o365.malware.team.emailquarantine.com
Open in
urlscan Pro
52.3.193.16
Public Scan
Effective URL: http://o365.malware.team.emailquarantine.com/load_training?guid=115d56fce1&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
Submission: On August 19 via api from US
Summary
This is the only time o365.malware.team.emailquarantine.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
30 | 52.3.193.16 52.3.193.16 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
2 | 52.216.184.43 52.216.184.43 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 54.230.93.22 54.230.93.22 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
3 | 2a00:1450:400... 2a00:1450:4001:817::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 6 | 2a00:1450:400... 2a00:1450:4001:80b::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 52.20.150.97 52.20.150.97 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 1 | 2a00:1450:400... 2a00:1450:400c:c04::9b | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 1 | 2a00:1450:400... 2a00:1450:4001:820::2004 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:816::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 52.216.108.115 52.216.108.115 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
68 | 9 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-3-193-16.compute-1.amazonaws.com
o365.malware.team.emailquarantine.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: s3-1-w.amazonaws.com
tslp.s3.amazonaws.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-54-230-93-22.fra2.r.cloudfront.net
d2wy8f7a9ursnm.cloudfront.net |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
www.google-analytics.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-20-150-97.compute-1.amazonaws.com
dataentry.threatsim.com |
ASN15169 (GOOGLE - Google LLC, US)
stats.g.doubleclick.net |
ASN15169 (GOOGLE - Google LLC, US)
www.google.com |
ASN15169 (GOOGLE - Google LLC, US)
www.google.de |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: s3-1-w.amazonaws.com
ts-uploads.s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
30 |
emailquarantine.com
o365.malware.team.emailquarantine.com |
33 KB |
6 |
google-analytics.com
1 redirects
www.google-analytics.com |
35 KB |
3 |
googleapis.com
ajax.googleapis.com |
99 KB |
3 |
amazonaws.com
tslp.s3.amazonaws.com ts-uploads.s3.amazonaws.com |
193 KB |
2 |
cloudfront.net
d2wy8f7a9ursnm.cloudfront.net |
7 KB |
1 |
google.de
www.google.de |
109 B |
1 |
google.com
1 redirects
www.google.com |
178 B |
1 |
doubleclick.net
1 redirects
stats.g.doubleclick.net |
162 B |
1 |
threatsim.com
dataentry.threatsim.com |
563 B |
68 | 9 |
Domain | Requested by | |
---|---|---|
30 | o365.malware.team.emailquarantine.com |
o365.malware.team.emailquarantine.com
|
6 | www.google-analytics.com |
1 redirects
o365.malware.team.emailquarantine.com
|
3 | ajax.googleapis.com |
o365.malware.team.emailquarantine.com
|
2 | d2wy8f7a9ursnm.cloudfront.net |
o365.malware.team.emailquarantine.com
|
2 | tslp.s3.amazonaws.com |
o365.malware.team.emailquarantine.com
|
1 | ts-uploads.s3.amazonaws.com |
o365.malware.team.emailquarantine.com
|
1 | www.google.de |
o365.malware.team.emailquarantine.com
|
1 | www.google.com | 1 redirects |
1 | stats.g.doubleclick.net | 1 redirects |
1 | dataentry.threatsim.com |
ajax.googleapis.com
o365.malware.team.emailquarantine.com |
68 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.amazonaws.com DigiCert Baltimore CA-2 G2 |
2018-11-07 - 2020-02-07 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
*.google-analytics.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
*.threatsim.com COMODO RSA Domain Validation Secure Server CA |
2018-07-11 - 2020-07-25 |
2 years | crt.sh |
www.google.de Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://o365.malware.team.emailquarantine.com/load_training?guid=115d56fce1&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
Frame ID: D060560991BD6A50ADC4E63C50349766
Requests: 68 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://o365.malware.team.emailquarantine.com/115d56fce1?l=12 Page URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=115d56fce1&correlation_id=a3417d66-b900-478f-825a-a4e6b42... Page URL
Detected technologies
Apache Traffic Server (Web Servers) ExpandDetected patterns
- headers server /ATS\/?([\d.]+)?/i
BugSnag (Analytics) Expand
Detected patterns
- script /\/bugsnag.*\.js/i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://o365.malware.team.emailquarantine.com/115d56fce1?l=12 Page URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=115d56fce1&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- http://www.google-analytics.com/analytics.js HTTP 307
- https://www.google-analytics.com/analytics.js
- http://www.google-analytics.com/r/collect?v=1&_v=j78&a=781140060&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F115d56fce1%3Fl%3D12&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=147526478&gjid=1958232741&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&_r=1&z=248981589 HTTP 307
