| quirky-shaw-20dc92.netlify.app/polina.jpg | 18.192.94.96 | 404 Not Found | 50 B |
URL GET HTTP/2quirky-shaw-20dc92.netlify.app/polina.jpg IP18.192.94.96:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerDigiCert Inc Subject*.netlify.app FingerprintB0:8E:E9:A5:C3:D9:B5:C1:FF:B6:51:7A:DF:98:CF:2D:28:18:41:9B ValidityMon, 15 Jan 2024 00:00:00 GMT - Fri, 14 Feb 2025 23:59:59 GMT
File typeASCII text, with no line terminators Hash6d5c2a6018b04d63e34e1f786d20c4cd b49ecae119f256d16abf21517b01e43d2d7cba05 be8a4f3cd3a265e10cf61c5ef6452bdea1a7ebd084b997b359159da2e76e84ce
GET /polina.jpg HTTP/1.1
Host: quirky-shaw-20dc92.netlify.app
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 404 Not Found
cache-control: private, max-age=0
content-type: text/plain; charset=utf-8
date: Wed, 24 Apr 2024 17:07:58 GMT
server: Netlify
strict-transport-security: max-age=31536000; includeSubDomains; preload
x-nf-request-id: 01HW8H83D5CW3B9KQ5ET1TV0AK
content-length: 50
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/logo.jpg | 104.17.96.13 | 200 OK | 4.7 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/logo.jpg IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 240x56, components 3 Hash79a96bc19b6f2272fe4bd8d40c0cd8a0 8efd8ecf46ff6505df918de628c7a901fa147a7e c4e89edd8eea8796e000d919c2f08c25521a8578f55fa21ba4d6e62c8ba98c4f
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/logo.jpg HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: image/jpeg
content-length: 4740
cf-ray: 8797b14ee8705690-OSL
cf-cache-status: MISS
accept-ranges: bytes
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: "bafkreige5cpn3dxkq6loaagzdhbpbdbfkinik6hvl6rbxjgw4ywixkmmj4"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/logo.jpg
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreige5cpn3dxkq6loaagzdhbpbdbfkinik6hvl6rbxjgw4ywixkmmj4
server: cloudflare
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery_003.js | 104.17.96.13 | 200 OK | 32 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery_003.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (65451) Hashdc5e7f18c8d36ac1d3d4753a87c98d0a c8e1c8b386dc5b7a9184c763c88d19a346eb3342 f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/jquery_003.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee8675690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreihx62systy5dho2235dskzozywf4v4mx562j2ualnuil23jqw3ohu"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/jquery_003.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreihx62systy5dho2235dskzozywf4v4mx562j2ualnuil23jqw3ohu
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/vd.mp4 | 104.17.96.13 | 206 Partial Content | 1.6 MB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/vd.mp4 IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeISO Media, MP4 Base Media v1 [ISO 14496-12:2003] Size1.6 MB (1612421 bytes) Hash859c6f6b36f8d5fee6c4c6130cc46f7c 4df753f748c5f1c148f4a960aef993ec0c723649 1c5ff0b7a109732f9524663c3ef4d97c8291b4c987d7458e42b76095ed93324a
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/vd.mp4 HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: video/webm,video/ogg,video/*;q=0.9,application/ogg;q=0.7,audio/*;q=0.6,*/*;q=0.5
Accept-Language: en-US,en;q=0.5
Range: bytes=0-
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: video
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Accept-Encoding: identity
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 206 Partial Content
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: video/mp4
content-length: 28439145
content-range: bytes 0-28439144/28439145
cf-ray: 8797b1511b7d5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: no-store
etag: "bafybeigirvo66op5zdq7ceidn22rxhx6xklxpbvvawwt6l3arkpw6dxhju"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/vd.mp4
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafybeigirvo66op5zdq7ceidn22rxhx6xklxpbvvawwt6l3arkpw6dxhju
server: cloudflare
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/vd.htm | 104.17.96.13 | 206 Partial Content | 3.0 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/vd.htm IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeHTML document, ASCII text, with very long lines (3048), with no line terminators Hasheb3d06432739dc796b8a7da3f415a1cd c308e635482b1b036f321981adba3721b24c8405 26dcc88c615d3234a871987ae9b834558ee7139d0a9a2dd77dda6db37e14d2c4
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/vd.htm HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: video/webm,video/ogg,video/*;q=0.9,application/ogg;q=0.7,audio/*;q=0.6,*/*;q=0.5
Accept-Language: en-US,en;q=0.5
Range: bytes=0-
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: video
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Accept-Encoding: identity
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 206 Partial Content
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/html
content-length: 3048
content-range: bytes 0-3047/3048
cf-ray: 8797b154bf885690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: no-store
etag: "bafkreibg3teiyyk5gi2kq4myplu3qncvr3trhhiktiw5o7o2nwzx4fgsyq"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/vd.htm
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreibg3teiyyk5gi2kq4myplu3qncvr3trhhiktiw5o7o2nwzx4fgsyq
server: cloudflare
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery-3.js | 104.17.96.13 | 200 OK | 33 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery-3.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (32012) Hash5f48fc77cac90c4778fa24ec9c57f37d 9e89d1515bc4c371b86f4cb1002fd8e377c1829f 9365920887b11b33a3dc4ba28a0f93951f200341263e3b9cefd384798e4be398
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/jquery-3.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee8745690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreietmwjarb5rdmz2hxclukfa7e4vd4qagqjghy5zz36tqr4y4s7dta"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/jquery-3.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreietmwjarb5rdmz2hxclukfa7e4vd4qagqjghy5zz36tqr4y4s7dta
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/logo.jpg | 104.17.96.13 | 200 OK | 4.7 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/logo.jpg IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 240x56, components 3 Hash79a96bc19b6f2272fe4bd8d40c0cd8a0 8efd8ecf46ff6505df918de628c7a901fa147a7e c4e89edd8eea8796e000d919c2f08c25521a8578f55fa21ba4d6e62c8ba98c4f
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/logo.jpg HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g; __session:0.9709120773457087:=https:
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:59 GMT
content-type: image/jpeg
content-length: 4740
cf-ray: 8797b15ace6c5690-OSL
cf-cache-status: HIT
accept-ranges: bytes
access-control-allow-origin: *
age: 1
cache-control: public, max-age=29030400, immutable
etag: "bafkreige5cpn3dxkq6loaagzdhbpbdbfkinik6hvl6rbxjgw4ywixkmmj4"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: hit
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/logo.jpg
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreige5cpn3dxkq6loaagzdhbpbdbfkinik6hvl6rbxjgw4ywixkmmj4
server: cloudflare
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery_002.js | 104.17.96.13 | 200 OK | 6.3 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery_002.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeASCII text, with very long lines (1993) Hashc0ac9c9487d60de96dc68dbb25bd8dd6 99419b0be4b85422ff84870e54dbd8a52dc6dab1 76ad6584ac5bdd459939dc7532fae7c2bdd8e22d773ff16d2306f42a1ffc569c
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/jquery_002.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:59 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee88b5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreidwvvsyjlc33vczsoo4ouzpvz6cxxmoellxh7yw2iyg6qvb77cwtq"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/jquery_002.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreidwvvsyjlc33vczsoo4ouzpvz6cxxmoellxh7yw2iyg6qvb77cwtq
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/popper.js | 104.17.96.13 | 200 OK | 19 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/popper.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (19015) Hash70d3fda195602fe8b75e0097eed74dde c3b977aa4b8dfb69d651e07015031d385ded964b a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/popper.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:59 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee87f5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreifff55kktl3zkx2avxobicqeyw7yvuuvyun52fuzlbufgxtp7ynmy"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/popper.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreifff55kktl3zkx2avxobicqeyw7yvuuvyun52fuzlbufgxtp7ynmy
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap.js | 104.17.96.13 | 200 OK | 60 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (59765) Hash02d223393e00c273efdcb1ade8f4f8b1 0cc93b8421d89c24a889642428b363cb831de78a 79c599dd760cec0c1621a1af49d9a2a49da5d45e1b37d4575bace0a5e0226582
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/bootstrap.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee86e5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreidzywm525qm5qgbminbv5e5tivetws5ixq3g7kfow5m4cs6aitfqi"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/bootstrap.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreidzywm525qm5qgbminbv5e5tivetws5ixq3g7kfow5m4cs6aitfqi
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap_003.js | 104.17.96.13 | 200 OK | 49 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap_003.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (48664) Hash14d449eb8876fa55e1ef3c2cc52b0c17 a9545831803b1359cfeed47e3b4d6bae68e40e99 e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/bootstrap_003.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:59 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee8805690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreihh5u3m53sukc2cio54gumiv6v57nbibr6fowlqahpa5ulhfgnqdm"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/bootstrap_003.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreihh5u3m53sukc2cio54gumiv6v57nbibr6fowlqahpa5ulhfgnqdm
