URL: https://r4.res.office365.com/owa/prem/16.2389.15.2575947/scripts/microsoft.owa.core.sync.js
Submission Tags: falconsandbox
Submission: On January 23 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a02:26f0:6c00:28a::753, located in Ascension Island and belongs to AKAMAI-ASN1, NL. The main domain is r4.res.office365.com.
TLS certificate: Issued by Microsoft RSA TLS CA 02 on January 20th 2021. Valid for: a year.
This is the only time r4.res.office365.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 1
Apex Domain
Subdomains
Transfer
1 office365.com
r4.res.office365.com
32 KB
1 1
Domain Requested by
1 r4.res.office365.com
1 1

This site contains no links.

Subject Issuer Validity Valid
*.res.outlook.com
Microsoft RSA TLS CA 02
2021-01-20 -
2022-01-20
a year crt.sh

This page contains 1 frames:

Primary Page: https://r4.res.office365.com/owa/prem/16.2389.15.2575947/scripts/microsoft.owa.core.sync.js
Frame ID: F23DA15C4AD651FE4B5FA06ABEF996EC
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

32 kB
Transfer

112 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request microsoft.owa.core.sync.js
r4.res.office365.com/owa/prem/16.2389.15.2575947/scripts/
112 KB
32 KB
Document
General
Full URL
https://r4.res.office365.com/owa/prem/16.2389.15.2575947/scripts/microsoft.owa.core.sync.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:28a::753 , Ascension Island, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash
4dd663873d712686a4b0bd5a8e551e4dbdc917a5083d2334d8e9cbf4d60fc831
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
r4.res.office365.com
:scheme
https
:path
/owa/prem/16.2389.15.2575947/scripts/microsoft.owa.core.sync.js
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

accept-ranges
bytes
content-type
application/x-javascript
last-modified
Thu, 21 Jun 2018 19:24:58 GMT
server
AkamaiNetStorage
vary
Accept-Encoding
content-encoding
gzip
cache-control
public,max-age=630720000, s-maxage=630720000
date
Sat, 23 Jan 2021 05:17:24 GMT
content-length
32658
timing-allow-origin
*
access-control-allow-origin
*
strict-transport-security
max-age=31536000; includeSubDomains

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

r4.res.office365.com
2a02:26f0:6c00:28a::753
4dd663873d712686a4b0bd5a8e551e4dbdc917a5083d2334d8e9cbf4d60fc831