o365.malware.team.emailquarantine.com
Open in
urlscan Pro
52.3.193.16
Public Scan
Effective URL: http://o365.malware.team.emailquarantine.com/load_training?guid=12e4429c51&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
Submission: On August 19 via api from US
Summary
This is the only time o365.malware.team.emailquarantine.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
31 | 52.3.193.16 52.3.193.16 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
2 | 52.216.64.72 52.216.64.72 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 54.230.93.22 54.230.93.22 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
3 | 2a00:1450:400... 2a00:1450:4001:81f::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 6 | 2a00:1450:400... 2a00:1450:4001:80b::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
6 | 52.20.150.97 52.20.150.97 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 2 | 2a00:1450:400... 2a00:1450:400c:c00::9a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 2 | 2a00:1450:400... 2a00:1450:4001:820::2004 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a00:1450:400... 2a00:1450:4001:816::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 52.216.164.139 52.216.164.139 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
71 | 11 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-3-193-16.compute-1.amazonaws.com
o365.malware.team.emailquarantine.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: s3-1-w.amazonaws.com
tslp.s3.amazonaws.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-54-230-93-22.fra2.r.cloudfront.net
d2wy8f7a9ursnm.cloudfront.net |
ASN15169 (GOOGLE - Google LLC, US)
ajax.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
www.google-analytics.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-20-150-97.compute-1.amazonaws.com
dataentry.threatsim.com |
ASN15169 (GOOGLE - Google LLC, US)
stats.g.doubleclick.net |
ASN15169 (GOOGLE - Google LLC, US)
www.google.com |
ASN15169 (GOOGLE - Google LLC, US)
www.google.de |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
ts-uploads.s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
31 |
emailquarantine.com
o365.malware.team.emailquarantine.com |
34 KB |
6 |
threatsim.com
dataentry.threatsim.com |
563 B |
6 |
google-analytics.com
1 redirects
www.google-analytics.com |
35 KB |
3 |
googleapis.com
ajax.googleapis.com |
99 KB |
3 |
amazonaws.com
tslp.s3.amazonaws.com ts-uploads.s3.amazonaws.com |
193 KB |
2 |
google.de
www.google.de |
483 B |
2 |
google.com
1 redirects
www.google.com |
437 B |
2 |
doubleclick.net
1 redirects
stats.g.doubleclick.net |
513 B |
2 |
cloudfront.net
d2wy8f7a9ursnm.cloudfront.net |
7 KB |
71 | 9 |
Domain | Requested by | |
---|---|---|
31 | o365.malware.team.emailquarantine.com |
o365.malware.team.emailquarantine.com
|
6 | dataentry.threatsim.com |
ajax.googleapis.com
o365.malware.team.emailquarantine.com |
6 | www.google-analytics.com |
1 redirects
o365.malware.team.emailquarantine.com
www.google-analytics.com |
3 | ajax.googleapis.com |
o365.malware.team.emailquarantine.com
|
2 | www.google.de |
o365.malware.team.emailquarantine.com
|
2 | www.google.com |
1 redirects
o365.malware.team.emailquarantine.com
|
2 | stats.g.doubleclick.net |
1 redirects
www.google-analytics.com
|
2 | d2wy8f7a9ursnm.cloudfront.net |
o365.malware.team.emailquarantine.com
|
2 | tslp.s3.amazonaws.com |
o365.malware.team.emailquarantine.com
|
1 | ts-uploads.s3.amazonaws.com |
o365.malware.team.emailquarantine.com
|
71 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
*.s3.amazonaws.com DigiCert Baltimore CA-2 G2 |
2018-11-07 - 2020-02-07 |
a year | crt.sh |
*.google-analytics.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
*.threatsim.com COMODO RSA Domain Validation Secure Server CA |
2018-07-11 - 2020-07-25 |
2 years | crt.sh |
www.google.de Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
*.g.doubleclick.net GTS CA 1O1 |
2019-07-29 - 2019-10-27 |
3 months | crt.sh |
www.google.com Google Internet Authority G3 |
2019-07-29 - 2019-10-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://o365.malware.team.emailquarantine.com/load_training?guid=12e4429c51&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
Frame ID: B44F345A0C11E4F94A16BF333A78AC9E
Requests: 71 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://o365.malware.team.emailquarantine.com/12e4429c51?l=12& Page URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=12e4429c51&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bf... Page URL
Detected technologies
Apache Traffic Server (Web Servers) ExpandDetected patterns
- headers server /ATS\/?([\d.]+)?/i
BugSnag (Analytics) Expand
Detected patterns
