saml.baylorhealth.com
Open in
urlscan Pro
198.205.24.101
Public Scan
Effective URL: https://saml.baylorhealth.com/SecureAuth77/?client-request-id=5e8dbc51-9845-4ff5-a7e3-3da2ecfa5865&username=&wa=wsignin1.0&wtr...
Submission: On April 08 via manual from US
Summary
TLS certificate: Issued by COMODO RSA Extended Validation Secure... on December 12th 2018. Valid for: 2 years.
This is the only time saml.baylorhealth.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.205.24.162 198.205.24.162 | 40910 (BAYLOR) (BAYLOR - Baylor Health Care Systems) | |
2 2 | 2603:1026:6:2... 2603:1026:6:2e::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
1 1 | 40.126.9.5 40.126.9.5 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
14 | 198.205.24.101 198.205.24.101 | 40910 (BAYLOR) (BAYLOR - Baylor Health Care Systems) | |
14 | 1 |
ASN40910 (BAYLOR - Baylor Health Care Systems, US)
PTR: webmail.bswhealth.org
webmail.bswhealth.org |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
outlook.office365.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
login.microsoftonline.com |
ASN40910 (BAYLOR - Baylor Health Care Systems, US)
PTR: encore.bswhealth.org
saml.baylorhealth.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
baylorhealth.com
saml.baylorhealth.com |
222 KB |
2 |
office365.com
2 redirects
outlook.office365.com |
6 KB |
1 |
microsoftonline.com
1 redirects
login.microsoftonline.com |
2 KB |
1 |
bswhealth.org
1 redirects
webmail.bswhealth.org |
147 B |
14 | 4 |
Domain | Requested by | |
---|---|---|
14 | saml.baylorhealth.com |
saml.baylorhealth.com
|
2 | outlook.office365.com | 2 redirects |
1 | login.microsoftonline.com | 1 redirects |
1 | webmail.bswhealth.org | 1 redirects |
14 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.mybaylor.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
saml.baylorhealth.com COMODO RSA Extended Validation Secure Server CA |
2018-12-12 - 2020-12-11 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://saml.baylorhealth.com/SecureAuth77/?client-request-id=5e8dbc51-9845-4ff5-a7e3-3da2ecfa5865&username=&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQIIAY2RvYvTYACH-_Yj3hUPD3HQ7VBxEJK-yZvkTQI3pG1Kr2c_UvuVG66kadK-XpO3NOkHN4sIItwiyG3eInR0EvEvuOnmW11EHEQQxUFscXG8Z_jxzM_vYYLneO0-_IfArpeFnsezjru2_5jcTG-bH18eGq9_VN9-2j37-rvjnoKt7ON20bVH0ZCjk8ES3B1G0TjUMhk6jUaUHnHU84jjIlniHOpn6NzOvAfgAoBlHMtIViFCUBWwgngkyzKHFM8RJZdnsSqLrNiXEWtjV1qZ4kieIAh90buM36jq02gorIdOyLH7Pb7p0YnfHdMwOk0s8lYo5ak-MPRs1mP1bjXrtO19FD6y56XhwvJL5Z6B8azQ2LcOjoekR6xg4IdmTidWhZbKFcOcDyhtWKRbq5BS3sy1nHpdx5Wm0iFT3BamIR53-g0xHE2QJcwkjyhSMCsXl4krhXyXYFYpfBqcJxg6dgPSv0iCL8nrMKVtbKS3t26ndmK_kuAstQp-707r57PDB8aLp3t_Xr3Zi52nMoT2DPfJqFpCBeg3VVow672jUdDEVqQMaguUn9dazVyxni0au6rGnzDghGE-M-AbA55fi33YvMJDl-lbAuRVFoosVHZ4UUOShuDBXw2
Frame ID: 09D37CA0BFEF32C4BD0C73CBBA224953
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://webmail.bswhealth.org/
HTTP 301
https://outlook.office365.com/BSWHealth.org HTTP 302
https://outlook.office365.com/owa/BSWHealth.org HTTP 302
https://login.microsoftonline.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redir... HTTP 302
https://saml.baylorhealth.com/SecureAuth77/?client-request-id=5e8dbc51-9845-4ff5-a7e3-3da2ecfa5865&usernam... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- html /<input[^>]+name="__VIEWSTATE/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
