| bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/ | 209.94.90.2 | 200 OK | 19 kB |
URL User Request GET HTTP/2bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/ IP209.94.90.2:443
CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | OpenPhish | phishing | Outlook | Quad9 DNS | malicious | Sinkholed |
GET / HTTP/1.1
Host: bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Thu, 25 Apr 2024 16:29:16 GMT
content-type: text/plain; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
cache-control: public, max-age=29030400, immutable
etag: W/"bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya"
x-ipfs-path: /ipfs/bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya/
x-ipfs-roots: bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya
x-ipfs-pop: rainbow-am6-01
cf-cache-status: HIT
set-cookie: __cflb=02DiuJZjQ3P3A9tin4pJRepJNkEfEBDY4snzeUh1pggqa; SameSite=None; Secure; path=/; expires=Fri, 26-Apr-24 15:29:16 GMT; HttpOnly
vary: Accept-Encoding
server: cloudflare
cf-ray: 879fb6001f4656bb-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/favicon.ico | 209.94.90.2 | 404 Not Found | 191 B |
URL GET HTTP/3bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/favicon.ico IP209.94.90.2:443
Requested byhttps://bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/ CertificateIssuerLet's Encrypt Subjectdweb.link FingerprintF6:88:14:38:C6:3C:1C:FC:F0:D3:23:B2:F2:72:50:9D:5C:DC:BE:D2 ValidityTue, 16 Apr 2024 16:54:22 GMT - Mon, 15 Jul 2024 16:54:21 GMT
File typeASCII text, with no line terminators Hash4d28f0edaf84570d203a6b6220b66081 ac9952ace41c36403598dfda211fc7c5da4daa1f d37d15edf0b17190f70e4c925d16f44a7fc697d240a91d4ee69ddb1ec3d53c1a
Analyzer | Verdict | Alert | OpenPhish | phishing | Outlook | Quad9 DNS | malicious | Sinkholed |
GET /favicon.ico HTTP/1.1
Host: bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya.ipfs.dweb.link/
Cookie: __cflb=02DiuJZjQ3P3A9tin4pJRepJNkEfEBDY4snzeUh1pggqa
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/3 404 Not Found
date: Thu, 25 Apr 2024 16:29:16 GMT
content-type: text/plain; charset=utf-8
access-control-allow-headers: Content-Type, Range, User-Agent, X-Requested-With
access-control-allow-methods: GET, HEAD, OPTIONS
access-control-allow-origin: *
access-control-expose-headers: Content-Length, Content-Range, X-Chunked-Output, X-Ipfs-Path, X-Ipfs-Roots, X-Stream-Output
x-content-type-options: nosniff
x-ipfs-path: /ipfs/bafybeicmtrzimmzmisntc5cwz6wefudty4kww42icgbwrvjjrsjaobqaya/favicon.ico
x-ipfs-pop: rainbow-am6-02
cf-cache-status: EXPIRED
vary: Accept-Encoding
server: cloudflare
cf-ray: 879fb601ead60b55-OSL
content-encoding: br
alt-svc: h3=":443"; ma=86400
|