![](/screenshots/74906e99-2a2e-49cf-aa86-a5f46cffb4fb.png)
outlookloffice365userpi90nmxv.firebaseapp.com
Open in
urlscan Pro
151.101.65.195
Malicious Activity!
Public Scan
Effective URL: https://outlookloffice365userpi90nmxv.firebaseapp.com/8e2fb03af0b922d50fa7fa4bd5218e39d41d8cd98f00b204e9800998ecf8427e
Submission: On July 11 via manual from US
Summary
TLS certificate: Issued by GTS CA 1O1 on October 31st 2018. Valid for: a year.
This is the only time outlookloffice365userpi90nmxv.firebaseapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:26f0:6c0... 2a02:26f0:6c00::210:ba09 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 2 | 40.122.110.154 40.122.110.154 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
1 | 151.101.65.195 151.101.65.195 | 54113 (FASTLY) (FASTLY - Fastly) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
4 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
sf982uwef23.azurewebsites.net |
ASN54113 (FASTLY - Fastly, US)
outlookloffice365userpi90nmxv.firebaseapp.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
283 KB |
2 |
azurewebsites.net
2 redirects
sf982uwef23.azurewebsites.net |
1 KB |
1 |
jquery.com
code.jquery.com |
81 KB |
1 |
firebaseapp.com
outlookloffice365userpi90nmxv.firebaseapp.com |
28 KB |
1 |
azureedge.net
1 redirects
jtdeb.azureedge.net |
668 B |
6 | 5 |
Domain | Requested by | |
---|---|---|
4 | secure.aadcdn.microsoftonline-p.com |
outlookloffice365userpi90nmxv.firebaseapp.com
|
2 | sf982uwef23.azurewebsites.net | 2 redirects |
1 | code.jquery.com |
outlookloffice365userpi90nmxv.firebaseapp.com
|
1 | outlookloffice365userpi90nmxv.firebaseapp.com | |
1 | jtdeb.azureedge.net | 1 redirects |
6 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
login.microsoftonline.com |
login.live.com |
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
firebaseapp.com GTS CA 1O1 |
2018-10-31 - 2019-10-30 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 1 |
2017-08-15 - 2019-08-15 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://outlookloffice365userpi90nmxv.firebaseapp.com/8e2fb03af0b922d50fa7fa4bd5218e39d41d8cd98f00b204e9800998ecf8427e
Frame ID: C7B03CA389AF5AEC0F0AE4CA7E049B0B
Requests: 6 HTTP requests in this frame
Screenshot
![](/screenshots/74906e99-2a2e-49cf-aa86-a5f46cffb4fb.png)
Page URL History Show full URLs
-
https://jtdeb.azureedge.net/019WLD3?dyu=a2xraW5nQGVhc3RtYW4uY29t&eastman.comklking@eastman.coma2xraW5nQG...
HTTP 301
https://sf982uwef23.azurewebsites.net/olo?em=a2xraW5nQGVhc3RtYW4uY29t&title=0&dyu=a2xraW5nQGVhc3RtYW4uY29t&eas... HTTP 301
https://sf982uwef23.azurewebsites.net/olo/?em=a2xraW5nQGVhc3RtYW4uY29t&title=0&dyu=a2xraW5nQGVhc3RtYW4uY29t&ea... HTTP 302
https://outlookloffice365userpi90nmxv.firebaseapp.com/8e2fb03af0b922d50fa7fa4bd5218e39d41d8cd98f00b204e9800998ecf8427e Page URL
Detected technologies
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Can’t access your account?
Search URL Search Domain Scan URL
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://jtdeb.azureedge.net/019WLD3?dyu=a2xraW5nQGVhc3RtYW4uY29t&eastman.comklking@eastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t
HTTP 301
https://sf982uwef23.azurewebsites.net/olo?em=a2xraW5nQGVhc3RtYW4uY29t&title=0&dyu=a2xraW5nQGVhc3RtYW4uY29t&eastman.comklking@eastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t HTTP 301
https://sf982uwef23.azurewebsites.net/olo/?em=a2xraW5nQGVhc3RtYW4uY29t&title=0&dyu=a2xraW5nQGVhc3RtYW4uY29t&eastman.comklking@eastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&klkingeastman.coma2xraW5nQGVhc3RtYW4uY29t&a2xraW5nQGVhc3RtYW4uY29t HTTP 302
https://outlookloffice365userpi90nmxv.firebaseapp.com/8e2fb03af0b922d50fa7fa4bd5218e39d41d8cd98f00b204e9800998ecf8427e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
8e2fb03af0b922d50fa7fa4bd5218e39d41d8cd98f00b204e9800998ecf8427e
outlookloffice365userpi90nmxv.firebaseapp.com/ Redirect Chain
|
226 KB 28 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ |
915 B 641 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| goNext function| goBack function| closeBox function| checkSubmit function| isEmail function| iserror0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
jtdeb.azureedge.net
outlookloffice365userpi90nmxv.firebaseapp.com
secure.aadcdn.microsoftonline-p.com
sf982uwef23.azurewebsites.net
151.101.65.195
205.185.208.52
2a02:26f0:6c00:283::35c1
2a02:26f0:6c00::210:ba09
40.122.110.154
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
d9dbd2e1b2cf520eac195ed67cb6f70b69284e0fbd501c00c3d37021959648bf
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea