production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev Open in urlscan Pro
2606:4700:3035::ac43:ca67  Malicious Activity! Public Scan

Submitted URL: http://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Effective URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Submission: On November 16 via manual from NL — Scanned from NL

Summary

This website contacted 5 IPs in 3 countries across 5 domains to perform 8 HTTP transactions. The main IP is 2606:4700:3035::ac43:ca67, located in United States and belongs to CLOUDFLARENET, US. The main domain is production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 16th 2021. Valid for: a year.
This is the only time production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:303... 13335 (CLOUDFLAR...)
4 2620:1ec:46::60 8068 (MICROSOFT...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
1 3.220.57.224 14618 (AMAZON-AES)
1 109.169.71.112 20860 (IOMART-AS)
8 5
Domain Requested by
4 aadcdn.msauth.net production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
1 smtpjs.com production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
1 api.ipify.org production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
1 code.jquery.com production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
1 production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
8 5

This site contains no links.

Subject Issuer Validity Valid
s-hiestand.workers.dev
Cloudflare Inc ECC CA-3
2021-11-16 -
2022-11-15
a year crt.sh
aadcdn.msauth.net
DigiCert SHA2 Secure Server CA
2021-07-08 -
2022-07-08
a year crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
*.ipify.org
Sectigo RSA Domain Validation Secure Server CA
2021-01-19 -
2022-02-19
a year crt.sh
smtpjs.com
R3
2021-10-21 -
2022-01-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Frame ID: D4D0A9382E328F376489D104D4D8280C
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Sign in to your Microsoft account

Page URL History Show full URLs

  1. http://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/ HTTP 307
    https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/ Page URL

Page Statistics

8
Requests

100 %
HTTPS

60 %
IPv6

5
Domains

5
Subdomains

5
IPs

3
Countries

55 kB
Transfer

196 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/ HTTP 307
    https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Redirect Chain
  • http://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
  • https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
107 KB
20 KB
Document
General
Full URL
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::ac43:ca67 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7bac7fb2652d18b3017b926fb7c7242613690e65b37d7179d8474d503b97d73

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36
Accept-Language
nl-NL,nl;q=0.9

Response headers

date
Tue, 16 Nov 2021 13:23:59 GMT
content-type
text/html
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2B2xSIAm4xnJWerWlC2yNiL%2Bu9vNthS%2F5pWaTs4WE7gEhv6hw9mDqPox7QspKg8VgZDLe7jGL3ZmogWeqvcoZQsNjTynAc2%2Fy4751TdIdAtI%2FJBBrkPXfJA2BEEHA25cFgI8wj%2BRPgh0RILW8OPdb9wCEI%2FyTjIPaYO8jfNTBZjDF8FsZNofm3bt4CwAn4Tt%2FcEFt8roIPvXl%2BCRARVwkC3OO3Ub8Nq%2Bc0URZNU0MyuCjh0Dy2Q%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary
Accept-Encoding
server
cloudflare
cf-ray
6af10977cf994e08-FRA
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

Redirect headers

Location
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Non-Authoritative-Reason
HSTS
microsoft_logo_ed9c9eb0dce17d752bedea6b5acda6d9.png
aadcdn.msauth.net/ests/2.1/content/images/
1 KB
1 KB
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/microsoft_logo_ed9c9eb0dce17d752bedea6b5acda6d9.png
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:46::60 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 16 Nov 2021 13:23:58 GMT
content-md5
7ZyesNzhfXUr7eprWs2m2Q==
x-cache
TCP_HIT
content-length
1057
x-ms-lease-status
unlocked
last-modified
Fri, 02 Nov 2018 20:25:31 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D641015620C409
x-azure-ref
077CTYQAAAADWshtuCQ83Sa6BQhuzbXaMQU1TMDRFREdFMTgxNQAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-type
image/png
access-control-allow-origin
*
x-ms-request-id
c066e578-601e-0029-2afe-d9d553000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
arrow_left_7cc096da6aa2dba3f81fcc1c8262157c.png
aadcdn.msauth.net/ests/2.1/content/images/
240 B
606 B
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/arrow_left_7cc096da6aa2dba3f81fcc1c8262157c.png
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:46::60 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
ab50358475adae73a435466c72d1a48ab124e8ae06614663716a46dce5ac8b83

