IP 199.36.158.100:0
File type HTML document, ASCII text
Hash caaeb4eeb7d6cac71302b001c5b3128c
cf027391e8095fb38c6a594bd4dda8bfb8876482
8e314a6318c5b697e43f653e888e87dabaf3efe2859b12c61c04a74786133f53
Analyzer Verdict Alert PhishTank phishing Other
Quad9 DNS malicious Sinkholed
GET / HTTP/1.1
Host: inv2023.firebaseapp.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
cache-control: max-age=3600
content-encoding: br
content-type: text/html; charset=utf-8
etag: "c77b03c3202d16e9f3cc1b301d07cae2204523c60f61a7541336fcc29612dc19-br"
last-modified: Mon, 03 Apr 2023 08:05:57 GMT
strict-transport-security: max-age=31556926; includeSubDomains; preload
accept-ranges: bytes
date: Tue, 28 Nov 2023 01:39:02 GMT
x-served-by: cache-bma1666-BMA
x-cache: MISS
x-cache-hits: 0
x-timer: S1701135542.227848,VS0,VE107
vary: x-fh-requested-host, accept-encoding
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 104
X-Firefox-Spdy: h2
ipfs.io/ipfs/bafkreihe7lumsu4yioatgwpep6y2luw2jenmrrmmhyuwlj5nwikhmavogy
209.94.90.1410 Gone 6.7 kB URL User Request GET HTTP/2 ipfs.io/ipfs/bafkreihe7lumsu4yioatgwpep6y2luw2jenmrrmmhyuwlj5nwikhmavogy
IP 209.94.90.1:443
Certificate IssuerLet's Encrypt
Subjectdweb.link
Fingerprint8B:0B:A0:28:A6:81:DF:E9:49:F0:E9:A3:20:69:C6:07:BE:D6:16:2C
ValidityMon, 20 Nov 2023 14:59:23 GMT - Sun, 18 Feb 2024 14:59:22 GMT
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document text\012- assembler source, ASCII text, with very long lines (1632)
Hash f2ce39c9881b4a12aff800f6713c69d1
0f047ecc756d17f61d81da4b3bede1d80575bfe1
86f21e29947180f7b68e81b82992f786fc08b694ac4c714352f072768788f150
GET /ipfs/bafkreihe7lumsu4yioatgwpep6y2luw2jenmrrmmhyuwlj5nwikhmavogy HTTP/1.1
Host: ipfs.io
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://inv2023.firebaseapp.com/
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 410 Gone
server: openresty
date: Tue, 28 Nov 2023 01:39:02 GMT
content-type: text/html
content-length: 6672
etag: "650c2b70-1a10"
access-control-allow-origin: *
access-control-allow-methods: GET, POST, OPTIONS
access-control-allow-headers: X-Requested-With, Range, Content-Range, X-Chunked-Output, X-Stream-Output
access-control-expose-headers: Content-Range, X-Chunked-Output, X-Stream-Output
x-ipfs-lb-pop: gateway-bank1-fr2
x-bfid: d5cdd4feaedcd66aef62097b2b7f1576
strict-transport-security: max-age=31536000; includeSubDomains; preload
X-Firefox-Spdy: h2