Submitted URL: https://attachments.office.net/owa/paula-starr%40cherokee.org/service.svc/s/GetFileAttachment
Effective URL: https://outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/GetAttachmentDownloadToken?redirect=%2fowa%2fpaula-st...
Submission: On June 19 via api from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2603:1026:c0d:34::2, located in Frankfurt am Main, Germany and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is outlook.office365.com. The Cisco Umbrella rank of the primary domain is 31.
TLS certificate: Issued by DigiCert Cloud Services CA-1 on January 22nd 2024. Valid for: a year.
This is the only time outlook.office365.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2603:1026:c0d... 8075 (MICROSOFT...)
1 2603:1026:c0d... 8075 (MICROSOFT...)
1 2
Apex Domain
Subdomains
Transfer
1 office365.com
outlook.office365.com — Cisco Umbrella Rank: 31
1 office.net
attachments.office.net — Cisco Umbrella Rank: 833
1 KB
1 2
Domain Requested by
1 outlook.office365.com
1 attachments.office.net 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
outlook.com
DigiCert Cloud Services CA-1
2024-01-22 -
2025-01-21
a year crt.sh

This page contains 1 frames:

Primary Page: https://outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/GetAttachmentDownloadToken?redirect=%2fowa%2fpaula-starr%40cherokee.org%2fservice.svc%2fs%2fGetFileAttachment
Frame ID: 04B2CEBD0C1BEF32E0ECE24D32322DD0
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

outlook.office365.com

Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

0 kB
Transfer

8 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request GetAttachmentDownloadToken
outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/
Redirect Chain
  • https://attachments.office.net/owa/paula-starr%40cherokee.org/service.svc/s/GetFileAttachment
  • https://outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/GetAttachmentDownloadToken?redirect=%2fowa%2fpaula-starr%40cherokee.org%2fservice.svc%2fs%2fGetFileAttachment
0
0
Document
General
Full URL
https://outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/GetAttachmentDownloadToken?redirect=%2fowa%2fpaula-starr%40cherokee.org%2fservice.svc%2fs%2fGetFileAttachment
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2603:1026:c0d:34::2 Frankfurt am Main, Germany, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
sec-ch-ua
"Google Chrome";v="126", "Not:A-Brand";v="8", "Chromium";v="126"
sec-ch-ua-mobile
?0
sec-ch-ua-platform
"Win32"

Response headers

alt-svc
h3=":443";ma=2592000,h3-29=":443";ma=2592000
content-length
0
date
Wed, 19 Jun 2024 20:16:39 GMT
nel
{"report_to":"NelOfficeUpload1","max_age":7200,"include_subdomains":true,"failure_fraction":1.0,"success_fraction":0.01}
report-to
{"group":"NelOfficeUpload1","max_age":7200,"endpoints":[{"url":"https://exo.nel.measure.office.net/api/report?TenantId=&FrontEnd=Cafe&DestinationEndpoint=FRA&RemoteIP=2a01:4a0:1338::&Environment=MT"}],"include_subdomains":true}
request-id
29968fea-2e05-e8ab-3276-246ca66a386b
server
Microsoft-IIS/10.0
strict-transport-security
max-age=31536000; includeSubDomains; preload
www-authenticate
Bearer client_id="00000002-0000-0ff1-ce00-000000000000", trusted_issuers="00000001-0000-0000-c000-000000000000@*", token_types="app_asserted_user_v1 service_asserted_app_v1", authorization_uri="https://login.microsoftonline.com/common/oauth2/authorize"
x-backend-begin
2024-06-19T20:16:40.383
x-backend-end
2024-06-19T20:16:40.383
x-backendhttpstatus
401 401
x-beserver
BLAPR09MB7361
x-besku
WCS6
x-calculatedbetarget
BLAPR09MB7361.namprd09.prod.outlook.com
x-calculatedfetarget
BLAPR03CU006.internal.outlook.com
x-content-type-options
nosniff
x-diaginfo
BLAPR09MB7361
x-feefzinfo
FRA
x-feproxyinfo
FR2P281CA0023.DEUP281.PROD.OUTLOOK.COM
x-feserver
BLAPR03CA0178 FR2P281CA0023
x-firsthopcafeefz
FRA
x-owa-diagnosticsinfo
4;0;0
x-proxy-backendserverstatus
401
x-proxy-routingcorrectness
1
x-rum-notupdatequerieddbcopy
1
x-rum-notupdatequeriedpath
1
x-rum-validated
1
x-ua-compatible
IE=EmulateIE7