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 16 Nov 2021 13:23:58 GMT
content-md5
fMCW2mqi26P4H8wcgmIVfA==
x-cache
TCP_HIT
content-length
240
x-ms-lease-status
unlocked
last-modified
Fri, 02 Nov 2018 20:25:10 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D64101494D74DC
x-azure-ref
077CTYQAAAACHWovgb6XvRb9cKq36b3ZTQU1TMDRFREdFMTgxNQAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-type
image/png
access-control-allow-origin
*
x-ms-request-id
4100ab93-d01e-003a-6019-da1877000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
ellipsis_white_0ad43084800fd8b50a2576b5173746fe.png
aadcdn.msauth.net/ests/2.1/content/images/
207 B
425 B
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/ellipsis_white_0ad43084800fd8b50a2576b5173746fe.png
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:46::60 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
2c03ee38a4eba6a047c3a5bacb3eb461efe14be8acd46ae772350a4dea2f0175

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 16 Nov 2021 13:23:58 GMT
content-md5
CtQwhIAP2LUKJXa1FzdG/g==
x-cache
TCP_HIT
content-length
207
x-ms-lease-status
unlocked
last-modified
Fri, 02 Nov 2018 20:25:24 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D6410151EBB082
x-azure-ref
077CTYQAAAAA9gRByQi54SoG6uLujyQwOQU1TMDRFREdFMTgxNQAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-type
image/png
access-control-allow-origin
*
x-ms-request-id
5a4cb22e-701e-0030-18ae-d91662000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
jquery-3.1.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.1.1.min.js
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:1b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

date
Tue, 16 Nov 2021 13:23:59 GMT
content-encoding
gzip
last-modified
Thu, 22 Sep 2016 22:32:34 GMT
server
nginx
etag
W/"57e45c02-152b5"
vary
Accept-Encoding
x-hw
1637069039.dop130.am5.t,1637069039.cds233.am5.hn,1637069039.cds114.am5.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30070
/
api.ipify.org/
36 B
220 B
Script
General
Full URL
https://api.ipify.org/?format=jsonp&callback=getPublic
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
3.220.57.224 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-57-224.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
4f84277779cc5c171f5968bd9df8a4462c920525e3c3a72dc80c799f83e4e298

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

Date
Tue, 16 Nov 2021 13:23:59 GMT
Via
1.1 vegur
Server
Cowboy
Connection
keep-alive
Content-Length
36
Vary
Origin
Content-Type
application/javascript
smtp.js
smtpjs.com/v3/
871 B
1 KB
Script
General
Full URL
https://smtpjs.com/v3/smtp.js
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
109.169.71.112 Catterick, United Kingdom, ASN20860 (IOMART-AS, GB),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
1fd711cb491a361ef91e29c50de0680a4b156c0b34bb91e18570d0037263a776

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

date
Tue, 16 Nov 2021 13:23:59 GMT
last-modified
Tue, 10 Nov 2020 17:17:51 GMT
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
etag
"162f436b85b7d61:0"
content-type
application/javascript
access-control-allow-origin
*
accept-ranges
bytes
content-length
871
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/
2 KB
1 KB
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
Requested by
Host: production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev
URL: https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:46::60 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

Accept-Language
nl-NL,nl;q=0.9
Referer
https://production.microsoftpassword-update0009-hfhfhf-draspy-rice-57e5.s-hiestand.workers.dev/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 16 Nov 2021 13:23:58 GMT
content-encoding
gzip
content-md5
DhdidjYrlCeaRJJRG/y9mA==
x-cache
TCP_HIT
content-length
673
x-ms-lease-status
unlocked
last-modified
Thu, 13 Feb 2020 02:05:12 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D7B0292911C366
x-azure-ref
077CTYQAAAABI/PwjcOQIRae3MfsIKaP3QU1TMDRFREdFMTgxNQAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-type
image/svg+xml
access-control-allow-origin
*
x-ms-request-id
7811f84e-c01e-000f-140e-dabe6c000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| $ function| jQuery string| wrfweewdwedew undefined| hudiswjs function| kiujytredscvbrddszsasa function| getPublic object| Email object| body object| att

0 Cookies