IIS (Web Servers) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Supported Platforms
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://webmail.bswhealth.org/
HTTP 301
https://outlook.office365.com/BSWHealth.org HTTP 302
https://outlook.office365.com/owa/BSWHealth.org HTTP 302
https://login.microsoftonline.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=0&client-request-id=5e8dbc51-9845-4ff5-a7e3-3da2ecfa5865&protectedtoken=true&domain_hint=BSWHealth.org&nonce=636903309278313666.38fc45e1-7964-4d63-a7e5-4d8c5f222d4f&state=DYs5DoAgEABBf-A_OBcWaK3sLawJhxYmJMbE77vFTKYZzhibiYngmsQCAiYNoJMNEQwgooTYi_PNiJDQCVcRRA7NU8Xiu7W2us7pXdT4slr3Y2v5fi85nvMH HTTP 302
https://saml.baylorhealth.com/SecureAuth77/?client-request-id=5e8dbc51-9845-4ff5-a7e3-3da2ecfa5865&username=&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQIIAY2RvYvTYACH-_Yj3hUPD3HQ7VBxEJK-yZvkTQI3pG1Kr2c_UvuVG66kadK-XpO3NOkHN4sIItwiyG3eInR0EvEvuOnmW11EHEQQxUFscXG8Z_jxzM_vYYLneO0-_IfArpeFnsezjru2_5jcTG-bH18eGq9_VN9-2j37-rvjnoKt7ON20bVH0ZCjk8ES3B1G0TjUMhk6jUaUHnHU84jjIlniHOpn6NzOvAfgAoBlHMtIViFCUBWwgngkyzKHFM8RJZdnsSqLrNiXEWtjV1qZ4kieIAh90buM36jq02gorIdOyLH7Pb7p0YnfHdMwOk0s8lYo5ak-MPRs1mP1bjXrtO19FD6y56XhwvJL5Z6B8azQ2LcOjoekR6xg4IdmTidWhZbKFcOcDyhtWKRbq5BS3sy1nHpdx5Wm0iFT3BamIR53-g0xHE2QJcwkjyhSMCsXl4krhXyXYFYpfBqcJxg6dgPSv0iCL8nrMKVtbKS3t26ndmK_kuAstQp-707r57PDB8aLp3t_Xr3Zi52nMoT2DPfJqFpCBeg3VVow672jUdDEVqQMaguUn9dazVyxni0au6rGnzDghGE-M-AbA55fi33YvMJDl-lbAuRVFoosVHZ4UUOShuDBXw2 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
saml.baylorhealth.com/SecureAuth77/ Redirect Chain
|
73 KB 32 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
saml.baylorhealth.com/SecureAuth77/libraries/bootstrap-SA/css/ |
99 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-responsive.css
saml.baylorhealth.com/SecureAuth77/libraries/bootstrap-SA/css/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MFAStyleSheet.css
saml.baylorhealth.com/SecureAuth77/Themes/2013/ |
28 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebResource.axd
saml.baylorhealth.com/SecureAuth77/ |
162 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebResource.axd
saml.baylorhealth.com/SecureAuth77/ |
23 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebResource.axd
saml.baylorhealth.com/SecureAuth77/ |
26 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebResource.axd
saml.baylorhealth.com/SecureAuth77/ |
3 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BSW2.png
saml.baylorhealth.com/SecureAuth77/Images/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
seal-xs-powered.png
saml.baylorhealth.com/SecureAuth77/Images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
saml.baylorhealth.com/SecureAuth77/assets/scripts/ |
90 KB 41 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
saml.baylorhealth.com/SecureAuth77/libraries/bootstrap-SA/js/ |
22 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom.min.js
saml.baylorhealth.com/SecureAuth77/Themes/2013/ |
955 B 787 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-sa-blue.jpg
saml.baylorhealth.com/SecureAuth77/Themes/2013/Images/ |
46 KB 46 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
