pub-d89e3188311c46f49978b9555d4c9596.r2.dev
Open in
urlscan Pro
104.18.3.35
Malicious Activity!
Public Scan
Effective URL: https://pub-d89e3188311c46f49978b9555d4c9596.r2.dev/aas.html
Submission: On December 08 via manual from AE — Scanned from AU
Summary
TLS certificate: Issued by E1 on October 11th 2023. Valid for: 3 months.
This is the only time pub-d89e3188311c46f49978b9555d4c9596.r2.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 58.87.45.107 58.87.45.107 | 9524 (HMC-AS Hy...) (HMC-AS Hyundai Autoever Corp.) | |
1 | 103.68.166.129 103.68.166.129 | 38719 (DREAMSCAP...) (DREAMSCAPE-AS-AP Dreamscape Networks Limited) | |
1 | 104.18.3.35 104.18.3.35 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 13.107.213.31 13.107.213.31 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 151.101.66.137 151.101.66.137 | 54113 (FASTLY) (FASTLY) | |
1 | 173.231.16.77 173.231.16.77 | 18450 (WEBNX) (WEBNX) | |
1 | 109.169.71.112 109.169.71.112 | 20860 (IOMART-AS) (IOMART-AS) | |
2 2 | 13.107.6.156 13.107.6.156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
3 | 20.190.167.150 20.190.167.150 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 152.199.39.242 152.199.39.242 | 15133 (EDGECAST) (EDGECAST) | |
25 | 9 |
ASN9524 (HMC-AS Hyundai Autoever Corp., KR)
PTR: crm.kia.com.au
crm.kia.com.au |
ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU)
PTR: ip6744a681.ipv4.syd02.ds.network
yllozi.uo6anc.badfolk.org |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
login.microsoftonline.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 974 |
314 KB |
4 |
msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 961 |
4 KB |
3 |
microsoftonline.com
login.microsoftonline.com — Cisco Umbrella Rank: 16 |
40 KB |
2 |
office.com
2 redirects
www.office.com — Cisco Umbrella Rank: 3492 |
1 KB |
2 |
kia.com.au
1 redirects
crm.kia.com.au |
1 KB |
1 |
smtpjs.com
smtpjs.com — Cisco Umbrella Rank: 88883 |
1 KB |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2843 |
209 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 735 |
30 KB |
1 |
r2.dev
pub-d89e3188311c46f49978b9555d4c9596.r2.dev |
21 KB |
1 |
badfolk.org
yllozi.uo6anc.badfolk.org |
544 B |
25 | 10 |
Domain | Requested by | |
---|---|---|
12 | aadcdn.msftauth.net |
login.microsoftonline.com
|
4 | aadcdn.msauth.net |
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
|
3 | login.microsoftonline.com |
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
|
2 | www.office.com | 2 redirects |
2 | crm.kia.com.au | 1 redirects |
1 | smtpjs.com |
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
|
1 | api.ipify.org |
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
|
1 | code.jquery.com |
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
|
1 | pub-d89e3188311c46f49978b9555d4c9596.r2.dev |
yllozi.uo6anc.badfolk.org
|
1 | yllozi.uo6anc.badfolk.org |
crm.kia.com.au
|
25 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r2.dev E1 |
2023-10-11 - 2024-01-09 |
3 months | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2023-10-29 - 2024-10-29 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.ipify.org Sectigo RSA Domain Validation Secure Server CA |
2023-02-07 - 2024-02-18 |
a year | crt.sh |
smtpjs.com R3 |
2023-11-11 - 2024-02-09 |
3 months | crt.sh |
stamp2.login.microsoftonline.com DigiCert SHA2 Secure Server CA |
2023-11-18 - 2024-11-18 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
This page contains 4 frames:
Primary Page:
https://pub-d89e3188311c46f49978b9555d4c9596.r2.dev/aas.html
Frame ID: 2503B704B414EED7770B8D9F33DE546A
Requests: 10 HTTP requests in this frame
Frame:
https://login.microsoftonline.com/common/oauth2/logout?post_logout_redirect_uri=https%3A%2F%2Fwww.office.com%2F&state=yKCQeIugZGwo8pbndrJxTdmG9V6ixEBfhtknUA4871FqWVUvo1ArG0W5LIPloHBK7VaYq6IWMUydJ3P01yPxxE4SvIJp_fmwgNAEYv8t5Lt2F60LJxkf8hM9PXC9B-VC&x-client-SKU=ID_NET6_0&x-client-ver=6.34.0.0
Frame ID: 416D352282D8F1D66CDF620F1019779D
Requests: 5 HTTP requests in this frame
Frame:
https://login.microsoftonline.com/common/oauth2/logout?post_logout_redirect_uri=https%3A%2F%2Fwww.office.com%2F&state=DgQCYE9lP3nzKLp23rbe8EWQXmXZo_PnBVeB85H12ExDa7REINYyYdsstpjlo77RBchmqFDupf0y_exlimGQUm0pOjdH63XxVTzafnnhwSAztf_AlV37UqExfDWcN2Wm&x-client-SKU=ID_NET6_0&x-client-ver=6.34.0.0
Frame ID: EC8DC257E87671C7B566285E871BADB7
Requests: 5 HTTP requests in this frame
Frame:
https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=501392
Frame ID: 22C4BA3656D51153ABAA08C2D798A40E
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Sign in to your Microsoft accountPage URL History Show full URLs
-
http://crm.kia.com.au/CrmAu/link.asp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410531132&msg...
HTTP 302
http://crm.kia.com.au/response/LinkManager.jsp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410... Page URL
- http://yllozi.uo6anc.badfolk.org/new/QXNsYW1QQG1hc2hyZXEuY29t Page URL
- https://pub-d89e3188311c46f49978b9555d4c9596.r2.dev/aas.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://crm.kia.com.au/CrmAu/link.asp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410531132&msg_mem_id=0&respStart=2021-12-24&respEnd=2021-12-31&tktype=LINK_03&link_id=2021122410531132_3&redirectURL=http%3A%2F%2Fyllozi.uo6anc.badfolk.org%2Fnew%2FQXNsYW1QQG1hc2hyZXEuY29t
HTTP 302
http://crm.kia.com.au/response/LinkManager.jsp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410531132&msg_mem_id=0&respStart=2021-12-24&respEnd=2021-12-31&tktype=LINK_03&msgkey=84086&link_id=2021122410531132_3&redirectURL=http%3A%2F%2Fyllozi%2Euo6anc%2Ebadfolk%2Eorg%2Fnew%2FQXNsYW1QQG1hc2hyZXEuY29t Page URL
- http://yllozi.uo6anc.badfolk.org/new/QXNsYW1QQG1hc2hyZXEuY29t Page URL
- https://pub-d89e3188311c46f49978b9555d4c9596.r2.dev/aas.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://crm.kia.com.au/CrmAu/link.asp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410531132&msg_mem_id=0&respStart=2021-12-24&respEnd=2021-12-31&tktype=LINK_03&link_id=2021122410531132_3&redirectURL=http%3A%2F%2Fyllozi.uo6anc.badfolk.org%2Fnew%2FQXNsYW1QQG1hc2hyZXEuY29t HTTP 302
- http://crm.kia.com.au/response/LinkManager.jsp?mode=7&msg_seq=5580&mem_seq=83822&msg_id=2021122410531132&msg_mem_id=0&respStart=2021-12-24&respEnd=2021-12-31&tktype=LINK_03&msgkey=84086&link_id=2021122410531132_3&redirectURL=http%3A%2F%2Fyllozi%2Euo6anc%2Ebadfolk%2Eorg%2Fnew%2FQXNsYW1QQG1hc2hyZXEuY29t
- https://www.office.com/estslogout?ru=/ HTTP 302
- https://login.microsoftonline.com/common/oauth2/logout?post_logout_redirect_uri=https%3A%2F%2Fwww.office.com%2F&state=yKCQeIugZGwo8pbndrJxTdmG9V6ixEBfhtknUA4871FqWVUvo1ArG0W5LIPloHBK7VaYq6IWMUydJ3P01yPxxE4SvIJp_fmwgNAEYv8t5Lt2F60LJxkf8hM9PXC9B-VC&x-client-SKU=ID_NET6_0&x-client-ver=6.34.0.0
- https://www.office.com/estslogout?post_logout_redirect_uri=https%3A%2F%2Fwww.office.com%2F HTTP 302
- https://login.microsoftonline.com/common/oauth2/logout?post_logout_redirect_uri=https%3A%2F%2Fwww.office.com%2F&state=DgQCYE9lP3nzKLp23rbe8EWQXmXZo_PnBVeB85H12ExDa7REINYyYdsstpjlo77RBchmqFDupf0y_exlimGQUm0pOjdH63XxVTzafnnhwSAztf_AlV37UqExfDWcN2Wm&x-client-SKU=ID_NET6_0&x-client-ver=6.34.0.0
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
LinkManager.jsp
crm.kia.com.au/response/ Redirect Chain
|
208 B 486 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
QXNsYW1QQG1hc2hyZXEuY29t
yllozi.uo6anc.badfolk.org/new/ |
145 B 544 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
aas.html
pub-d89e3188311c46f49978b9555d4c9596.r2.dev/ |
108 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ed9c9eb0dce17d752bedea6b5acda6d9.png
aadcdn.msauth.net/ests/2.1/content/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_7cc096da6aa2dba3f81fcc1c8262157c.png
aadcdn.msauth.net/ests/2.1/content/images/ |
240 B 479 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_0ad43084800fd8b50a2576b5173746fe.png
aadcdn.msauth.net/ests/2.1/content/images/ |
207 B 721 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
api.ipify.org/ |
35 B 209 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smtp.js
smtpjs.com/v3/ |
871 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout
login.microsoftonline.com/common/oauth2/ Frame 416D Redirect Chain
|
32 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout
login.microsoftonline.com/common/oauth2/ Frame EC8D Redirect Chain
|
32 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.srf
login.microsoftonline.com/ Frame 22C4 |
31 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/ests/2.1/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_ltjvsvk5aekta_kgibi0gg2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 22C4 |
109 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.3.5.min_dc940oomzau4rsu8qesnvg2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 22C4 |
117 KB 40 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_vmmoyj1-4wcgq_4ljx53-q2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 22C4 |
179 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ea19b2112f4dfd8e90b4505ef7dcb4f9.png
aadcdn.msftauth.net/shared/1.0/content/images/ Frame 22C4 |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_chy_qb6g1qbjbxlng2ytiq2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 416D |
109 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.3.5.min_dc940oomzau4rsu8qesnvg2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 416D |
117 KB 40 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_vmmoyj1-4wcgq_4ljx53-q2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame 416D |
179 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ea19b2112f4dfd8e90b4505ef7dcb4f9.png
aadcdn.msftauth.net/shared/1.0/content/images/ Frame 416D |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_ltjvsvk5aekta_kgibi0gg2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame EC8D |
109 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.3.5.min_dc940oomzau4rsu8qesnvg2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame EC8D |
117 KB 40 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_vmmoyj1-4wcgq_4ljx53-q2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ Frame EC8D |
179 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ea19b2112f4dfd8e90b4505ef7dcb4f9.png
aadcdn.msftauth.net/shared/1.0/content/images/ Frame EC8D |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| documentPictureInPicture function| $ function| jQuery string| wrfweewdwedew string| hudiswjs string| LINK function| kiujytredscvbrddszsasa function| getPublic object| Email function| redirectCU function| redirectKK16 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
crm.kia.com.au/ | Name: ASPSESSIONIDSSSBCABB Value: EIHEHBBBPHOPNNDCHDHIAGIG |
|
yllozi.uo6anc.badfolk.org/ | Name: PHPSESSID Value: 9e7d6482a5ba4d9c44da3b5ec65498cd |
|
login.microsoftonline.com/ | Name: ESTSSSOTILES Value: 1 |
|
login.microsoftonline.com/ | Name: AADSSOTILES Value: 1 |
|
login.microsoftonline.com/ | Name: ESTSAUTHLIGHT Value: + |
|
login.microsoftonline.com/ | Name: fpc Value: AiVy5K82xLtNoM9WtP3eU8A |
|
.login.microsoftonline.com/ | Name: esctx Value: PAQABAAEAAAAmoFfGtYxvRrNriQdPKIZ-yrvkfDW6Tp9z4d_nHA_1c9_LdJgeSMnoVguuzrKE61AC9FuUkmAOBf08h90KgY7lJnU0kjSXvb83kx0LGy8N6WnMlgZwKTTFFZihPOcVTNDGfhP1b9D7eEjp7cPJykdN33EGDadUEmRZE2WEOWUDVPH3eumqFEGw5Iy2905MfOMgAA |
|
login.microsoftonline.com/ | Name: x-ms-gateway-slice Value: estsfd |
|
login.microsoftonline.com/ | Name: stsservicecookie Value: estsfd |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-eau |
|
www.office.com/ | Name: OH.SID Value: 9a054f73-76dd-4102-acff-3ddba461b4a0 |
|
www.office.com/ | Name: OH.FLID Value: cb20737a-6eb8-4f88-9cd9-d7b6147a444c |
|
.login.microsoftonline.com/ | Name: SignInStateCookie Value: CAgABAAIAAAAmoFfGtYxvRrNriQdPKIZ-AgDs_wUA9P8FcnPi4de7kI0u-hoadCiMxMAqeD-wCRuiXwwWt_dBBMpctjo1TeoqfaIfyWHrS7JjXS0VSuhosQ |
|
.login.microsoftonline.com/ | Name: ESTSAUTHPERSISTENT Value: AgABAAQAAAAmoFfGtYxvRrNriQdPKIZ-AgDs_wUA9P-YfjFdnp0NIadMJStgPDkRCDBZ4osYH8hfo6brQ6VRFw91Xh0nKutN8e5X_52owMTmjGl_k18zNw |
|
.login.microsoftonline.com/ | Name: ESTSAUTH Value: AgABAAQAAAAmoFfGtYxvRrNriQdPKIZ-AgDs_wUA9P_8dYODYrrbXFPzzgxIRxz4qTc61JsFkOYBxTn5Y7ElsiNpuEC55XmT6A-ekdp_EDBjhBgpeOCqGw |
|
login.microsoftonline.com/ | Name: buid Value: AQABAAEAAAAmoFfGtYxvRrNriQdPKIZ-anOdSeMK7FPbKERPCqGsu1QYFhqYHYMFRp4hAvqR0GHsr7YaYXHn0i_8DROAQ_Yil_Ag7LYZFLQJqrqBiGk4iaPpprtvid3Bf9ywWcxMZ_4gAA |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msftauth.net
api.ipify.org
code.jquery.com
crm.kia.com.au
login.microsoftonline.com
pub-d89e3188311c46f49978b9555d4c9596.r2.dev
smtpjs.com
www.office.com
yllozi.uo6anc.badfolk.org
103.68.166.129
104.18.3.35
109.169.71.112
13.107.213.31
13.107.6.156
151.101.66.137
152.199.39.242
173.231.16.77
20.190.167.150
58.87.45.107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