micsoft.phishone.com Open in urlscan Pro
69.231.156.254  Malicious Activity! Public Scan

URL: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Submission: On October 16 via api from CA — Scanned from CA

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 69.231.156.254, located in Ningxia, China and belongs to WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN. The main domain is micsoft.phishone.com.
TLS certificate: Issued by Amazon RSA 2048 M02 on August 7th 2024. Valid for: a year.
This is the only time micsoft.phishone.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
3 69.231.156.254 135629 (WESTCLOUD...)
3 2620:1ec:bdf::38 8075 (MICROSOFT...)
6 2
Apex Domain
Subdomains
Transfer
3 msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 860
23 KB
3 phishone.com
micsoft.phishone.com
106 KB
6 2
Domain Requested by
3 aadcdn.msauth.net micsoft.phishone.com
3 micsoft.phishone.com micsoft.phishone.com
6 2

This site contains no links.

Subject Issuer Validity Valid
*.phishone.com
Amazon RSA 2048 M02
2024-08-07 -
2025-09-06
a year crt.sh
aadcdn.msauth.net
DigiCert SHA2 Secure Server CA
2024-07-30 -
2025-07-30
a year crt.sh

This page contains 1 frames:

Primary Page: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Frame ID: A314EA7D3B918FE592E60EF6C8E4F989
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Phishone

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

129 kB
Transfer

257 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/
52 KB
14 KB
Document
General
Full URL
https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.231.156.254 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-69-231-156-254.cn-northwest-1.compute.amazonaws.com.cn
Software
nginx /
Resource Hash
42080e818c85a798fb5014d1aada0460af4f72bd4760bcad9a46cb27288956d6
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

allow
GET
content-encoding
gzip
content-language
en
content-type
text/html; charset=utf-8
cross-origin-opener-policy
same-origin
date
Wed, 16 Oct 2024 03:47:49 GMT
referrer-policy
same-origin
server
nginx
vary
Accept, Origin, Accept-Language
x-content-type-options
nosniff
converged.v2.login.min_prc91eyu9sqvbxj8tusclg2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/
109 KB
20 KB
Stylesheet
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_prc91eyu9sqvbxj8tusclg2.css
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:bdf::38 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
afc0898b6e7779ecd64b6a5a5b2626284d3e0316ad79cc45662c6d0158f4b2a1

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

x-cache-info
L2_T2
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB99C67D4E04C3
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
0
x-cache
TCP_REMOTE_HIT
date
Wed, 16 Oct 2024 03:47:49 GMT
content-type
text/css
last-modified
Thu, 10 Aug 2023 17:23:18 GMT
cache-control
public, max-age=31536000
x-ms-request-id
23918b8b-c01e-0005-705e-1f2e20000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
20154
x-azure-ref
20241016T034749Z-17bf56bcc4b6f6m2u3g7a2fsys00000001wg00000000t046
x-ms-blob-type
BlockBlob
microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
aadcdn.msauth.net/shared/1.0/content/images/
4 KB
2 KB
Image
General
Full URL
https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:bdf::38 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB5C3F4911527F
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
0
x-cache
TCP_HIT
date
Wed, 16 Oct 2024 03:47:49 GMT
content-type
image/svg+xml
last-modified
Wed, 24 May 2023 10:11:48 GMT
cache-control
public, max-age=31536000
x-ms-request-id
df97e286-101e-003a-6a94-1ed92e000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
1435
x-azure-ref
20241016T034749Z-17bf56bcc4b6f6m2u3g7a2fsys00000001wg00000000t047
x-ms-blob-type
BlockBlob
jquery.1.10.2.min.js
micsoft.phishone.com/bstatic/
91 KB
91 KB
Script
General
Full URL
https://micsoft.phishone.com/bstatic/jquery.1.10.2.min.js
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.231.156.254 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-69-231-156-254.cn-northwest-1.compute.amazonaws.com.cn
Software
nginx /
Resource Hash
89a15e9c40bc6b14809f236ee8cd3ed1ea42393c1f6ca55c7855cd779b3f922e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2

Response headers

accept-ranges
bytes
content-length
93100
date
Wed, 16 Oct 2024 03:47:49 GMT
etag
"66f14317-16bac"
content-type
application/javascript
last-modified
Mon, 23 Sep 2024 10:29:43 GMT
server
nginx
2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/
2 KB
1 KB
Image
General
Full URL
https://aadcdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/72be720e-8aa5-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:bdf::38 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/

Response headers

access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB5C3F47E260FD
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
0
x-cache
TCP_HIT
date
Wed, 16 Oct 2024 03:47:49 GMT
content-type
image/svg+xml
last-modified
Wed, 24 May 2023 10:11:46 GMT
cache-control
public, max-age=31536000
x-ms-request-id
62026f8d-301e-0068-4f94-1ed279000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
673
x-azure-ref
20241016T034749Z-17bf56bcc4b6f6m2u3g7a2fsys00000001wg00000000t048
x-ms-blob-type
BlockBlob
favicon.ico
micsoft.phishone.com/
0
66 B
Other
General
Full URL
https://micsoft.phishone.com/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.231.156.254 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-69-231-156-254.cn-northwest-1.compute.amazonaws.com.cn
Software
awselb/2.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/

Response headers

content-length
0
date
Wed, 16 Oct 2024 03:47:50 GMT
content-type
text/plain; charset=utf-8
server
awselb/2.0

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| submit string| relativeUrl

0 Cookies

2 Console Messages

Source Level URL
Text
recommendation verbose URL: https://micsoft.phishone.com/
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o
network error URL: https://micsoft.phishone.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff