msftoutlook.site
Open in
urlscan Pro
23.23.46.58
Malicious Activity!
Public Scan
Submission: On December 17 via api from JP — Scanned from JP
Summary
This is the only time msftoutlook.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 23.23.46.58 23.23.46.58 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 52.216.89.187 52.216.89.187 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2404:6800:400... 2404:6800:4004:821::200a | 15169 (GOOGLE) (GOOGLE) | |
8 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-23-23-46-58.compute-1.amazonaws.com
msftoutlook.site |
ASN16509 (AMAZON-02, US)
PTR: s3-website-us-east-1.amazonaws.com
assets.aponixtechnology.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
aponixtechnology.com
assets.aponixtechnology.com |
415 KB |
2 |
googleapis.com
ajax.googleapis.com |
97 KB |
1 |
msftoutlook.site
msftoutlook.site |
10 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | assets.aponixtechnology.com |
msftoutlook.site
|
2 | ajax.googleapis.com |
msftoutlook.site
|
1 | msftoutlook.site | |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2021-11-29 - 2022-02-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://msftoutlook.site/email/go.jsp?rid=b56668bd-42e6-4b5f-8aab-6c8b933afe4b&tid=8039&cid=22832&rid2=eb563192-3333-4bdd-b22b-8c3277098b64
Frame ID: E0981CBBBA99E576C5F9DBC1018FBA7B
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Sign in to Microsoft Online ServicesDetected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)/jquery-ui(?:\.min)?\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
go.jsp
msftoutlook.site/email/ |
9 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.js
assets.aponixtechnology.com/GL1429a018-3118-4930-833e-204505eda4cd/ |
85 KB 85 KB |
Script
text/js |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.js
assets.aponixtechnology.com/GL1429a018-3118-4930-833e-204505eda4cd/ |
126 KB 126 KB |
Script
text/js |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
assets.aponixtechnology.com/GL1429a018-3118-4930-833e-204505eda4cd/ |
4 KB 5 KB |
Image
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.min.js
ajax.googleapis.com/ajax/libs/jqueryui/1.12.1/ |
248 KB 66 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csrfGuard.js
assets.aponixtechnology.com/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
illustration.jpg
assets.aponixtechnology.com/GL1429a018-3118-4930-833e-204505eda4cd/ |
199 KB 199 KB |
Image
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| ErrorCodes object| Constants object| Context object| Background object| Logo object| Instrument object| User object| tenant_info function| pageOnReady object| Util object| PostType object| LoginOption object| Post function| origHide function| origShow function| origAddClass function| origRemoveClass object| Support object| users object| Tiles object| HIP object| EmailDiscovery object| ProofUp object| StrongAuthCheck object| ThirdPartyCookieStates object| TenantBranding object| MSLogin object| jQuery15105549139435370101 object| HIP_MODE object| MSStrongAuth object| MSLogout1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
msftoutlook.site/ | Name: JSESSIONID Value: A54698B4320F30F4C7F426E9AB607675 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self' *.aponixtechnology.com *.acaaponix.com *.acacompliancegroup.com *.compliancealpha.com *.devacaalpha.com |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
assets.aponixtechnology.com
msftoutlook.site
23.23.46.58
2404:6800:4004:821::200a
52.216.89.187
14e8877ec7f8df8ad57e1f78c0216bcdc8d3c6b3e3c3dd9cca197e3a00cbad80
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
2fe89dc1ce63fac12e1b70979106a9a9015de409cb850f5d63ddf0754b5a4111
55accff7b642c2d7a402cbe03c1494c0f14a76bc03dee9d47d219562b6a152a5
7e50e406688bd898803f653058d14ca384734cb9b39ba900bc5e2734b59c073b
e72eb8a49195cb7ccd34520b1495100dad4e64cda8c3e98c1c8611d7eb91e353
fc5c3d7d2b298a42ec44dad2d8cd227b734db966b4afa68c0254a497e805f603