- script /\/bugsnag.*\.js/i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://o365.malware.team.emailquarantine.com/12e4429c51?l=12& Page URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=12e4429c51&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- http://www.google-analytics.com/analytics.js HTTP 307
- https://www.google-analytics.com/analytics.js
- http://www.google-analytics.com/r/collect?v=1&_v=j78&a=1934727827&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F12e4429c51%3Fl%3D12%26amp&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=1090762740&gjid=844642048&cid=2132550815.1566255280&tid=UA-83403-17&_gid=1179789741.1566255280&_r=1&z=1216415688 HTTP 307
- https://www.google-analytics.com/r/collect?v=1&_v=j78&a=1934727827&t=pageview&_s=1&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F12e4429c51%3Fl%3D12%26amp&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=1090762740&gjid=844642048&cid=2132550815.1566255280&tid=UA-83403-17&_gid=1179789741.1566255280&_r=1&z=1216415688 HTTP 302
- https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-83403-17&cid=2132550815.1566255280&jid=1090762740&_gid=1179789741.1566255280&gjid=844642048&_v=j78&z=1216415688 HTTP 302
- https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-83403-17&cid=2132550815.1566255280&jid=1090762740&_v=j78&z=1216415688 HTTP 302
- https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-83403-17&cid=2132550815.1566255280&jid=1090762740&_v=j78&z=1216415688&slf_rd=1&random=2135528974
- http://www.google-analytics.com/collect?v=1&_v=j78&a=1934727827&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F12e4429c51%3Fl%3D12%26amp&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=&gjid=&cid=2132550815.1566255280&uid=12e4429c51&tid=UA-83403-17&_gid=1179789741.1566255280&z=1708713440 HTTP 307
- https://www.google-analytics.com/collect?v=1&_v=j78&a=1934727827&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2F12e4429c51%3Fl%3D12%26amp&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=&gjid=&cid=2132550815.1566255280&uid=12e4429c51&tid=UA-83403-17&_gid=1179789741.1566255280&z=1708713440
- http://www.google-analytics.com/analytics.js HTTP 307
- https://www.google-analytics.com/analytics.js
- http://www.google-analytics.com/collect?v=1&_v=j78&a=176086415&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D12e4429c51%26correlation_id%3D3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aEBAAMABAAAAAC~&jid=&gjid=&cid=1419498041.1566255281&tid=UA-83403-17&_gid=427833585.1566255281&z=182718864 HTTP 307
- https://www.google-analytics.com/collect?v=1&_v=j78&a=176086415&t=pageview&_s=2&dl=http%3A%2F%2Fo365.malware.team.emailquarantine.com%2Fload_training%3Fguid%3D12e4429c51%26correlation_id%3D3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7&ul=en-us&de=UTF-8&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aEBAAMABAAAAAC~&jid=&gjid=&cid=1419498041.1566255281&tid=UA-83403-17&_gid=427833585.1566255281&z=182718864
71 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
12e4429c51
o365.malware.team.emailquarantine.com/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alt_pixel_click_12e4429c51.gif
o365.malware.team.emailquarantine.com/ |
0 652 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugin_detect.js
tslp.s3.amazonaws.com/detect/ |
49 KB 49 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/ |
90 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-tracking.js
o365.malware.team.emailquarantine.com/assets/ |
455 B 707 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.js
o365.malware.team.emailquarantine.com/assets/ |
28 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ Redirect Chain
|
43 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
browser_post
dataentry.threatsim.com/secure/ |
0 563 B |
XHR
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
dataentry.threatsim.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
dataentry.threatsim.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
dataentry.threatsim.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
dataentry.threatsim.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
dataentry.threatsim.com/ |
0 0 |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.de/ads/ Redirect Chain
|
42 B 374 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/ Redirect Chain
|
35 B 122 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
trace
dataentry.threatsim.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
load_training
o365.malware.team.emailquarantine.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
load_training
o365.malware.team.emailquarantine.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.0/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugin_detect.js
tslp.s3.amazonaws.com/detect/ |
