login.windows-ppe.net
Open in
urlscan Pro
40.126.1.160
Public Scan
Effective URL: https://login.windows-ppe.net/rhalldevtest.ccsctp.net/wsfed?wa=wsignin1.0&wtrealm=spn%3a00000015-0000-0000-c000-000000000000&w...
Submission: On May 07 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Microsoft IT TLS CA 2 on February 20th 2020. Valid for: 2 years.
This is the only time login.windows-ppe.net was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 40.74.125.228 40.74.125.228 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 40.126.1.160 40.126.1.160 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1030:d00... 2603:1030:d00::66 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 2620:1ec:bdf::10 2620:1ec:bdf::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
15 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
msauth.net
aadcdn.msauth.net |
179 KB |
2 |
windows-ppe.net
login.windows-ppe.net |
46 KB |
1 |
live-int.com
login.live-int.com |
|
1 |
dynamics.com
1 redirects
shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com |
549 B |
15 | 4 |
Domain | Requested by | |
---|---|---|
12 | aadcdn.msauth.net |
login.windows-ppe.net
aadcdn.msauth.net |
2 | login.windows-ppe.net |
aadcdn.msauth.net
|
1 | login.live-int.com |
login.windows-ppe.net
|
1 | shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com | 1 redirects |
15 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
privacy.microsoft.com |
www.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
graph.windows.net Microsoft IT TLS CA 2 |
2020-02-20 - 2022-02-20 |
2 years | crt.sh |
login.live-int.com Microsoft IT TLS CA 4 |
2019-07-17 - 2021-07-17 |
2 years | crt.sh |
aadcdn.msauth.net Microsoft IT TLS CA 4 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.windows-ppe.net/rhalldevtest.ccsctp.net/wsfed?wa=wsignin1.0&wtrealm=spn%3a00000015-0000-0000-c000-000000000000&wctx=rm%3d0%26id%3dpassive%26ru%3d%252f&wct=2020-05-07T22%3a32%3a00Z&wreply=https%3a%2f%2fshsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com%2f
Frame ID: D9C912DBAE1BCD62A89F4AF94A826775
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com/
HTTP 302
https://login.windows-ppe.net/rhalldevtest.ccsctp.net/wsfed?wa=wsignin1.0&wtrealm=spn%3a00000015-0000-0000... Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Learn more
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com/
HTTP 302
https://login.windows-ppe.net/rhalldevtest.ccsctp.net/wsfed?wa=wsignin1.0&wtrealm=spn%3a00000015-0000-0000-c000-000000000000&wctx=rm%3d0%26id%3dpassive%26ru%3d%252f&wct=2020-05-07T22%3a32%3a00Z&wreply=https%3a%2f%2fshsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com%2f Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
wsfed
login.windows-ppe.net/rhalldevtest.ccsctp.net/ Redirect Chain
|
169 KB 45 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Me.htm
login.live-int.com/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLogin_PCore_bNAAjF7svY3pbNt-8xA_XQ2.js
aadcdn.msauth.net/shared/1.0/content/js/ |
413 KB 114 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
info_4883eb1a3cbdddf5a79e28d320cfe5a9.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
342 B 877 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
915 B 561 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
915 B 533 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_99ypt2ae9l1eaa2j9r7rkw2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
0 19 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en.min_n29epp0zpldpe3jtpr64va2.js
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
0 11 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
915 B 689 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 993 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_635a63d500a92a0b8497cdc58d0f66b1.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
900 B 548 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
reportpageload
login.windows-ppe.net/common/instrumentation/ |
264 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_99ypt2ae9l1eaa2j9r7rkw2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
99 KB 19 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en.min_n29epp0zpldpe3jtpr64va2.js
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
37 KB 11 KB |
Fetch
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| $Config object| $Debug object| $Do function| $Loader object| $WebWatson function| GetString function| GetErrorString function| GetUrl object| $B object| ServerData object| webpackJsonp object| ko object| PROOF object| StringRepository boolean| __ConvergedLogin_PCore boolean| __5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
login.windows-ppe.net/ | Name: stsservicecookie Value: estsppe |
|
.login.windows-ppe.net/ | Name: brcap Value: 0 |
|
.login.windows-ppe.net/ | Name: esctx Value: AQABAAAAAAAyagmN4QTbSbbgOeeNZhrv0crmjqWAxK2Qg2EQUiph5aD8CaUGtu8tt3E_uduLU2i0Ct8VBB0zDQV3WeG8IXgEkccmor2AfbMry1owefyxdPD0UevGsX38LT8mDSrB6dgeotxbCafkp_UPEvMB3FOpDCdRRSTMOnPEya3XenDt2x_a0BR3aZt8V-6njPT8WvkgAA |
|
login.windows-ppe.net/ | Name: fpc Value: Ao1gh_0_LWZOlOXIEMsGPPW3qDB8AQAAAGKDRtYOAAAA |
|
login.windows-ppe.net/ | Name: buid Value: AQABAAEAAAAyagmN4QTbSbbgOeeNZhrvmEOhGXV_7uzz78pgwTFnZcKW4YS1GMgoT8oBfZaEXJluPmpvifzsfQLLVoxHmTlK8MA0YLBX8XywEvtG5CK-E8mW3-ZMNmfjDwdOCYtZW30gAA |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
login.live-int.com
login.windows-ppe.net
shsatopsyncvmupdate2aossoap.sandbox.operations.dev.dynamics.com
2603:1030:d00::66
2620:1ec:bdf::10
40.126.1.160
40.74.125.228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