URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Submission: On August 20 via api from US

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 7 HTTP transactions. The main IP is 52.20.150.97, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is o365.malware.team.emailquarantine.com.
This is the only time o365.malware.team.emailquarantine.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 52.20.150.97 14618 (AMAZON-AES)
1 54.230.93.22 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
7 4
Domain Requested by
4 o365.malware.team.emailquarantine.com o365.malware.team.emailquarantine.com
1 ajax.googleapis.com o365.malware.team.emailquarantine.com
1 d2wy8f7a9ursnm.cloudfront.net o365.malware.team.emailquarantine.com
0 tslp.s3.amazonaws.com Failed o365.malware.team.emailquarantine.com
7 4

This site contains no links.

Subject Issuer Validity Valid

1970-01-01 -
1970-01-01
a few seconds crt.sh

This page contains 1 frames:

Primary Page: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Frame ID: B49402B219869B11E0E059EEA2A3CD2D
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /ATS\/?([\d.]+)?/i

Page Statistics

7
Requests

0 %
HTTPS

33 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

47 kB
Transfer

129 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set edc7af55f0
o365.malware.team.emailquarantine.com/
3 KB
2 KB
Document
General
Full URL
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
cb7f5cb2c6c905d37b9f68aca1e57a2d3452cd83ecf33ead320305fb0a2aa9d8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
o365.malware.team.emailquarantine.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Cache-Control
max-age=0, private, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=utf-8
Date
Tue, 20 Aug 2019 15:41:21 GMT
ETag
W/"7513768d603de9e83e5207c8c90f1b9d"
Server
ThreatSim-Web-Server
Set-Cookie
EXFILGUID=edc7af55f0; path=/ link_clicked_edc7af55f0=1; path=/
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-Host-Info
lw-prd-us-i-0749509cc52ca1cdb ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Request-Id
5775b26d-d6cf-4967-b40a-0b11eb5f76d6
X-Runtime
0.009905
X-XSS-Protection
1; mode=block
Content-Length
932
Connection
keep-alive
alt_pixel_click_edc7af55f0.gif
o365.malware.team.emailquarantine.com/
0
652 B
Image
General
Full URL
http://o365.malware.team.emailquarantine.com:49152/alt_pixel_click_edc7af55f0.gif?correlation_id=d6ef7200-0b94-404e-8ced-dd416b61948c
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-Runtime
0.004482
Date
Tue, 20 Aug 2019 15:41:22 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
ThreatSim-Web-Server
X-Host-Info
lw-prd-us-i-008213d94992ef350, ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Frame-Options
SAMEORIGIN
Content-Type
image/gif; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
20
X-XSS-Protection
1; mode=block
X-Request-Id
e55ca596-4c76-4b6f-8131-c348bee65aa2
plugin_detect.js
tslp.s3.amazonaws.com/detect/
0
0

bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
http://d2wy8f7a9ursnm.cloudfront.net/bugsnag-2.min.js
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
54.230.93.22 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-22.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9ff538f72465724fc393ea1f3c03a17233c9b7e1d440d6f8a6d0b3a836c2a9cc

Request headers

Referer
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 18 Aug 2019 00:52:26 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Wed, 10 Aug 2016 00:30:49 GMT
Server
AmazonS3
Age
226142
ETag
"6103bb5e4ec6141e19e1100caafc780c"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 7c2d73d3cd46e357090188fa2946f746.cloudfront.net (CloudFront)
Cache-Control
public, max-age=604800
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Content-Length
2962
X-Amz-Cf-Id
7qolAuLP_VhyEWS0kqlsL79455dm34bxcC6HAyDxZmtLwtWMsxWX1A==
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/
90 KB
33 KB
Script
General
Full URL
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 04:33:56 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 20 Dec 2016 18:17:03 GMT
Server
sffe
Age
6865645
Vary
Accept-Encoding
Content-Type
text/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000, stale-while-revalidate=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
33018
X-XSS-Protection
0
Expires
Mon, 01 Jun 2020 04:33:56 GMT
google-tracking.js
o365.malware.team.emailquarantine.com/assets/
455 B
707 B
Script
General
Full URL
http://o365.malware.team.emailquarantine.com/assets/google-tracking.js?g=edc7af55f0
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
fce517e48a56b76d45fd456264b90c82aa6e9ddb578f9f36d844ace5816d9841

Request headers

Referer
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 20 Aug 2019 15:41:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 18 Jul 2019 23:16:27 GMT
Server
ThreatSim-Web-Server
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Content-Length
316
Expires
Thu, 31 Dec 2037 23:55:55 GMT
all.js
o365.malware.team.emailquarantine.com/assets/
28 KB
8 KB
Script
General
Full URL
http://o365.malware.team.emailquarantine.com/assets/all.js?g=edc7af55f0
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
ef774b5afad3123585320f1a3a50431495853e3fc1aab3a2f707a7856ea59f4d

Request headers

Referer
http://o365.malware.team.emailquarantine.com/edc7af55f0?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 20 Aug 2019 15:41:21 GMT
Content-Encoding
gzip
Last-Modified
Thu, 18 Jul 2019 23:16:27 GMT
Server
ThreatSim-Web-Server
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Content-Length
7339
Expires
Thu, 31 Dec 2037 23:55:55 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
tslp.s3.amazonaws.com
URL
https://tslp.s3.amazonaws.com/detect/plugin_detect.js?guid=edc7af55f0&correlation_id=d6ef7200-0b94-404e-8ced-dd416b61948c

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block