URL: http://40.90.22.191/
Submission Tags: tweet @phishinghunter_ #microsoft #phishing #alert #scam #scampage Search All
Submission: On April 15 via api from FI — Scanned from FI

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 2 HTTP transactions. The main IP is 40.90.22.191, located in San Jose, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is 40.90.22.191.
This is the only time 40.90.22.191 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 40.90.22.191 8075 (MICROSOFT...)
2 1
Apex Domain
Subdomains
Transfer
2 0
Domain Requested by
2 0

This site contains no links.

Subject Issuer Validity Valid
login.live.com
DigiCert SHA2 Secure Server CA
2023-02-13 -
2024-02-13
a year crt.sh

This page contains 1 frames:

Primary Page: http://40.90.22.191/
Frame ID: D99D3FD415E35AE52C0C276E646D555F
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Microsoft-tili

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

5 kB
Transfer

6 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
40.90.22.191/
4 KB
2 KB
Document
General
Full URL
http://40.90.22.191/
Protocol
HTTP/1.1
Server
40.90.22.191 San Jose, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
89b6311cce1964e71f0a13c52e42ccfc5b0b67a8eb2ecee62d7667231d9caa7f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36
accept-language
fi-FI,fi;q=0.9

Response headers

Content-Encoding
gzip
Content-Length
1917
Content-Type
text/html; charset=utf-8
Date
Sat, 15 Apr 2023 17:04:00 GMT
PPServer
PPV: 30 H: BY1PPF127E51EC3 V: 0
Referrer-Policy
strict-origin-when-cross-origin
Server
Microsoft-IIS/10.0
Strict-Transport-Security
max-age=31536000
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
x-ms-request-id
32366a36-f3e9-4a53-8fc9-6c93d09d3069
x-ms-responsehealth
TargetId=BY1PPF127E51EC3 TargetId=BY1PPF127E51EC3
x-ms-route-info
C105_BAY
ms-logo-v2.jpg
40.90.22.191/images/
3 KB
3 KB
Image
General
Full URL
https://40.90.22.191/images/ms-logo-v2.jpg
Requested by
Host: 40.90.22.191
URL: http://40.90.22.191/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
40.90.22.191 San Jose, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
bc2b16b51738b77d94ed7591ad1033fa804297ca9faaa35222aa65773f749164
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
http://40.90.22.191/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Sat, 15 Apr 2023 17:04:01 GMT
x-ms-responsehealth
TargetId=BY1PPF1922ABCD1
x-content-type-options
nosniff
last-modified
Thu, 16 Mar 2023 21:35:00 GMT
server
Microsoft-IIS/10.0
ppserver
PPV: 30 H: BY1PPF1922ABCD1 V: 0
etag
"09a23294f58d91:0"
content-type
image/jpeg
x-ms-request-id
e65065a9-a95c-420c-a56c-15e7114fd611
cache-control
max-age=31536000
accept-ranges
bytes
content-length
2797
x-xss-protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| EndPPCRL function| BodyLoad function| WizardExternalHelper string| g_strInlineGenericError object| channelMessage object| externalHelper function| OnBack function| OnNext

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

40.90.22.191
89b6311cce1964e71f0a13c52e42ccfc5b0b67a8eb2ecee62d7667231d9caa7f
bc2b16b51738b77d94ed7591ad1033fa804297ca9faaa35222aa65773f749164