkreiavejqsshetrks2vvvfnvjli774xcj5dqbypz3np4tqu44c754g2u"
last-modified: Sat, 27 Apr 2024 03:53:32 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/media/Inter-SemiBold.fcb100c7.woff2
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeifof6k75qeadmbrmujchwmdll7rtygnwlov6xsnie6lclbmeab4zq,bafkreiavejqsshetrks2vvvfnvjli774xcj5dqbypz3np4tqu44c754g2u
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
accept-ranges: bytes
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339d4dd95684-OSL
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/_app-d7f9c4e30a48e1a4.js | 209.94.90.3 | 200 OK | 1.9 MB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/_app-d7f9c4e30a48e1a4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
Size1.9 MB (1864732 bytes) Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/_app-d7f9c4e30a48e1a4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafybeibdnh2sc5j7sf37duzyenugaudh5kht5yog2jokofyvrj2osnnxzy"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/_app-d7f9c4e30a48e1a4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafybeibdnh2sc5j7sf37duzyenugaudh5kht5yog2jokofyvrj2osnnxzy
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7cdd5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/icons/flags/es.svg | 209.94.90.3 | 200 OK | 204 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/icons/flags/es.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Size204 kB (203708 bytes) Hash37ec3238ee9d47f7f0bfade3868709e3 d215c949078205b0cd56ab51cb519affb98f3d13 222b4ff6d02318e891a67e42e635897578f703c87f958c4c1d64fdb45d5550c5
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /icons/flags/es.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreibcfnh7nubdddujdjt6iltdlclvpd3qhsd7swgeyhle7w2f2vkqyu"
last-modified: Sat, 27 Apr 2024 03:53:33 GMT
x-ipfs-path: /ipns/app.aave.com/icons/flags/es.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeig3gyfey2cvkgtdeyklommqqwwsiwdiuxrnhyhxqmdojzxzf2p22a,bafybeih4p4nhrhou7h6t7ficolttjj57f6mutgszdzy3wyacr2i2nnc65m,bafkreibcfnh7nubdddujdjt6iltdlclvpd3qhsd7swgeyhle7w2f2vkqyu
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a26ffb5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8806.6223602df2ea965f.js | 209.94.90.3 | 200 OK | 304 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8806.6223602df2ea965f.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Size304 kB (304311 bytes) Hash42aaa57c0704e5d97327af6f8d0cdc49 3b956d02384a6080489ba34995f5ec4101db2155 f1180446b881d08e9075f7eab29afe1e8fda1591dac1bfde09a9c4e6ee4aca55
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8806.6223602df2ea965f.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafybeiby56gifjcmw44oaozvuvrqii2xjzltnpx42jkfo6vgih2b445vrq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8806.6223602df2ea965f.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeiby56gifjcmw44oaozvuvrqii2xjzltnpx42jkfo6vgih2b445vrq
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b6ccd5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/2284-c8e8c4a9494b7235.js | 209.94.90.3 | 200 OK | 51 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/2284-c8e8c4a9494b7235.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (50864), with no line terminators Hash1034a0de7fbc269ccfc9ddba4aa147ec de3db06bd3fd7926ce07f376978e87924d0302d8 eb65666971304741eb5be24d3f0a19071cb2f6b6a9d4ab8e02c5fda397b25b85
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/2284-c8e8c4a9494b7235.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:12 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihlmvtgs4jqi5a6ww7cju7qugihdszpnnvj2svy4awf7wrzpms3qu"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/2284-c8e8c4a9494b7235.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreihlmvtgs4jqi5a6ww7cju7qugihdszpnnvj2svy4awf7wrzpms3qu
x-ipfs-pop: rainbow-am6-01
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33aa0b8b5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/media/Inter-Regular.f1f0c35b.woff2 | 209.94.90.3 | 200 OK | 99 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/media/Inter-Regular.f1f0c35b.woff2 IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 98868, version 1.0 Hashdc131113894217b5031000575d9de002 f96348260751ea78b1d23e9557db297290bdaf28 d612f1212b452af07f1a5defb2b672e76a91f7139e7499fa48bb9b2b985c22d6
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/media/Inter-Regular.f1f0c35b.woff2 HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: font/woff2
content-length: 98868
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: "bafkreigwclysck2fflyh6gs556zlm4xhnki7oe46osm7usf3tmvzqxbc2y"
last-modified: Sat, 27 Apr 2024 03:53:32 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/media/Inter-Regular.f1f0c35b.woff2
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeifof6k75qeadmbrmujchwmdll7rtygnwlov6xsnie6lclbmeab4zq,bafkreigwclysck2fflyh6gs556zlm4xhnki7oe46osm7usf3tmvzqxbc2y
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
accept-ranges: bytes
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339d3dd45684-OSL
