URL: https://122626262652drm12.blob.core.windows.net/
Submission: On October 09 via manual from AU

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 52.239.214.164, located in Washington, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US. The main domain is 122626262652drm12.blob.core.windows.net.
TLS certificate: Issued by Microsoft IT TLS CA 2 on April 29th 2019. Valid for: 2 years.
This is the first time this domain was scanned on urlscan.io!

Verdict: Malicious (Score: 100/100) Show Details

  • urlscan - Score: 0
  • googlesafebrowsing - Score: 100 (1 resources matched) -
    social_engineering

Domain & IP information

IP Address AS Autonomous System
1 52.239.214.164 8075 (MICROSOFT...)
1 2
Domain
Subdomains
Transfer
1 windows.net
621 B
1 1
Domain Requested by
1 122626262652drm12.blob.core.windows.net
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
*.blob.core.windows.net
Microsoft IT TLS CA 2
2019-04-29 -
2021-04-29
2 years

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
351 B
621 B
Document
General
Full URL
https://122626262652drm12.blob.core.windows.net/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.214.164 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Microsoft-HTTPAPI/2.0 /
Resource Hash
2d0995c2aff5f3a9cc2bc55aa6a7059a59b8082b50ac53a99a9c18e530f3c0a1

Request headers

Host
122626262652drm12.blob.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Content-Length
351
Content-Type
application/xml
Server
Microsoft-HTTPAPI/2.0
x-ms-request-id
01428981-c01e-008c-4ff3-7e217a000000
Date
Wed, 09 Oct 2019 22:49:35 GMT
data:truncated
data:truncated
112 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7a9ebfb7c3ecda0476f5c7350a344469673eb940d967b3bf40054fe667570f0a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

122626262652drm12.blob.core.windows.net


52.239.214.164

2d0995c2aff5f3a9cc2bc55aa6a7059a59b8082b50ac53a99a9c18e530f3c0a1
7a9ebfb7c3ecda0476f5c7350a344469673eb940d967b3bf40054fe667570f0a