micsoft.phishone.com Open in urlscan Pro
52.82.80.250  Malicious Activity! Public Scan

URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Submission: On November 21 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 52.82.80.250, located in Ningxia, China and belongs to WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN. The main domain is micsoft.phishone.com.
TLS certificate: Issued by Amazon RSA 2048 M02 on August 7th 2024. Valid for: a year.
This is the only time micsoft.phishone.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
3 52.82.80.250 135629 (WESTCLOUD...)
3 2620:1ec:29:1... 8075 (MICROSOFT...)
6 2
Apex Domain
Subdomains
Transfer
3 msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 871
23 KB
3 phishone.com
micsoft.phishone.com
15 KB
6 2
Domain Requested by
3 aadcdn.msauth.net micsoft.phishone.com
3 micsoft.phishone.com micsoft.phishone.com
6 2

This site contains no links.

Subject Issuer Validity Valid
*.phishone.com
Amazon RSA 2048 M02
2024-08-07 -
2025-09-06
a year crt.sh
aadcdn.msauth.net
DigiCert SHA2 Secure Server CA
2024-10-29 -
2025-10-29
a year crt.sh

This page contains 1 frames:

Primary Page: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Frame ID: E18730EADC4C02254902B814AE0D5BC3
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Phishone

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

6
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

38 kB
Transfer

167 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/
52 KB
14 KB
Document
General
Full URL
https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.82.80.250 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-52-82-80-250.cn-northwest-1.compute.amazonaws.com.cn
Software
nginx /
Resource Hash
57b9d4753a0c0837d780ae1eae57dd25cf1bbaa38dcf34357f3ba3231d690b95
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

allow
GET
content-encoding
gzip
content-language
en
content-type
text/html; charset=utf-8
cross-origin-opener-policy
same-origin
date
Thu, 21 Nov 2024 13:13:28 GMT
referrer-policy
same-origin
server
nginx
vary
Accept, Origin, Accept-Language
x-content-type-options
nosniff
converged.v2.login.min_prc91eyu9sqvbxj8tusclg2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/
109 KB
20 KB
Stylesheet
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_prc91eyu9sqvbxj8tusclg2.css
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:29:1::45 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
afc0898b6e7779ecd64b6a5a5b2626284d3e0316ad79cc45662c6d0158f4b2a1

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

x-cache-info
L1_T2
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB99C67D4E04C3
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
0
x-cache
TCP_HIT
date
Thu, 21 Nov 2024 13:13:28 GMT
content-type
text/css
last-modified
Thu, 10 Aug 2023 17:23:18 GMT
cache-control
public, max-age=31536000
x-ms-request-id
e0a2ecf6-801e-0075-61b9-3ba87a000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
20154
x-azure-ref
20241121T131328Z-178d44947678grbchC1FRA5g1n00000001qg00000000ke22
x-ms-blob-type
BlockBlob
microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
aadcdn.msauth.net/shared/1.0/content/images/
4 KB
2 KB
Image
General
Full URL
https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:29:1::45 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer

Response headers

access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB5C3F4911527F
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
4554691
x-cache
TCP_HIT
date
Thu, 21 Nov 2024 13:13:28 GMT
content-type
image/svg+xml
last-modified
Wed, 24 May 2023 10:11:48 GMT
cache-control
public, max-age=31536000
x-ms-request-id
e39af0ef-701e-0010-10ec-3a3993000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
1435
x-azure-ref
20241121T131328Z-178d44947678grbchC1FRA5g1n00000001qg00000000ke23
x-ms-blob-type
BlockBlob
jquery.1.10.2.min.js
micsoft.phishone.com/bstatic/
0
0
Script
General
Full URL
https://micsoft.phishone.com/bstatic/jquery.1.10.2.min.js
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.82.80.250 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-52-82-80-250.cn-northwest-1.compute.amazonaws.com.cn
Software
awselb/2.0 /
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2

Response headers

content-length
520
date
Thu, 21 Nov 2024 13:13:28 GMT
content-type
text/html
server
awselb/2.0
2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/
2 KB
1 KB
Image
General
Full URL
https://aadcdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
Requested by
Host: micsoft.phishone.com
URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2620:1ec:29:1::45 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/

Response headers

access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
content-encoding
gzip
x-ms-version
2009-09-19
etag
0x8DB5C3F47E260FD
x-ms-lease-status
unlocked
x-fd-int-roxy-purgeid
4554691
x-cache
TCP_HIT
date
Thu, 21 Nov 2024 13:13:29 GMT
content-type
image/svg+xml
last-modified
Wed, 24 May 2023 10:11:46 GMT
cache-control
public, max-age=31536000
x-ms-request-id
cd31217f-901e-0055-59ec-3aec70000000
accept-ranges
bytes
access-control-allow-origin
*
content-length
673
x-azure-ref
20241121T131329Z-178d44947678grbchC1FRA5g1n00000001qg00000000ke2h
x-ms-blob-type
BlockBlob
favicon.ico
micsoft.phishone.com/
520 B
590 B
Other
General
Full URL
https://micsoft.phishone.com/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.82.80.250 Ningxia, China, ASN135629 (WESTCLOUDDATA Ningxia West Cloud Data Technology Co.Ltd., CN),
Reverse DNS
ec2-52-82-80-250.cn-northwest-1.compute.amazonaws.com.cn
Software
awselb/2.0 /
Resource Hash
8b73b6ccd7091d6d9d23adaab2baae3c4abf6de06df8efdd03215ee9376fa035

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2

Response headers

content-length
520
date
Thu, 21 Nov 2024 13:13:29 GMT
content-type
text/html
server
awselb/2.0

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| submit

0 Cookies

3 Console Messages

Source Level URL
Text
network error URL: https://micsoft.phishone.com/bstatic/jquery.1.10.2.min.js
Message:
Failed to load resource: the server responded with a status of 403 ()
recommendation verbose URL: https://micsoft.phishone.com/api/track/07904e36-a705-11ef-bbff-e26953035bbf/?type=2
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o
network error URL: https://micsoft.phishone.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 403 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff