bayview.z13.web.core.windows.net
Open in
urlscan Pro
20.60.221.164
Malicious Activity!
Public Scan
Submission: On June 22 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 05 on April 28th 2023. Valid for: a year.
This is the only time bayview.z13.web.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 20.60.221.164 20.60.221.164 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 162.0.224.159 162.0.224.159 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
3 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
bayview.z13.web.core.windows.net |
ASN22612 (NAMECHEAP-NET, US)
PTR: step-husband.quarantine-pnap-vlan51.web-hosting.com
www.clipartmax.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
windows.net
bayview.z13.web.core.windows.net |
368 KB |
1 |
clipartmax.com
www.clipartmax.com — Cisco Umbrella Rank: 90509 |
5 KB |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | bayview.z13.web.core.windows.net |
bayview.z13.web.core.windows.net
|
1 | www.clipartmax.com |
bayview.z13.web.core.windows.net
|
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.web.core.windows.net Microsoft Azure TLS Issuing CA 05 |
2023-04-28 - 2024-04-22 |
a year | crt.sh |
clipartmax.com R3 |
2023-04-21 - 2023-07-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bayview.z13.web.core.windows.net/
Frame ID: CB0646B33E2B2FC93A41A2F668F84E7F
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bayview.z13.web.core.windows.net/ |
368 KB 368 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
bayview.z13.web.core.windows.net/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
112-1129773_onenote-is-part-of-the-office-365-package-and-you-will-one.png
www.clipartmax.com/png/full/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
771 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
26 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
170 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) OneDrive (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bayview.z13.web.core.windows.net
www.clipartmax.com
162.0.224.159
20.60.221.164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