![](/screenshots/03d77d77-20d0-48f6-92fa-a9cc707e47e0.png)
www.outlook-office365.net
Open in
urlscan Pro
18.64.103.108
Malicious Activity!
Public Scan
Submission: On February 16 via automatic, source ayashige — Scanned from DE
Summary
TLS certificate: Issued by Amazon on February 16th 2022. Valid for: a year.
This is the only time www.outlook-office365.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 18.64.103.108 18.64.103.108 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 1 |
ASN16509 (AMAZON-02, US)
PTR: server-18-64-103-108.txl50.r.cloudfront.net
www.outlook-office365.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
outlook-office365.net
www.outlook-office365.net |
313 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | www.outlook-office365.net |
www.outlook-office365.net
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
outlook-office365.net Amazon |
2022-02-16 - 2023-03-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.outlook-office365.net/
Frame ID: 58445CA4C59BE2F41B801EDBEC85F51F
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.outlook-office365.net/ |
936 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
www.outlook-office365.net/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro.jpg
www.outlook-office365.net/ |
35 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
scripts.js
www.outlook-office365.net/ |
40 B 432 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.jpg
www.outlook-office365.net/ |
273 KB 274 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.outlook-office365.net
18.64.103.108
02fac69f5e5dd64b5838b4f6908389fcfc490ed907eb1b1a37e7e51fe19db252
315531e05e0faf33befb1939662f3f0dd1e04174360f67397dea159b70748a02
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
c1e957552af957b0eb21a153535ab7060d600280f4deea07a21b1f39577e1538
e897e7f6f31a6b525995be8566b22b48943e71aea6efd2863fee0cffc0e33706