49 KB 49 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sutter-health-landing-2019-8164f4.jpg
ts-uploads.s3.amazonaws.com/training/production/3400/ |
94 KB 95 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.2/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-tracking.js
o365.malware.team.emailquarantine.com/assets/ |
455 B 707 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.js
o365.malware.team.emailquarantine.com/assets/ |
28 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ Redirect Chain
|
43 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
collect
www.google-analytics.com/j/ |
2 B 138 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
collect
stats.g.doubleclick.net/j/ |
4 B 164 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.com/ads/ |
42 B 120 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ga-audiences
www.google.de/ads/ |
42 B 109 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/ Redirect Chain
|
35 B 99 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trace
o365.malware.team.emailquarantine.com/ |
0 564 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20os%20%3D%20Linux&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20os_version%20%3D%2010.14.5&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20language%20%3D%20en-US&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20colorDepth%20%3D%2024&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20width%20%3D%201600&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=BrowserDetect%20-%20height%20%3D%201200&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Chrome%20browser%2C%20using%20more%20detailed%20version&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20java%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20flash%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20pdf%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20quicktime%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20RealPlayer%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20Silverlight%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=Skipping%20WindowsMediaPlayer%20detection&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=redirecting%20to%20%2Fload_training%3Fguid%3D12e4429c51%26correlation_id%3D3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- dataentry.threatsim.com
- URL
- https://dataentry.threatsim.com/trace?id=12e4429c51&msg=browser_post_successful&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
- Domain
- o365.malware.team.emailquarantine.com
- URL
- http://o365.malware.team.emailquarantine.com/load_training?guid=12e4429c51&correlation_id=3a9dbf76-8eb9-4f6d-a03b-4a0d7bfb05e7
Verdicts & Comments Add Verdict or Comment
55 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Bugsnag string| training_page function| $ function| jQuery object| PluginDetect object| detector boolean| do_not_detect_java boolean| do_not_detect_flash boolean| do_not_detect_pdf boolean| do_not_detect_quicktime boolean| do_not_detect_realplayer boolean| do_not_detect_silverlight boolean| do_not_detect_wmp object| plugin_detector string| account_logo string| campaign_guid string| company_name string| company_name_possessive string| content_bucket string| correlation_id string| environment string| from_email_address string| subject_line string| target_guid string| template string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| BrowserDetect object| $_GET object| regex object| items string| last string| base_post_url function| log_error function| log_to_console function| log_message boolean| fingerprinted string| tracking_id function| strip function| secureSubmitWithGuid function| secureSubmit function| findUsername function| checkPassword function| secureLogAndRedirect function| sendFingerprint function| imageSender function| sendIndividually function| loadAllInfo object| local_addresses function| redirector function| rewriteLinks3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.emailquarantine.com/ | Name: _gat Value: 1 |
|
.emailquarantine.com/ | Name: _gid Value: GA1.2.427833585.1566255281 |
|
.emailquarantine.com/ | Name: _ga Value: GA1.2.1419498041.1566255281 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d2wy8f7a9ursnm.cloudfront.net
dataentry.threatsim.com
o365.malware.team.emailquarantine.com
stats.g.doubleclick.net
ts-uploads.s3.amazonaws.com
tslp.s3.amazonaws.com
www.google-analytics.com
www.google.com
www.google.de
dataentry.threatsim.com
o365.malware.team.emailquarantine.com
2a00:1450:4001:80b::200e
2a00:1450:4001:816::2003
2a00:1450:4001:81f::200a
2a00:1450:4001:820::2004
2a00:1450:400c:c00::9a
52.20.150.97
52.216.164.139
52.216.64.72
52.3.193.16
54.230.93.22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