office365-parsec-280413.uc.r.appspot.com
Open in
urlscan Pro
2a00:1450:4001:809::2014
Malicious Activity!
Public Scan
Submission: On July 05 via api from TW
Summary
This is the only time office365-parsec-280413.uc.r.appspot.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2a00:1450:400... 2a00:1450:4001:809::2014 | 15169 (GOOGLE) (GOOGLE) | |
9 | 1 |
ASN15169 (GOOGLE, US)
office365-parsec-280413.uc.r.appspot.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
appspot.com
office365-parsec-280413.uc.r.appspot.com |
466 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
9 | office365-parsec-280413.uc.r.appspot.com |
office365-parsec-280413.uc.r.appspot.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://office365-parsec-280413.uc.r.appspot.com/
Frame ID: 8ADF42C2B7DAE2EB70C76A64AD153013
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
Google App Engine (Web Servers) ExpandDetected patterns
- headers server /Google Frontend/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
office365-parsec-280413.uc.r.appspot.com/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
render.css
office365-parsec-280413.uc.r.appspot.com/css/ |
235 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ging.jpg
office365-parsec-280413.uc.r.appspot.com/img/ |
14 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
drama.jpg
office365-parsec-280413.uc.r.appspot.com/img/ |
15 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dbrok.jpg
office365-parsec-280413.uc.r.appspot.com/img/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angle.jpg
office365-parsec-280413.uc.r.appspot.com/img/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hna.js
office365-parsec-280413.uc.r.appspot.com/ |
86 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
honest.jpg
office365-parsec-280413.uc.r.appspot.com/img/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
humn.png
office365-parsec-280413.uc.r.appspot.com/img/ |
47 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| empty0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
office365-parsec-280413.uc.r.appspot.com
2a00:1450:4001:809::2014
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
12ffeca3cf0b1850e44af6a9f45a1b03d57b85270e9f9e6f8edafd3c8474d26f
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
23bf5f1f64a76706c1324f161865d0c6d4b74f3a67dea4e2497b4a03a74c0d2c
44f9aae3d8daf011ab4c7552945e6b2ca058ff468e3513210c92d793b515b7d9
6c52e71a5c3609c82f9a1f9302351e7dcfb37810570c0395ba649cfd06f0b350
9d53dd4935e62afd80b117b1317501e27917b8483fbcab4b19f6ad4e06cdca31
d6d094ac1b37248aa5e508fd296d1980c8ed37b980da3b523132c1b470f129f3
f9d72cd248c21ae926f396fa5e666aa01355f15a356f4ac8aa7f0c38a93d0c20