Security Scan Report: bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs.dweb.link

Submitted: Dec 1, 2025, 12:25:02 PMCompleted: Dec 1, 2025, 12:26:00 PMpubliccompleted
Loading additional data...

Summary

This website contacted 26 IPs in 2 countries across 7 domains to perform 11 HTTP transactions. The main domain is bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs.dweb.link.

Submitted URL: https://bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs.dweb.link/

The Cisco Umbrella rank of the primary domain is #174,969 of the top 1 million websites

AI Security Verdict

Confirmed Scam

Confidence: 95%

10
Risk Score

High‑risk phishing site harvesting credentials; report as scam.

Risk Factors
IPFS hosting combined with credential collection
Brand impersonation on an untrusted domain
Newly registered domain (<7 days) with login form
Domain age information unavailable

Details

Page Title

Webmail Portal Access

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

phishing scam

(34%)

Domain Information

Within the .link top-level domain, 'bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs.dweb.link' is registered; it also runs on subdomain 'bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs'. The registrable portion 'dweb' spans 4 characters containing 1 vowel alongside 3 consonants. It segments into two words: d, web. Median word length comes out to two characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://bafybeihqsfz4c5jqmr2jejdxob2xnmyxpxgz6akgz7s6dqp2fdlggjkzca.ipfs.dweb.link/

Page Load Overview

0.30s
Total Load Time
11
HTTP Requests
7
Domains
158 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:242 chars
Detector Agreement:100%

Website Classification

Primary Category

phishing scam34% confidence
Type: webapp
Method: ml+structural

All Detected Categories

phishing scam
34%
adult content
30%
documentation technical
27%

Detected Features

Login Form

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
3209.94.90.3United States
AS40680PROTOCOL
3104.18.11.207United States
AS13335CLOUDFLARENET
2151.101.130.137San Francisco, California, United States
AS54113FASTLY
1142.250.185.138United States
AS15169GOOGLE
1104.17.25.14United States
AS13335CLOUDFLARENET
1172.67.139.119United States
AS13335CLOUDFLARENET
0151.101.194.137San Francisco, California, United States
AS54113FASTLY
0209.94.90.2United States
AS40680PROTOCOL
0104.18.10.207United States
AS13335CLOUDFLARENET
0151.101.66.137San Francisco, California, United States
AS54113FASTLY
1126--

Detected Technologies4

Content Similarity HashesFor malware variant detection

Image Hashes

Perceptual Hashes

Average Hash:N/A
Perceptual Hash:N/A
Difference Hash:N/A
Wavelet Hash:N/A
Color Hash:N/A

Other Hashes

Crop Resistant:N/A

Scan History

Scan history not available

Unable to load historical scan data