Redirect headers

access-control-allow-origin
*
alt-svc
h3=":443";ma=2592000,h3-29=":443";ma=2592000 h3=":443";ma=2592000,h3-29=":443";ma=2592000
content-length
299
content-type
text/html; charset=utf-8
date
Wed, 19 Jun 2024 20:16:39 GMT
location
https://outlook.office365.com/owa/paula-starr@cherokee.org/service.svc/s/GetAttachmentDownloadToken?redirect=%2fowa%2fpaula-starr%40cherokee.org%2fservice.svc%2fs%2fGetFileAttachment
ms-cv
2js7W26cGVK5+ZdL5/5K4w.1
nel
{"report_to":"NelOfficeUpload1","max_age":7200,"include_subdomains":true,"failure_fraction":1.0,"success_fraction":0.01}
report-to
{"group":"NelOfficeUpload1","max_age":7200,"endpoints":[{"url":"https://exo.nel.measure.office.net/api/report?TenantId=&FrontEnd=Cafe&DestinationEndpoint=FRA&RemoteIP=2a01:4a0:1338::&Environment=MT"}],"include_subdomains":true}
request-id
5b3b3bda-9c6e-5219-b9f9-974be7fe4ae3
server
Microsoft-IIS/10.0
strict-transport-security
max-age=31536000; includeSubDomains; preload
x-backend-begin
2024-06-19T20:16:40.117
x-backend-end
2024-06-19T20:16:40.133
x-backendhttpstatus
302 302
x-beserver
BLAPR09MB7361
x-besku
WCS6
x-calculatedbetarget
BLAPR09MB7361.namprd09.prod.outlook.com
x-calculatedfetarget
BL1PR13CU015.internal.outlook.com
x-content-type-options
nosniff
x-diaginfo
BLAPR09MB7361
x-feefzinfo
FRA
x-feproxyinfo
FR4P281CA0157.DEUP281.PROD.OUTLOOK.COM
x-feserver
BL1PR13CA0434 FR4P281CA0157
x-firsthopcafeefz
FRA
x-nanoproxy
1
x-owa-diagnosticsinfo
5;0;0
x-proxy-backendserverstatus
302
x-proxy-routingcorrectness
1
x-rum-notupdatequerieddbcopy
1
x-rum-notupdatequeriedpath
1
x-rum-validated
1
x-ua-compatible
IE=EmulateIE7
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
155 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

50 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence function| onResize function| setupMobileNav function| assert function| CollisionBox function| Runner function| GeneratedSoundFx function| announcePhrase function| getA11yString function| getRandomNum function| vibrate function| createCanvas function| decodeBase64ToArrayBuffer function| getTimeStamp function| GameOverPanel function| checkForCollision function| createAdjustedCollisionBox function| drawCollisionBoxes function| boxCompare function| Obstacle function| Trex function| DistanceMeter function| Cloud function| BackgroundEl function| NightMode function| HorizonLine function| Horizon function| toggleHelpBox function| diagnoseErrors function| portalSignin function| updateForDnsProbe function| updateIconClass function| reloadButtonClick function| downloadButtonClick function| detailsButtonClick function| setAutoFetchState function| savePageLaterClick function| cancelSavePageClick function| toggleErrorInformationPopup function| launchDownloadsPage function| toggleOfflineContentListVisibility function| onDocumentLoadOrUpdate function| onDocumentLoad function| jstGetTemplate function| JsEvalContext function| jstProcess object| loadTimeDataRaw object| certificateErrorPageController object| errorPageController

4 Cookies

Domain/Path Name / Value
attachments.office.net/ Name: ClientId
Value: 6105A96AE99A44CC90D70D8967292F1B
attachments.office.net/ Name: OIDC
Value: 1
outlook.office365.com/ Name: ClientId
Value: 122E107BB54C48DD80CF205B05D363B6
outlook.office365.com/ Name: OIDC
Value: 1

1 Console Messages

Source Level URL
Text
network error URL: chrome-error://chromewebdata/
Message:
Failed to load resource: the server responded with a status of 401 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

attachments.office.net
outlook.office365.com
2603:1026:c0d:1002::2
2603:1026:c0d:34::2
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2