- https://www.google-analytics.com/r/collect?v=1&_v=j78&a=781140060&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F115d56fce1%3Fl%3D12&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=147526478&gjid=1958232741&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&_r=1&z=248981589 HTTP 302
- https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-83403-17&cid=154456704.1566247247&jid=147526478&_gid=172014676.1566247247&gjid=1958232741&_v=j78&z=248981589 HTTP 302
- https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-83403-17&cid=154456704.1566247247&jid=147526478&_v=j78&z=248981589 HTTP 302
- https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-83403-17&cid=154456704.1566247247&jid=147526478&_v=j78&z=248981589&slf_rd=1&random=2572097117
- http://www.google-analytics.com/collect?v=1&_v=j78&a=781140060&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F115d56fce1%3Fl%3D12&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=&gjid=&cid=154456704.1566247247&uid=115d56fce1&tid=UA-83403-17&_gid=172014676.1566247247&z=1239904833 HTTP 307
- https://www.google-analytics.com/collect?v=1&_v=j78&a=781140060&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F115d56fce1%3Fl%3D12&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=&gjid=&cid=154456704.1566247247&uid=115d56fce1&tid=UA-83403-17&_gid=172014676.1566247247&z=1239904833
- http://www.google-analytics.com/analytics.js HTTP 307
- https://www.google-analytics.com/analytics.js
- http://www.google-analytics.com/collect?v=1&_v=j78&a=2060739656&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D115d56fce1%26correlation_id%3Da3417d66-b900-478f-825a-a4e6b42ad443&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=AACAAEAB~&jid=&gjid=&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&z=951337782 HTTP 307
- https://www.google-analytics.com/collect?v=1&_v=j78&a=2060739656&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D115d56fce1%26correlation_id%3Da3417d66-b900-478f-825a-a4e6b42ad443&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=AACAAEAB~&jid=&gjid=&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&z=951337782
- http://www.google-analytics.com/collect?v=1&_v=j78&a=2060739656&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D115d56fce1%26correlation_id%3Da3417d66-b900-478f-825a-a4e6b42ad443&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=SACAAEAB~&jid=&gjid=&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&z=85001015 HTTP 307
- https://www.google-analytics.com/collect?v=1&_v=j78&a=2060739656&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D115d56fce1%26correlation_id%3Da3417d66-b900-478f-825a-a4e6b42ad443&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=SACAAEAB~&jid=&gjid=&cid=154456704.1566247247&tid=UA-83403-17&_gid=172014676.1566247247&z=85001015
68 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
115d56fce1
o365.malware.team.emailquarantine.com/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
alt_pixel_click_115d56fce1.gif
o365.malware.team.emailquarantine.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugin_detect.js
tslp.s3.amazonaws.com/detect/ |
49 KB 49 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/ |
90 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-tracking.js
o365.malware.team.emailquarantine.com/assets/ |
455 B 707 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.js
o365.malware.team.emailquarantine.com/assets/ |
28 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ Redirect Chain
|
43 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
browser_post
dataentry.threatsim.com/secure/ |
0 563 B |
XHR
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.de/ads/ Redirect Chain
|
42 B 109 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/ Redirect Chain
|
35 B 100 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
load_training
o365.malware.team.emailquarantine.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
load_training
o365.malware.team.emailquarantine.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.0/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugin_detect.js
tslp.s3.amazonaws.com/detect/ |
49 KB 49 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sutter-health-landing-2019-8164f4.jpg
ts-uploads.s3.amazonaws.com/training/production/3400/ |
94 KB 95 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.2/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-tracking.js
o365.malware.team.emailquarantine.com/assets/ |
455 B 707 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.js
o365.malware.team.emailquarantine.com/assets/ |
28 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ Redirect Chain
|
43 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/ Redirect Chain
|
35 B 100 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/ Redirect Chain
|
35 B 100 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- o365.malware.team.emailquarantine.com