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9689.adbfca89f0e04259.js | 209.94.90.3 | 200 OK | 14 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9689.adbfca89f0e04259.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (13906), with no line terminators Hash8d1f977fd82709ce4ad7e20726c52a9d 4b235975e256d6392fb149bfb432d3420e92f163 3a9136bc8e2ef8ce010043c0f98f6444dcf3d408d85a1390dd9d7559990d7bc4
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9689.adbfca89f0e04259.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreib2se3lzdro7dhacacdyd4y6zce3tz5icgylijzbxm5ovmzsdl3yq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9689.adbfca89f0e04259.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreib2se3lzdro7dhacacdyd4y6zce3tz5icgylijzbxm5ovmzsdl3yq
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b1ca15684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1811.1d478527d9c58149.js | 209.94.90.3 | 200 OK | 30 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1811.1d478527d9c58149.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (29683), with no line terminators Hash41266ff7adc44dd0f279a3a0cebfb7ca 2a35deee10e6e637cc40b818d78532bcbdaab95b 1e49f4674d467814d5726d279de8ed1261a98a34e7f7c58d8e1db3e2178a8daf
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1811.1d478527d9c58149.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreia6jh2gotkgpaknk4tne6o6r3ismguyunhh67cy3dq5wprbpcunv4"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1811.1d478527d9c58149.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreia6jh2gotkgpaknk4tne6o6r3ismguyunhh67cy3dq5wprbpcunv4
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b2cae5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9189.3b39e44e1e1f285d.js | 209.94.90.3 | 200 OK | 15 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9189.3b39e44e1e1f285d.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (15040), with no line terminators Hash919356ebbbfc9bbecda1ba9d68325866 b329797d5d79e77fe2d61ae61630747d32538f7a 7063eb6cefc6be0c188a4e799a1f53cfeabd759872909b72651948d970ed41ca
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9189.3b39e44e1e1f285d.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidqmpvwz36gxygbrcsopgnb6u6p5k6xlgdsscnxezizjdmxb3kbzi"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9189.3b39e44e1e1f285d.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidqmpvwz36gxygbrcsopgnb6u6p5k6xlgdsscnxezizjdmxb3kbzi
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b4cbc5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7978-570f194bf991f35f.js | 209.94.90.3 | 200 OK | 12 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7978-570f194bf991f35f.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (12167), with no line terminators Hash3d132e0026fba886c13916fdb5e33d01 e4d4d6a926d0d2588aaf7a497369a09c17397730 ea5a9774a01efe33251e0aaf997f8dd4732bfbc6be28e4c0e1c92a0626370924
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7978-570f194bf991f35f.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihklklxjia67yzskhqkv6mx7douomv7xrv6fdsmbyojfidcmnyjeq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7978-570f194bf991f35f.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreihklklxjia67yzskhqkv6mx7douomv7xrv6fdsmbyojfidcmnyjeq
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b6cd05684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/82-c4138125c2feb6d3.js | 209.94.90.3 | 200 OK | 10 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/82-c4138125c2feb6d3.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (10134), with no line terminators Hash294b8f234e5006980c29f7309df45d75 fe4b0be3402f3f26499d388f52f9fbd041d18d06 ba9f3dff2e49baf1cb2baeb27c495a08630c569b3b0c1bd71dae366574c2e37c
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/82-c4138125c2feb6d3.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:17 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreif2t4676lsjxly4wk5owj6eswqimmgfngz3bqn5ohnogzsxjqxdpq"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/82-c4138125c2feb6d3.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreif2t4676lsjxly4wk5owj6eswqimmgfngz3bqn5ohnogzsxjqxdpq
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a68a1c5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1497.8e36954048946218.js | 209.94.90.3 | 200 OK | 7.9 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1497.8e36954048946218.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (7981), with no line terminators Hash4b9808869033715b5d886969b9f9d0bc ca2c34282dc7a001aae588a3c3d8a3a653ccb9fa aa23d9fa97c7836ca35867be9c7f85f0a2bd9458b8b26300772bfd6b2bc3451a
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1497.8e36954048946218.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreialy2r3eqsvrivdf7w7a5srgyd6gx2ba6gzgfrnuoxwodbhrxundu"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1497.8e36954048946218.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreialy2r3eqsvrivdf7w7a5srgyd6gx2ba6gzgfrnuoxwodbhrxundu
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c9e5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4700.1016c158c2995fc4.js | 209.94.90.3 | 200 OK | 377 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4700.1016c158c2995fc4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Size377 kB (377002 bytes) Hash95729618476c5ebe1d8a4162bbf8ec53 c63d508f9f2042dd9e05e86dcec0ca5ba471cdaa 0e40b5b679b7d8a82f97b931263ac24095073c75ed1683637288b8f52c9b75c5
