162.33.179.57
Open in
urlscan Pro
162.33.179.57
Malicious Activity!
Public Scan
Submission: On January 24 via manual from US — Scanned from DE
Summary
This is the only time 162.33.179.57 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Verizon (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 162.33.179.57 162.33.179.57 | 399629 (BLNWX) (BLNWX) | |
14 | 192.30.31.89 192.30.31.89 | 14153 (EDGECAST-IR) (EDGECAST-IR) | |
15 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
verizon.com
ilogin.verizon.com — Cisco Umbrella Rank: 42449 |
493 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
14 | ilogin.verizon.com |
162.33.179.57
ilogin.verizon.com |
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
ilogin.verizon.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.verizon.com DigiCert SHA2 Extended Validation Server CA |
2021-11-15 - 2022-11-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://162.33.179.57/
Frame ID: F8D72ADB60EB95A82340EE7DB237784D
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Verizon | Enterprise Single Sign OnDetected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Reset Password
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
162.33.179.57/ |
29 KB 30 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Core960.css
ilogin.verizon.com/newextranet/css/ |
7 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CustomTheme.css
ilogin.verizon.com/newextranet/css/ |
89 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Styles.css
ilogin.verizon.com/newextranet/css/ |
44 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.css
ilogin.verizon.com/newextranet/css/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modernizr.js
ilogin.verizon.com/newextranet/js/ |
14 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fun.js
ilogin.verizon.com/newextranet/js/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
ilogin.verizon.com/newextranet/js/ |
290 KB 291 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.js
ilogin.verizon.com/newextranet/js/ |
111 KB 112 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
handheld.css
ilogin.verizon.com/newextranet/css/ |
21 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugin.js
ilogin.verizon.com/newextranet/js/ |
9 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropshadow_sep_left.gif
ilogin.verizon.com/newextranet/img/dividers/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropshadow_sep_right.gif
ilogin.verizon.com/newextranet/img/dividers/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropshadow_sep_middle.gif
ilogin.verizon.com/newextranet/img/dividers/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
close_Ico.gif
ilogin.verizon.com/newextranet/img/global/ |
366 B 787 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Verizon (Telecommunication)35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| html5 object| Modernizr function| yepnope function| isEmpty function| trim1 function| trim function| getUrlStr function| popDefaultPwd function| $ function| jQuery function| DP_jQuery_1643032443640 function| isSplCharPresent function| submitEnter function| validateTypeDomain object| newImage function| s4 function| guid function| submitForm function| resizeWindow function| setFocusToLastName function| lmao function| closeErrorMessage object| sbox function| renderSelectBox function| renderTips number| s object| sb boolean| multiple string| etext number| width object| jQuery171025966740573533476 object| my object| styles object| mp number| ml0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ilogin.verizon.com
162.33.179.57
192.30.31.89
29df4ea9f48c7c837caaeda24ed02af505e6ba548fdea9152461766006231195
2c1d3a974693d0d8cf10737d174a83bd003892e9970e1aaa4da4ce30051ffde1
2d6c6f51c481e60137df2cbc220d0a7ef879d04e830bf18e21c1eff531b03be2
37d35afc3782ea5854ab0f997e072a46061178d994df362920cfcecec52efc81
51e7e4e632023bdefc4334c7349aadc486a1dd4eec81288a1cfb3126bc876a92
520d3c53faa0a30a6d7be1ef6b6a0a661640ea607c44ebec55c6ef71e8f44e80
5ac35746bf6dd13c10adc70a14992df4ac4248093e5fa9e3c02b720441300980
83f0d313c5d5607097db51ef4f82c40069c7c614890fb23f1897912006968d75
8bccb818b3db6a2c65bdeac80741af1b7ee1ae3d24c3ab36cac615382ce7103d
929e3fcda7f14343c987c91d6526b06646926dcbc85379917a78323ca9ceb1c7
94f0c233338135bdbcb32316fce02348154a3a312755619de8982afad89a7709
9c8023a5637c230f14f0f64b6128d2eb2487976fd8cbe7ac93fd3f674b02738b
d47b7ba654eab4246884c9e81947a415fd34d3220fe15748ad07c9486ee7d160
e7f0fa4631e2b6eee29c6138bad0cb0af0fc4426fd3924a0d6ce4e39de774c7a
ef341a5039edf9d4fc9b6c47e96e2ad1a28844634cbe9809bf33b709ce1694d5
f5b291d81e664cb6b443b8e821c8d42dc3536ac8616bf2b5051316cb99081e04