- URL
- http://o365.malware.team.emailquarantine.com:49152/alt_pixel_click_115d56fce1.gif?correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20localStorage%20%3D%20false&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20sessionStorage%20%3D%20true&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20hasCookies%20%3D%20true&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20browser%20%3D%20Chrome&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20browser_version%20%3D%2074&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20os%20%3D%20Linux&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20os_version%20%3D%2010.14.5&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20language%20%3D%20en-US&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20colorDepth%20%3D%2024&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20width%20%3D%201600&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=BrowserDetect%20-%20height%20%3D%201200&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Chrome%20browser%2C%20using%20more%20detailed%20version&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20java%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20flash%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20pdf%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20quicktime%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20RealPlayer%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20Silverlight%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=Skipping%20WindowsMediaPlayer%20detection&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=redirecting%20to%20%2Fload_training%3Fguid%3D115d56fce1%26correlation_id%3Da3417d66-b900-478f-825a-a4e6b42ad443&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=115d56fce1&msg=browser_post_successful&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
- Domain
- o365.malware.team.emailquarantine.com
- URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=115d56fce1&correlation_id=a3417d66-b900-478f-825a-a4e6b42ad443
Verdicts & Comments Add Verdict or Comment
55 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Bugsnag string| training_page function| $ function| jQuery object| PluginDetect object| detector boolean| do_not_detect_java boolean| do_not_detect_flash boolean| do_not_detect_pdf boolean| do_not_detect_quicktime boolean| do_not_detect_realplayer boolean| do_not_detect_silverlight boolean| do_not_detect_wmp object| plugin_detector string| account_logo string| campaign_guid string| company_name string| company_name_possessive string| content_bucket string| correlation_id string| environment string| from_email_address string| subject_line string| target_guid string| template string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| BrowserDetect object| $_GET object| regex object| items string| last string| base_post_url function| log_error function| log_to_console function| log_message boolean| fingerprinted string| tracking_id function| strip function| secureSubmitWithGuid function| secureSubmit function| findUsername function| checkPassword function| secureLogAndRedirect function| sendFingerprint function| imageSender function| sendIndividually function| loadAllInfo object| local_addresses function| redirector function| rewriteLinks5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.emailquarantine.com/ | Name: _gid Value: GA1.2.172014676.1566247247 |
|
.emailquarantine.com/ | Name: _ga Value: GA1.2.154456704.1566247247 |
|
o365.malware.team.emailquarantine.com/ | Name: link_clicked_115d56fce1 Value: 1 |
|
.emailquarantine.com/ | Name: _gat Value: 1 |
|
o365.malware.team.emailquarantine.com/ | Name: EXFILGUID Value: 115d56fce1 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d2wy8f7a9ursnm.cloudfront.net
dataentry.threatsim.com
o365.malware.team.emailquarantine.com
stats.g.doubleclick.net
ts-uploads.s3.amazonaws.com
tslp.s3.amazonaws.com
www.google-analytics.com
www.google.com
www.google.de
dataentry.threatsim.com
o365.malware.team.emailquarantine.com
2a00:1450:4001:80b::200e
2a00:1450:4001:816::2003
2a00:1450:4001:817::200a
2a00:1450:4001:820::2004
2a00:1450:400c:c04::9b
52.20.150.97
52.216.108.115
52.216.184.43
52.3.193.16
54.230.93.22
26330fda682b7ccde451b6a0070edc9cb679507664549ca8165c6996ae66a57d
4bab432979d731f8264bcd9d40422ca7dfcfcb0e0e703288db78bbfa555f853a
60e68e300571e1182c18d4e6c979639b29e8edb140f19cb28467f3fc58dafd9b
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
9ff538f72465724fc393ea1f3c03a17233c9b7e1d440d6f8a6d0b3a836c2a9cc
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
c8ee56bd0397f2a4efd37b7e7b0a7ff94f46875bdba0c77425ea5db6fda2909c
cec3748d0c3da4700300d5424aaea375b03550b0ee8b3dd38e242c4022261446
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
ef774b5afad3123585320f1a3a50431495853e3fc1aab3a2f707a7856ea59f4d
f554d2f09272c6f71447ebfe4532d3b1dd1959bce669f9a5ccc99e64ef511729
fce517e48a56b76d45fd456264b90c82aa6e9ddb578f9f36d844ace5816d9841