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4700.1016c158c2995fc4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafybeigzzrytbgdveykaqstxnhgtd5iwr252qk65k5clforsnkavpbwegi"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4700.1016c158c2995fc4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeigzzrytbgdveykaqstxnhgtd5iwr252qk65k5clforsnkavpbwegi
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b5ccb5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/favicon32.ico | 209.94.90.3 | 200 OK | 1.2 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/favicon32.ico IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typePNG image data, 32 x 32, 8-bit/color RGB, non-interlaced Hash68c9c2a88e45178139f66a748a39272f 252e29bbe84bee5b977fbcb36d8881a0d902f11f aa94366a2be71c76622a011ffe33fc59a9275facc8bed3b7f257d9fff5326fe2
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /favicon32.ico HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/vnd.microsoft.icon
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifksq3guk7hdr3gekqbd77dh7czvetv7lgix3j3p4sx3h77kmtp4i"
last-modified: Sat, 27 Apr 2024 03:53:34 GMT
x-ipfs-path: /ipns/app.aave.com/favicon32.ico
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafkreifksq3guk7hdr3gekqbd77dh7czvetv7lgix3j3p4sx3h77kmtp4i
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a1bfaf5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/icons/flags/en.svg | 209.94.90.3 | 200 OK | 1.0 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/icons/flags/en.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Hash2df72c0df0cd63e56b6a6850131898e8 26bdaf4103295099fa9aaf02ba1426ecb208f65f ef520d1c76d9a2e664cf3f879620fd879a548e90824f2de7f8ddc3654c3442c1
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /icons/flags/en.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidputo33gy6qhno6vikesnatbbrzkxezrnzvlvk3lmguvd5glxnwq"
last-modified: Sat, 27 Apr 2024 03:53:33 GMT
x-ipfs-path: /ipns/app.aave.com/icons/flags/en.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeig3gyfey2cvkgtdeyklommqqwwsiwdiuxrnhyhxqmdojzxzf2p22a,bafybeih4p4nhrhou7h6t7ficolttjj57f6mutgszdzy3wyacr2i2nnc65m,bafkreidputo33gy6qhno6vikesnatbbrzkxezrnzvlvk3lmguvd5glxnwq
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a25ff95684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4815-7cc90f45fe6229bd.js | 209.94.90.3 | 200 OK | 11 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4815-7cc90f45fe6229bd.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (11171), with no line terminators Hash3dbbbe5e97a8b0b863fa9cdcaeaf7255 b408b258d2a7364724f7566a23f6d6cbbd44828a 0f6acc0732dbcfd65ada5593cada32be800b526fbd9a63c25159f1aafcf15eb8
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4815-7cc90f45fe6229bd.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiapnlgaomw3z7lfvwsvspfnumv6qafve355tjr4eukz6gvpz4k6xa"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4815-7cc90f45fe6229bd.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiapnlgaomw3z7lfvwsvspfnumv6qafve355tjr4eukz6gvpz4k6xa
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b8cee5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/icons/flags/fr.svg | 209.94.90.3 | 200 OK | 271 B |
URL GET HTTP/3app-aave-com.ipns.dweb.link/icons/flags/fr.svg IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeSVG Scalable Vector Graphics image Hashe6238edc61feb9dbbcbf4337c3f2e67a 5e9a685d38fffa5a954d85b275a34155d528f67c 13cc9777fb621754a48fa963db2cca96eb93d8c29091e3dac92e30360ab857af
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /icons/flags/fr.svg HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/svg+xml
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidm7bo2ktkmkvg2a6zk5rxq34uwapmnfcqqf3koc7ootgt5pv43ti"
last-modified: Sat, 27 Apr 2024 03:53:33 GMT
x-ipfs-path: /ipns/app.aave.com/icons/flags/fr.svg
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeig3gyfey2cvkgtdeyklommqqwwsiwdiuxrnhyhxqmdojzxzf2p22a,bafybeih4p4nhrhou7h6t7ficolttjj57f6mutgszdzy3wyacr2i2nnc65m,bafkreidm7bo2ktkmkvg2a6zk5rxq34uwapmnfcqqf3koc7ootgt5pv43ti
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a268015684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/797.224fdb0a57599ef0.js | 209.94.90.3 | 200 OK | 47 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/797.224fdb0a57599ef0.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (46641), with no line terminators Hashbb1842271fe5b418c63e3eb6f030e80f 34bc8be1b36833e926ff95d6bcbd62585a060196 c80e8d5c50e720ca34ec3b170196d826987164a9c881566877e3dda0067318fb
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/797.224fdb0a57599ef0.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigib2gvyuhhedfdj3b3c4aznwbgtbywjkoiqflgq57d3wqam4yy7m"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/797.224fdb0a57599ef0.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreigib2gvyuhhedfdj3b3c4aznwbgtbywjkoiqflgq57d3wqam4yy7m
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c9b5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/6782.5dfef7893dd5bea4.js | 209.94.90.3 | 200 OK | 24 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/6782.5dfef7893dd5bea4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (24489), with no line terminators Hash48b63577b27e3fbfeacfb7e56ffc30cb 7e10bc7d22cdd5d9cebf1a00929ee1d6de5bd146 92de443f13c05c9ad18599e5a00ab4d67f86bc8221376e9d3ea526cb0840c007
