Security Scan Report: businessuat.crm4.dynamics.com

Redirected to:
https://login.microsoftonline.com/834fb7b4-624d-4de8-a977-2d46ad979bd9...
Site favicon
Submitted: May 18, 2026, 6:50:34 PMCompleted: May 18, 2026, 6:51:48 PMpubliccompleted
Loading additional data...

Summary

This website contacted 7 IPs in 4 countries across 7 domains to perform 26 HTTP transactions. The main domain is login.microsoftonline.com and was registered NaN years ago.

Submitted URL: https://businessuat.crm4.dynamics.com

Effective URL: https://login.microsoftonline.com/834fb7b4-624d-4de8-a977-2d46ad979bd9/oauth2/authorize?client_id=00000007-0000-0000-c000-000000000000&response_type=code%20id_token&scope=openid%20profile&state=OpenIdConnect.AuthenticationProperties%3DMAAAADPiC1lHFxHxsx18HlJhZI4RvSGK3HZC1BBloq3dAMMGY3L2XG1QKoV7jQ-irojWWwEAAAABAAAACS5yZWRpcmVjdCZodHRwczovL2J1c2luZXNzdWF0LmNybTQuZHluYW1pY3MuY29tLw%26ReplyUrl%3DMAAAADPiC1lHFxHxsx18HlJhZI56Vl8a2mM0Wgkm0gqBN%252bfXLKJIimcI4tc6wYI0ZXTVoWh0dHBzOi8vZGIzLS1ldXJjcm1saXZlc2c2NDkuY3JtNC5keW5hbWljcy5jb20v%26RedirectTo%3DMAAAADPiC1lHFxHxsx18HlJhZI4gEbOrtJOPQ4RUkIXAtWS%252bW0CWJnLVlRSAI%252fxdIKsjjmh0dHBzOi8vYnVzaW5lc3N1YXQuY3JtNC5keW5hbWljcy5jb20v%26RedirectToForMcas%3Dhttps%253a%252f%252fbusinessuat.crm4.dynamics.com%252f&response_mode=form_post&nonce=639147270383416344.NDYxZGM3MDEtODU4NS00ZTQ5LTliOWMtMGJmMDgxODFiMDJjOGU0ZGYwMWUtZGRiZC00NmY2LWJhNWUtNzQ3NTI2MWY3OWE0&redirect_uri=https%3A%2F%2Fdb3--eurcrmlivesg649.crm4.dynamics.com%2F&max_age=86400&claims=%7B%22id_token%22%3A%7B%22xms_cc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&x-client-SKU=ID_NET472&x-client-ver=8.14.0.0&sso_reload=trueRedirected

The Cisco Umbrella rank of the primary domain is #3,900 of the top 1 million websitesTop 10K Site

AI Security Verdict

High Risk

Confidence: 80%

8
Risk Score

High risk site with critical IDS alerts and heavily obfuscated JavaScript, likely used for malware distribution despite being a Microsoft subdomain.

Risk Factors
Critical IDS alerts indicating malware data exfiltration and command‑and‑control activity
Heavily obfuscated JavaScript with suspicious encoding techniques
Dynamic code generation via Function() constructor
Presence of credential collection form on a subdomain
Multiple external Microsoft CDN domains referenced
Domain age information unavailable

Details

Page Title

Sign in to your account

Scan Type

public

Language

🇺🇸

English

(80% confidence)

Category

unknown

(0%)

Domain Information

Within the commercial generic top-level domain (.com), 'businessuat.crm4.dynamics.com' is registered and includes subdomain 'businessuat.crm4'. The second-level label 'dynamics' is 8 characters long holding two vowels versus 6 consonants. It segments into 1 word: dynamics. Expect 8 characters per word on average. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://businessuat.crm4.dynamics.com

Page Load Overview

6.98s
Total Load Time
9
HTTP Requests
4
Domains
78 KB
Total Size

Language Analysis

Primary Language

🇺🇸English
Code: en
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:en
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:en
Text Length:148 chars
Detector Agreement:67%

Website Classification

Primary Category

unknown0% confidence
Type: webapp
Method: structural

All Detected Categories

No categories detected

Detected Features

Login Form
Search

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
3172.205.54.196Dublin, Leinster, Ireland
AS8075Microsoft Corporation
152.138.229.66Dublin, Leinster, Ireland
AS8075Microsoft Corporation
120.190.160.4Amsterdam, North Holland, Netherlands
AS8075Microsoft Corporation
123.53.42.146Frankfurt am Main, Hesse, Germany
AS20940Akamai International B.V.
140.126.32.72Amsterdam, North Holland, Netherlands
AS8075Microsoft Corporation
113.107.246.44United States
AS8075Microsoft Corporation
140.126.31.73Dublin, Leinster, Ireland
AS8075Microsoft Corporation
97--

Detected Technologies5

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T13D935DE97F631937C2C744B6F47A7E069E366807988CC9A0F19CC9842FEA74D8127653

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

1536:lE3L358GLG2+Pd3twz3B60gMw7doIZ9Tjuokmap5vPoMLufFGEQHLiVJC:S7p89dwzy7d9a/A/C

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:90544:CSSsMntEVCCAkiwgFQrkQEBQUBYGAEQgkhPUCA6FwFgEAVwqWwCAkhYgDIhIQRHKIYMAEHaagAAMeWXWSAlAACdNQCpESOEA

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:0000181818180000
Perceptual Hash:8cd93366cc9399cc
Difference Hash:33a2b2b232b2ccaa
Wavelet Hash:995a7e5a995a6642
Color Hash:#ccd279

Scan History

Scan history not available

Unable to load historical scan data