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery.js | 104.17.96.13 | 200 OK | 86 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/jquery.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (32065) Hash2f6b11a7e914718e0290410e85366fe9 69bb69e25ca7d5ef0935317584e6153f3fd9a88c 05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/jquery.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:59 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee8885690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreiafxbozn5a774knr5qi3lidvny6fqibpqw2beknprmssg5npjkpry"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/jquery.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreiafxbozn5a774knr5qi3lidvny6fqibpqw2beknprmssg5npjkpry
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap_002.js | 104.17.96.13 | 200 OK | 51 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap_002.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (50758) Hash67176c242e1bdc20603c878dee836df3 27a71b00383d61ef3c489326b3564d698fc1227c 56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/bootstrap_002.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee88a5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreicwyevbewycduq2nhtb24mqz35bndlmfdhhcutfz2q3hmarfuljyq"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/bootstrap_002.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreicwyevbewycduq2nhtb24mqz35bndlmfdhhcutfz2q3hmarfuljyq
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ | 104.17.96.13 | 200 OK | 7.5 kB |
URL User Request GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ IP104.17.96.13:443
CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeHTML document, ASCII text, with very long lines (8179), with no line terminators Hasha4bdb0d18edb5493a22c4d3dd95f13df 11f9a51afc0699ab80c04d0072f4a989dcddc1c6 c67d02986b113ee33b52f947eb18ce4048f0a96c5c5d95d8b93dfe1b39eb0695
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET / HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:57 GMT
content-type: text/html
cf-ray: 8797b14cce195690-OSL
cf-cache-status: HIT
access-control-allow-origin: *
age: 14006
cache-control: public, max-age=29030400, immutable
etag: W/"bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: hit
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta
set-cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g; path=/; expires=Wed, 24-Apr-24 17:37:57 GMT; domain=.bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com; HttpOnly; Secure; SameSite=None
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap.css | 104.17.96.13 | 200 OK | 160 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/bootstrap.css IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeASCII text, with very long lines (65326) Size160 kB (160302 bytes) Hash816af0eddd3b4822c2756227c7e7b7ee c470239d4c7db36d56dc3a74a080c62218c6edc4 5b0fbe5b7ad705f6a937c4998ad02f73d8f0d976fe231b74aef0ec996990c93a
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/bootstrap.css HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/css; charset=utf-8
cf-ray: 8797b14ed8655690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreic3b67fw6wxax3ksn6etgfnal3t3dyns5x6emnxjlxq5smwtegjhi"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/bootstrap.css
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreic3b67fw6wxax3ksn6etgfnal3t3dyns5x6emnxjlxq5smwtegjhi
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|
| bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/popper_002.js | 104.17.96.13 | 200 OK | 21 kB |
URL GET HTTP/2bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/index_files/popper_002.js IP104.17.96.13:443
Requested byhttps://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/ CertificateIssuerLet's Encrypt Subjectcf-ipfs.com Fingerprint46:AD:9B:E1:02:E3:A8:FE:9B:E2:86:B5:A1:5C:07:B9:B7:3B:17:14 ValiditySat, 16 Mar 2024 23:28:47 GMT - Fri, 14 Jun 2024 23:28:46 GMT
File typeJavaScript source, ASCII text, with very long lines (21084) Hash84415b7368fd6fc764cbe86039ce0626 62f238e73348c77eb9e865426a7d1b7de23cbb2d c776195ad46333c6c9a9fe3c74502ffea9a02faf122388ea3567922cc65a3060
Analyzer | Verdict | Alert | OpenPhish | phishing | DHL Airways, Inc. | PhishTank | phishing | Other |
GET /index_files/popper_002.js HTTP/1.1
Host: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta.ipfs.cf-ipfs.com/
Cookie: __cf_bm=LqFsONZCE8UzF13OyBS83lm6sihSeiiCWNEU4cDBvpw-1713978477-1.0.1.1-lGgV88kHSNoXRiKSKYofRaKIc096FQ8crFp94nFnKDaayfq08fo.Vtmhof9sbyZmsf9fUdyjA_EO3f.g2Vlz3g
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 17:07:58 GMT
content-type: text/javascript; charset=utf-8
cf-ray: 8797b14ee86b5690-OSL
cf-cache-status: MISS
access-control-allow-origin: *
cache-control: public, max-age=29030400, immutable
etag: W/"bafkreighoymvvvddgpdmtkp6hr2fal76vgqc7lyseoeounlhsiwmmwrqma"
vary: Accept-Encoding
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-cf-ipfs-cache-status: miss
x-ipfs-path: /ipfs/bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta/index_files/popper_002.js
x-ipfs-roots: bafybeiae5jp54zoejxo53gnmmuwoz74fnikzzddijovsxf7oil32ya3sta,bafybeidiat6nkhychvpnxkrxsapicdcgqziizjug65uztqzm2mvdr3nzky,bafkreighoymvvvddgpdmtkp6hr2fal76vgqc7lyseoeounlhsiwmmwrqma
server: cloudflare
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
|