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/6782.5dfef7893dd5bea4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreies3zcd6e6alsnndbmz4wqavngwp6dlzarbg5xj2pvfe3fqqqgaa4"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/6782.5dfef7893dd5bea4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreies3zcd6e6alsnndbmz4wqavngwp6dlzarbg5xj2pvfe3fqqqgaa4
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c9c5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/governance-0757370cd87e1b88.js | 209.94.90.3 | 200 OK | 41 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/governance-0757370cd87e1b88.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (40795), with no line terminators Hash7625be13b32f68fd6296afc64c72ef2c d9c524dfea3dbd92239cb0c59d123b676516bc60 a77551b9aa3f965a856f8e39217f40fe8d8ac3bd27dd8fa9b362dadff8b4cb1a
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/governance-0757370cd87e1b88.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:19 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifhovi3tkr7sznik34oheqx6qh6rwfmhpjh3wh2tm3c3lp7rngldi"
last-modified: Sat, 27 Apr 2024 04:52:16 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/governance-0757370cd87e1b88.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafkreifhovi3tkr7sznik34oheqx6qh6rwfmhpjh3wh2tm3c3lp7rngldi
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33c27d8f5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1102-a299e0e4a621aea1.js | 209.94.90.3 | 200 OK | 9.6 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1102-a299e0e4a621aea1.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (9917), with no line terminators Hash746f8d4837bbe99e045bd6603677b70a 221e8c866bc077f616e7bfb4e7d005a84b2c552f 5715efa3202cda4f2f9c11c8a4031814bf6240bc6bb0967443f61167b2d2f19f
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1102-a299e0e4a621aea1.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:17 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifmkmwowlbcfp2o6axtj7jqa5e7esgfkjaimyyswbg53vjpgdbvuu"
last-modified: Sat, 27 Apr 2024 04:52:17 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1102-a299e0e4a621aea1.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreifmkmwowlbcfp2o6axtj7jqa5e7esgfkjaimyyswbg53vjpgdbvuu
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33c8786a5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/330.182af63f38cc0e3d.js | 209.94.90.3 | 200 OK | 7.6 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/330.182af63f38cc0e3d.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (7800), with no line terminators Hash7e0f22117ec1e034ba6d0850a98af22c 88b9d2349b376d8232da7df1683e18f5d4fe6575 1ffde9afadcee55a5fd46150a1853e258bc522b222d9999e55359e08d5ab8f2c
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/330.182af63f38cc0e3d.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreieptetgj2mm5aqgsfqfkg4ujvobb76pw6ggxtfgz3mzjws3k3pxii"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/330.182af63f38cc0e3d.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreieptetgj2mm5aqgsfqfkg4ujvobb76pw6ggxtfgz3mzjws3k3pxii
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b1ca85684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/markets-7557748c63adf50d.js | 209.94.90.3 | 200 OK | 27 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/markets-7557748c63adf50d.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (27123), with no line terminators Hash2bc0a0aea6267fde477d702b391ba533 dcbb2751358c91d2e65dac5b4cd2cb79156b1237 c2dd9c63f403cbecbd829b2280b00f74b80f3f9c85ed0567b8f19fd78963edce
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/markets-7557748c63adf50d.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:19 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreigc3wogh5adzpwl3au3ekalad3uxaht7hef5ucwpohrt7lysy7nzy"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/markets-7557748c63adf50d.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafkreigc3wogh5adzpwl3au3ekalad3uxaht7hef5ucwpohrt7lysy7nzy
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a67a195684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7091-73091706560db88e.js | 209.94.90.3 | 200 OK | 58 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7091-73091706560db88e.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (57798), with no line terminators Hash7b2a187d5e390ce807486f4db9d96904 9b13e633633954e9eb30b1afdfb240dfc7df90b6 b21af8b13f6a9cb0a90c43da127bd9cc46041df394b4195dd2ad9b5f676576b1
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7091-73091706560db88e.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:13 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifsdl4lcp3ktsyksdcd3ijhxwomiycb344uwqmv3uvntnpwozlwwe"
last-modified: Sat, 27 Apr 2024 04:52:13 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7091-73091706560db88e.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreifsdl4lcp3ktsyksdcd3ijhxwomiycb344uwqmv3uvntnpwozlwwe
x-ipfs-pop: rainbow-am6-01
