c1-word-view-15.cdn.office.net Open in urlscan Pro
2a02:26f0:6c00:294::4b36  Public Scan

URL: https://c1-word-view-15.cdn.office.net/wv/s/hAD30515D3F38158B_App_Scripts/word.boot.js
Submission: On December 13 via manual from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a02:26f0:6c00:294::4b36, located in Frankfurt am Main, Germany and belongs to AKAMAI-ASN1, NL. The main domain is c1-word-view-15.cdn.office.net.
TLS certificate: Issued by Microsoft RSA TLS CA 01 on January 26th 2021. Valid for: a year.
This is the only time c1-word-view-15.cdn.office.net was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 1
Apex Domain
Subdomains
Transfer
1 office.net
c1-word-view-15.cdn.office.net
32 KB
1 1
Domain Requested by
1 c1-word-view-15.cdn.office.net
1 1

This site contains no links.

Subject Issuer Validity Valid
*.cdn.office.net
Microsoft RSA TLS CA 01
2021-01-26 -
2022-01-26
a year crt.sh

This page contains 1 frames:

Primary Page: https://c1-word-view-15.cdn.office.net/wv/s/hAD30515D3F38158B_App_Scripts/word.boot.js
Frame ID: 2CE909A54F50129C7DDD05790B2E6CB6
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

32 kB
Transfer

128 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request word.boot.js
c1-word-view-15.cdn.office.net/wv/s/hAD30515D3F38158B_App_Scripts/
128 KB
32 KB
Document
General
Full URL
https://c1-word-view-15.cdn.office.net/wv/s/hAD30515D3F38158B_App_Scripts/word.boot.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:294::4b36 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
ad30515d3f38158bef1e9e54f24536ae84cf4dfd8e930dc4c44e414be34dede4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Cache-Control
public,max-age=31536000
Content-Length
31623
Content-Type
application/javascript
Content-Encoding
br
Last-Modified
Tue, 07 Dec 2021 17:02:01 GMT
Accept-Ranges
bytes
ETag
W/"a6c053278cebd71:0"
P3P
CP="CAO DSP COR ADMa DEV CONi TELi CUR PSA PSD TAI IVDi OUR SAMi BUS DEM NAV STA UNI COM INT PHY ONL FIN PUR"
X-CorrelationId
6d4386bf-d411-4dbf-b6f7-a9e7e8192aa6
X-UserSessionId
6d4386bf-d411-4dbf-b6f7-a9e7e8192aa6
Strict-Transport-Security
max-age=31536000
Timing-Allow-Origin
*
X-OfficeFE
DB5PEPF000083EC
X-OfficeVersion
16.0.14723.41020
X-OfficeCluster
PIE1
Access-Control-Allow-Origin
*
Cross-Origin-Resource-Policy
cross-origin
X-OFFICEFD
DB5PEPF000083EC
X-MSEdge-Flight
2i49=afd_wacinfra4,2i4a=afd_wacinfra5
X-MSEdge-Features
typeheadertest,afd_waccluster,afd_powerpointslice_control,afd_visioslice_control,afd_wacinfra4,afd_wacinfra5
X-MSEdge-Ref
Ref A: A0FA668599484817A88DB8A08264C0EE Ref B: AMS04EDGE1219 Ref C: 2021-12-07T17:02:01Z
Date
Mon, 13 Dec 2021 16:47:55 GMT
Connection
keep-alive

Verdicts & Comments Add Verdict or Comment

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

c1-word-view-15.cdn.office.net
2a02:26f0:6c00:294::4b36
ad30515d3f38158bef1e9e54f24536ae84cf4dfd8e930dc4c44e414be34dede4