99 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| CertMgr object| theForm function| __doPostBack function| WebForm_PostBackOptions function| WebForm_DoPostBackWithOptions object| __pendingCallbacks number| __synchronousCallBackIndex function| WebForm_DoCallback function| WebForm_CallbackComplete function| WebForm_ExecuteCallback function| WebForm_FillFirstAvailableSlot boolean| __nonMSDOMBrowser string| __theFormPostData object| __theFormPostCollection object| __callbackTextTypes function| WebForm_InitCallback function| WebForm_InitCallbackAddField function| WebForm_EncodeCallback object| __disabledControlArray function| WebForm_ReEnableControls function| WebForm_ReDisableControls function| WebForm_SimulateClick function| WebForm_FireDefaultButton function| WebForm_GetScrollX function| WebForm_GetScrollY function| WebForm_SaveScrollPositionSubmit function| WebForm_SaveScrollPositionOnSubmit function| WebForm_RestoreScrollPosition function| WebForm_TextBoxKeyHandler function| WebForm_TrimString function| WebForm_AppendToClassName function| WebForm_RemoveClassName function| WebForm_GetElementById function| WebForm_GetElementByTagName function| WebForm_GetElementsByTagName function| WebForm_GetElementDir function| WebForm_GetElementPosition function| WebForm_GetParentByTagName function| WebForm_SetElementHeight function| WebForm_SetElementWidth function| WebForm_SetElementX function| WebForm_SetElementY function| pleaseWait number| seconds function| countDown function| compareDates string| Page_ValidationVer boolean| Page_IsValid boolean| Page_BlockSubmit object| Page_InvalidControlToBeFocused object| Page_TextTypes function| ValidatorUpdateDisplay function| ValidatorUpdateIsValid function| AllValidatorsValid function| ValidatorHookupControlID function| ValidatorHookupControl function| ValidatorHookupEvent function| ValidatorGetValue function| ValidatorGetValueRecursive function| Page_ClientValidate function| ValidatorCommonOnSubmit function| ValidatorEnable function| ValidatorOnChange function| ValidatedTextBoxOnKeyPress function| ValidatedControlOnBlur function| ValidatorValidate function| ValidatorSetFocus function| IsInVisibleContainer function| IsValidationGroupMatch function| ValidatorOnLoad function| ValidatorConvert function| ValidatorCompare function| CompareValidatorEvaluateIsValid function| CustomValidatorEvaluateIsValid function| RegularExpressionValidatorEvaluateIsValid function| ValidatorTrim function| RequiredFieldValidatorEvaluateIsValid function| RangeValidatorEvaluateIsValid function| ValidationSummaryOnSubmit function| WebForm_FindFirstFocusableChild function| WebForm_AutoFocus function| WebForm_CanFocus function| WebForm_IsFocusableTag function| WebForm_IsInVisibleContainer function| WebForm_OnSubmit undefined| PluginDetect string| _mode boolean| enterPressed object| Page_Validators object| ContentPlaceHolder1_MFALoginControl1_UserIDView_reqValUserID object| ContentPlaceHolder1_MFALoginControl1_UserIDView_reqValPassword boolean| Page_ValidationActive function| ValidatorOnSubmit function| $ function| jQuery object| ac2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
saml.baylorhealth.com/ | Name: secauthcook Value: !pS/b13VD+cHfdjpXSWn6Fj+lYTdCPwV3fz/1suEUx3EGDnWzNa8XrPji0E3k0dt6SULrriTRq4jduJs= |
|
saml.baylorhealth.com/ | Name: ASP.NET_SessionId77 Value: ha4d2faxjjp5uzbgmzql2fdv |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.microsoftonline.com
outlook.office365.com
saml.baylorhealth.com
webmail.bswhealth.org
198.205.24.101
198.205.24.162
2603:1026:6:2e::2
40.126.9.5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