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33acfce65684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_ssgManifest.js | 209.94.90.3 | 200 OK | 77 B |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_ssgManifest.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeASCII text, with no line terminators Hashb6652df95db52feb4daf4eca35380933 65451d110137761b318c82d9071c042db80c4036 6f5b4aa00d2f8d6aed9935b471806bf7acef464d0c1d390260e5fe27f800c67e
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/rYDcxzATdKFNBkujjrihW/_ssgManifest.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidplnfkadjprvvo3gjvwryya27xvtxumtimdu4qeyhf7yt7qaggpy"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/rYDcxzATdKFNBkujjrihW/_ssgManifest.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeiaxyukpfgixsrbnp47t3o7dujsv4jszktg7ykmg7r5ppfbeoi2gjy,bafkreidplnfkadjprvvo3gjvwryya27xvtxumtimdu4qeyhf7yt7qaggpy
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339bad005684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9f96d65d-7b812644c8c0f1f1.js | 209.94.90.3 | 200 OK | 136 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9f96d65d-7b812644c8c0f1f1.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Size136 kB (135526 bytes) Hashc6375e6bef51d42031bfc33337aaf902 bbc5dd641026c865b9ec5ea5de60b937e8e11f78 7767be997bdea366c3c547d068a0d911530839362ac09a4d95eeeeab62a05ea7
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9f96d65d-7b812644c8c0f1f1.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:12 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidxm67js666untmhrkh2bukbwirkmedsnrkycne3fpo52vwfic6u4"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9f96d65d-7b812644c8c0f1f1.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidxm67js666untmhrkh2bukbwirkmedsnrkycne3fpo52vwfic6u4
x-ipfs-pop: rainbow-am6-01
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a69a2a5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7603.58cb27010e0a12d8.js | 209.94.90.3 | 200 OK | 16 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7603.58cb27010e0a12d8.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (15744), with no line terminators Hash33a79c9556f37933b9cb90566f1d1ad1 8020f6502557afc541179470ffd04e3fbeb7d0b0 15276e68799f7f3baf8cdb0e61517941ed276e81dedf0d4f5fb4a31f8549d004
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7603.58cb27010e0a12d8.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiave5xgq6m7p4527dg3bzqvc6kb5utw5ao634gu6x5uumpyksoqaq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7603.58cb27010e0a12d8.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiave5xgq6m7p4527dg3bzqvc6kb5utw5ao634gu6x5uumpyksoqaq
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c975684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/3652.76d2fc48524771f4.js | 209.94.90.3 | 200 OK | 7.2 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/3652.76d2fc48524771f4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (7426), with no line terminators Hash96f61386f124309a3260cd23549608e1 6fd3d37976eaa3c49dd6953e99ef6d9fc4392664 938eefff4b3c7e59a340a58fb38b8a981e98340723e1404cde231546c5b942bb
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/3652.76d2fc48524771f4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreic4ifwyjs7ekuekrsbx4g5xsfipcix46uqrucinh3dvmtmefngysu"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/3652.76d2fc48524771f4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreic4ifwyjs7ekuekrsbx4g5xsfipcix46uqrucinh3dvmtmefngysu
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c9d5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9671.96a31e2ffa610a87.js | 209.94.90.3 | 200 OK | 16 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9671.96a31e2ffa610a87.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (16384), with no line terminators Hash5caea66a94ed3f92d45cc0e555cd6201 7623e7e85f72a29370a8f046e3ff9982fcd95039 5c57947307554fad2a1fa28a1291ffbf128471c99f38b02c343e2b103f7bd408
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9671.96a31e2ffa610a87.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreic4k6khgb2vj6wsuh5crijjd757ckchdsm7hcycynb6fmid666uba"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9671.96a31e2ffa610a87.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreic4k6khgb2vj6wsuh5crijjd757ckchdsm7hcycynb6fmid666uba
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b2cb15684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/pages/staking-953f0075a830b3c6.js | 209.94.90.3 | 200 OK | 34 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/pages/staking-953f0075a830b3c6.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (34343), with no line terminators Hash57ac1a9b8ccbe64cf7428902e520c539 ed3a88fadff73edfa91f448c6b18d8871ffc181b a44e2be13a3bce8d1c22f515805b9773bfe763df6bacda3da4bf58361a4a757b
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/pages/staking-953f0075a830b3c6.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:21 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreifejyv6cor3z2gryixvcwafxf3tx7twhx3lvtnd3jf7la3bustvpm"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/pages/staking-953f0075a830b3c6.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafybeibhdgkgwulei3jxuy3uugajzrjpoivzj6zuld7rkazfegcivjaqja,bafkreifejyv6cor3z2gryixvcwafxf3tx7twhx3lvtnd3jf7la3bustvpm
