![](/screenshots/9a562b81-2319-4cf4-95e8-ff21146f38ef.png)
deliverymicrosoft.com
Open in
urlscan Pro
104.21.94.231
Malicious Activity!
Public Scan
Submission Tags: @ecarlesi threat #phishing Search All
Submission: On October 26 via api from PL — Scanned from PL
Summary
This is the only time deliverymicrosoft.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 104.21.94.231 104.21.94.231 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 172.64.103.11 172.64.103.11 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 195.181.170.19 195.181.170.19 | 60068 (CDN77 ^_^) (CDN77 ^_^) | |
12 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
deliverymicrosoft.com
deliverymicrosoft.com |
1 MB |
3 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 410 |
64 KB |
2 |
icons8.com
maxcdn.icons8.com — Cisco Umbrella Rank: 211057 |
51 KB |
2 |
fontawesome.com
use.fontawesome.com — Cisco Umbrella Rank: 1951 |
26 KB |
12 | 4 |
Domain | Requested by | |
---|---|---|
5 | deliverymicrosoft.com |
deliverymicrosoft.com
|
3 | cdnjs.cloudflare.com |
deliverymicrosoft.com
|
2 | maxcdn.icons8.com |
deliverymicrosoft.com
maxcdn.icons8.com |
2 | use.fontawesome.com |
deliverymicrosoft.com
use.fontawesome.com |
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
use.fontawesome.com Cloudflare Inc ECC CA-3 |
2023-10-12 - 2024-10-10 |
a year | crt.sh |
1220595937.rsc.cdn77.org R3 |
2023-10-18 - 2024-01-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://deliverymicrosoft.com/
Frame ID: 1ED6534D8058C7363C5F511B3F2FB83F
Requests: 12 HTTP requests in this frame
Screenshot
![](/screenshots/9a562b81-2319-4cf4-95e8-ff21146f38ef.png)
Page Title
Sign in to your Microsoft accountDetected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
deliverymicrosoft.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.5.0/css/ |
157 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.12.0/css/ |
56 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
line-awesome.min.css
maxcdn.icons8.com/fonts/line-awesome/1.1/css/ |
27 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.min.css
deliverymicrosoft.com/assets/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
deliverymicrosoft.com/assets/img/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.5.1/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.5.0/js/ |
79 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.min.js
deliverymicrosoft.com/assets/js/ |
3 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
deliverymicrosoft.com/assets/img/ |
1 MB 1 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
use.fontawesome.com/releases/v5.12.0/webfonts/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
line-awesome.woff2
maxcdn.icons8.com/fonts/line-awesome/1.1/fonts/ |
44 KB 45 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap string| client_address string| campana function| validateEmail function| validate function| sendData function| validatePassword object| input1 object| input20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
deliverymicrosoft.com
maxcdn.icons8.com
use.fontawesome.com
104.17.25.14
104.21.94.231
172.64.103.11
195.181.170.19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