52.109.124.1
Open in
urlscan Pro
52.109.124.1
Malicious Activity!
Public Scan
Submission Tags: 6640015
Submission: On June 20 via api from NL
Summary
This is the only time 52.109.124.1 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 52.109.124.1 52.109.124.1 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
6 | 52.109.88.5 52.109.88.5 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
11 | 2 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
odc.officeapps.live.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
live.com
odc.officeapps.live.com |
68 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
6 | odc.officeapps.live.com |
52.109.124.1
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
odc.officeapps.live.com Microsoft IT TLS CA 5 |
2020-03-09 - 2022-03-09 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://52.109.124.1/odc/v2.1/hrd?lcid=1033&syslcid=3081&uilcid=1033&app=3&ver=16&build=16.0.11929&p=0&a=1&hm=7&sp=0&fpEnabled=1
Frame ID: 7209EE6E5772E25DCA70121DE355B51D
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
hrd
52.109.124.1/odc/v2.1/ |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hrd.css
52.109.124.1/odc/stat/ |
21 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
odc.officeapps.live.com/odc/stat/images/hrd/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker-account-aad.svg
odc.officeapps.live.com/odc/stat/images/hrd/ |
756 B 860 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker-account-msa.svg
odc.officeapps.live.com/odc/stat/images/hrd/ |
379 B 483 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.1.min.js
odc.officeapps.live.com/odc/stat/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
knockout-3.4.2.js
odc.officeapps.live.com/odc/stat/ |
59 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CommonDiagnostics.js
odc.officeapps.live.com/odc/stat/ |
30 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jsonstrings
52.109.124.1/odc/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hrd.min.js
52.109.124.1/odc/stat/ |
15 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Background-blurryGradient.svg
52.109.124.1/odc/stat/images/hrd/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| ko function| Type function| $6 object| Sys object| Diag object| OOUI_EmailHrdv2 object| OOUI function| __extends object| HostInterface object| HrdMode function| HrdUlsHost function| Hrd object| EmailHrdPage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
odc.officeapps.live.com
52.109.124.1
52.109.88.5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