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a68a205684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1320.f9a83bb87b7294af.js | 209.94.90.3 | 200 OK | 12 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1320.f9a83bb87b7294af.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (11915), with no line terminators Hash0b24c625578c26e207a37085a2e36e17 b034ec41b67a8411b84329346689900b58ffd157 074eb364cf5f95fce6c2b93b53e6e86637e90c2bc98feef126514e0340cefe2e
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1320.f9a83bb87b7294af.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiahj2zwjt27sx6onqvzhnj6n2dgg7uqyk6jr7xpcjsrjybubtx6fy"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1320.f9a83bb87b7294af.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiahj2zwjt27sx6onqvzhnj6n2dgg7uqyk6jr7xpcjsrjybubtx6fy
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c995684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8701.d52e3ab5e2f5c410.js | 209.94.90.3 | 200 OK | 13 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8701.d52e3ab5e2f5c410.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (12936), with no line terminators Hashe10ec769bf7de9effd288ce92b44858a 23ed148516a9fd7a121a2bbb3b24a9fcc4348d97 6e6f366895d3e4d6d7134ad68e405fe0595003d02b5cf6a751bad2692a972284
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8701.d52e3ab5e2f5c410.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidon43grfot4tlnoe2k22heax7alfiahubllt3koun22jusvfzcqq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8701.d52e3ab5e2f5c410.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidon43grfot4tlnoe2k22heax7alfiahubllt3koun22jusvfzcqq
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b4cc15684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/9522.ed3f6cd8a99af04d.js | 209.94.90.3 | 200 OK | 40 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/9522.ed3f6cd8a99af04d.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (40104), with no line terminators Hash1c85dc354f6107073e9f7ea45be17bf8 732fee8e415a3ae05ed3ef8476ed02c30f3d0dc2 4d4aad34af0f6b17306cccc1bda3e49a276aace7e8839ea7498e153c1b5e0de7
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/9522.ed3f6cd8a99af04d.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreicnjkwtjlypnmlta3gmyg62hze2e5vkzz7iqopkosmocu6bwxqn44"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/9522.ed3f6cd8a99af04d.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreicnjkwtjlypnmlta3gmyg62hze2e5vkzz7iqopkosmocu6bwxqn44
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b6cd35684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/aave_icon180.png | 209.94.90.3 | 200 OK | 26 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/aave_icon180.png IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typePNG image data, 180 x 180, 8-bit/color RGBA, non-interlaced Hash23abd5da83a81fa9eb300a30118e3efe 6d070af7f34a3966b401cc5613f85acc7e0ec354 6106d3cebea0dc2324832cc5a8721f06b369998f50c10778ada9c777023b85b9
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /aave_icon180.png HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:11 GMT
content-type: image/png
content-length: 26138
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: "bafkreidba3j45pva3qrsjazmywuhehygwnuztd2qyedxrlnjy53qeo4fxe"
last-modified: Sat, 27 Apr 2024 03:53:34 GMT
x-ipfs-path: /ipns/app.aave.com/aave_icon180.png
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafkreidba3j45pva3qrsjazmywuhehygwnuztd2qyedxrlnjy53qeo4fxe
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
accept-ranges: bytes
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a1bfad5684-OSL
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/5559-6c8d46c115744018.js | 209.94.90.3 | 200 OK | 19 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/5559-6c8d46c115744018.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (18695), with no line terminators Hash6f5120901e484ca4e1458367c70834ab b61e6c9a758f0cb72b3ebfb248652e797c67754f ee8c161c52ea10be82ebae25d55acd9f768798866f659bea2a17f7971fc4fb06
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/5559-6c8d46c115744018.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:16 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreihorqlbyuxkcc7if25oexkvvtm7o2dzrbtpmwn6ukqx66lr7rh3ay"
last-modified: Sat, 27 Apr 2024 04:52:13 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/5559-6c8d46c115744018.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreihorqlbyuxkcc7if25oexkvvtm7o2dzrbtpmwn6ukqx66lr7rh3ay
x-ipfs-pop: rainbow-am6-02
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33af9e195684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css | 209.94.90.3 | 200 OK | 4.7 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeASCII text, with very long lines (4768), with no line terminators Hash7f61c80b9f22dfeb040e0a1a943ecf20 6cc1a01a5412bd729f6fce6dce8f062cd237d640 03b7ac42887dde3a2eed9a5bf854eb16367e38f870d784cdc708cc78cc5e0eda
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/css/0da2d62e1a58e826.css HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/css; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiesvrqlrl4xi3lyphi7qmju6knqdl76dil4xipne2vjylqikuu244"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/css/0da2d62e1a58e826.css
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih2sju5rhjze3bvhpchng72lmfzvaeepcg6if3hpwvxgzsofv3tzq,bafkreiesvrqlrl4xi3lyphi7qmju6knqdl76dil4xipne2vjylqikuu244
x-ipfs-pop: rainbow-am6-02
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339afc965684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4787.c9a9f6a64640a9a2.js | 209.94.90.3 | 200 OK | 11 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4787.c9a9f6a64640a9a2.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (11062), with no line terminators Hasha43d1bc01f17c751521e0d6b0fb3afd2 fc984e69d6b6744c976f492a5338af8114c3837d e40f42a162c73cf41bde24a6c4c7b410cb402648926f0243cad0ef6a5435d6f6
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4787.c9a9f6a64640a9a2.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiheb5bkcywhht2bxxreu3cmpnaqznacmsesn4behswq55vfinow6y"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4787.c9a9f6a64640a9a2.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiheb5bkcywhht2bxxreu3cmpnaqznacmsesn4behswq55vfinow6y
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b2caa5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8882.78d4e9d7872de2c1.js | 209.94.90.3 | 200 OK | 30 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8882.78d4e9d7872de2c1.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (29637), with no line terminators Hash7cfb0663518defe6ecdae056d58a67fc 9317d9c28765d914c9d314b523a9d1cc64d242c2 48ed860a4168c30c71947e753682bfdd30e2b84d1a22ac237d9f617e9eb6a217
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8882.78d4e9d7872de2c1.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreici5wdauqliymghdfd6ou3ifp65gdrlqti2ekwcg7m7mf7j5nvcc4"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8882.78d4e9d7872de2c1.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreici5wdauqliymghdfd6ou3ifp65gdrlqti2ekwcg7m7mf7j5nvcc4
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b3cb65684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/3866.777e7d128e9a4375.js | 209.94.90.3 | 200 OK | 34 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/3866.777e7d128e9a4375.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (34035), with no line terminators Hashaecc04844654567a03351c63fd7ca85f afc31a40013ebfb721e43b2db2bc7ad7dea5e017 2df57ba0e64b13ab4ccd34b721a09fe19992bcaaa8e6f6b26a1fdba704c813ba
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/3866.777e7d128e9a4375.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreibn6v52bzslcovuztjuw4q2bh7btgjlzkvi433le2q73otqjsatxi"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/3866.777e7d128e9a4375.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreibn6v52bzslcovuztjuw4q2bh7btgjlzkvi433le2q73otqjsatxi
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b4cb95684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/7888.4670beb870221fb5.js | 209.94.90.3 | 200 OK | 18 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/7888.4670beb870221fb5.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (17529), with no line terminators Hashcb2f5662db56903eccade944e65c622e 059b7c473aad2fbab456e1bc1d274e141900c165 ba603331a85676c23095a823b0684200ad12abdaf79d5de2f53b1ef4b9258f56
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/7888.4670beb870221fb5.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreif2maztdkcwo3bdbfnieoygqqqavujkxwxxtvo6f5j3d32lsjmpky"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/7888.4670beb870221fb5.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreif2maztdkcwo3bdbfnieoygqqqavujkxwxxtvo6f5j3d32lsjmpky
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b0c9a5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_buildManifest.js | 209.94.90.3 | 200 OK | 2.4 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/rYDcxzATdKFNBkujjrihW/_buildManifest.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeASCII text, with very long lines (2496), with no line terminators Hashf983d8cb3f7b7e591e993bfc0a241549 103eb53c403ad3485319221edc4a1c74b184de44 928a7d0bf6879bde712a401a5fc75c63ee15bde66c412f32b90bda21298f531f
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/rYDcxzATdKFNBkujjrihW/_buildManifest.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreif5cvmpx2wnoq6ssto7s3yyl5igvnx4nhr22tgnquponsviihmtdq"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/rYDcxzATdKFNBkujjrihW/_buildManifest.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeiaxyukpfgixsrbnp47t3o7dujsv4jszktg7ykmg7r5ppfbeoi2gjy,bafkreif5cvmpx2wnoq6ssto7s3yyl5igvnx4nhr22tgnquponsviihmtdq
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b9cfe5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/media/Inter-Medium.dc792b50.woff2 | 209.94.90.3 | 200 OK | 106 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/media/Inter-Medium.dc792b50.woff2 IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 105924, version 1.0 Size106 kB (105924 bytes) Hash75db5319e7e87c587019a5df08d7272c 92b30527304b5dc80f45e997e0b1ac4c70110a18 1b498b959e5b7decbf9185803591d25bc1fbf83e798372ed30d32d5c79d82ff6
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/media/Inter-Medium.dc792b50.woff2 HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/_next/static/css/0da2d62e1a58e826.css
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: font/woff2
content-length: 105924
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: "bafkreia3jgfzlhs3pxwl7emfqa2zdus3yh57qptzqnzo2mgtfvohtwbp6y"
last-modified: Sat, 27 Apr 2024 03:53:32 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/media/Inter-Medium.dc792b50.woff2
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeifof6k75qeadmbrmujchwmdll7rtygnwlov6xsnie6lclbmeab4zq,bafkreia3jgfzlhs3pxwl7emfqa2zdus3yh57qptzqnzo2mgtfvohtwbp6y
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
accept-ranges: bytes
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339d4dda5684-OSL
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/4609-45f4815a9c085248.js | 209.94.90.3 | 200 OK | 9.4 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/4609-45f4815a9c085248.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (9663), with no line terminators Hash7b73905e9e43f6996e2dda136d88a5d6 7e8a2734c7aaf36aa9a3047509f148d9d57fca93 ea7672a91956424c070fb905f556abcca50ed190a50fc217167f4c51c438066a
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/4609-45f4815a9c085248.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
X-Moz: prefetch
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:17 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreidqhky3jsus7dxwolk2ik34d74aqlpigkkkec5zbgecrvxcxdukie"
last-modified: Sat, 27 Apr 2024 04:52:12 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/4609-45f4815a9c085248.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreidqhky3jsus7dxwolk2ik34d74aqlpigkkkec5zbgecrvxcxdukie
x-ipfs-pop: rainbow-am6-03
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac33a67a185684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/8977.8cefff53c53bdda4.js | 209.94.90.3 | 200 OK | 42 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/8977.8cefff53c53bdda4.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (42515), with no line terminators Hash24fc5ddce0bfbbb1bf945323b4db7b34 7418b8d62936afc0ad60a1100bc74195ca51ab68 11c883c8b1e32a809bdcf7a3001c077b6280127ec3878dda23ecc726e42a82f1
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/8977.8cefff53c53bdda4.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiarzcb4rmpdfkajxxhxumabyb33mkabe7wdq6g5ui7my4toikuc6e"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/8977.8cefff53c53bdda4.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiarzcb4rmpdfkajxxhxumabyb33mkabe7wdq6g5ui7my4toikuc6e
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b1ca55684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/1226.2b4574c57c2b36b6.js | 209.94.90.3 | 200 OK | 18 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/1226.2b4574c57c2b36b6.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (17588), with no line terminators Hash05fcf3cd38749a8662530d5665aeabcd a4e376ee6ae45f8d6533d2b0125ad9123429453d 952dea1dc1edda61b66f787c0b1a2d29f11b225eb1833b71e61cc5af5efccfb9
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/1226.2b4574c57c2b36b6.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreievfxvb3qpn3jq3m33ypqfruljj6ensexvrqm5xdzq4ywxv57gpxe"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/1226.2b4574c57c2b36b6.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreievfxvb3qpn3jq3m33ypqfruljj6ensexvrqm5xdzq4ywxv57gpxe
x-ipfs-pop: rainbow-am6-03
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b4cbf5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|
| app-aave-com.ipns.dweb.link/_next/static/chunks/main-37e08f82b0681cde.js | 209.94.90.3 | 200 OK | 85 kB |
URL GET HTTP/3app-aave-com.ipns.dweb.link/_next/static/chunks/main-37e08f82b0681cde.js IP209.94.90.3:443
Requested byhttps://app-aave-com.ipns.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeJavaScript source, ASCII text, with very long lines (65536), with no line terminators Hash87b532c88e0a0e2a394da9d3beab5ce6 4159c039bbf2d0659a39cd3ddaf7d6dc3f3981e7 00382ebcbccee5ede71f8d6d644d26b47c76cea454b329d523a61f70b95850c9
Analyzer | Verdict | Alert | OpenPhish | phishing | Crypto/Wallet | Quad9 DNS | malicious | Sinkholed |
GET /_next/static/chunks/main-37e08f82b0681cde.js HTTP/1.1
Host: app-aave-com.ipns.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://app-aave-com.ipns.dweb.link/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 200 OK
date: Sat, 27 Apr 2024 04:52:10 GMT
content-type: text/javascript; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
etag: W/"bafkreiaahaxlzpgo4xw6oh4nnvse2jvupr3m5jcuwmu5ki5gd5ylswcqze"
last-modified: Sat, 27 Apr 2024 03:53:31 GMT
x-ipfs-path: /ipns/app.aave.com/_next/static/chunks/main-37e08f82b0681cde.js
x-ipfs-roots: bafybeierxa6qrcmczyaankcwu4uxfhyaxlk7dgsmocc2stmufunrlplduq,bafybeic3i235sf72rfre3lemak5gxgipa5khpxwcmcunlsmopyxvrg7m7m,bafybeiarusnxwvsw4pbvbfuxnog4mqbyejmwpjckytitjky4qcaowmsbdy,bafybeih4dyxjbtihlm3zwycagqcqa6zd7h53gg4w3vmts4ktc5sw2qlnhe,bafkreiaahaxlzpgo4xw6oh4nnvse2jvupr3m5jcuwmu5ki5gd5ylswcqze
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
vary: Accept-Encoding
server: cloudflare
cf-ray: 87ac339b7cdc5684-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|
|