
vzwcorp.co
144.202.117.57
Malicious Activity!
Submission: On July 04 via api from US — Scanned from DE
Summary
This is the only time vzwcorp.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Okta (Online) Verizon (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 144.202.117.57 144.202.117.57 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
12 | 2 |
ASN20473 (AS-CHOOPA, US)
PTR: 144.202.117.57.vultrusercontent.com
vzwcorp.co | |
144.202.117.57 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
vzwcorp.co
vzwcorp.co |
227 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
11 | vzwcorp.co |
vzwcorp.co
|
12 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
thestreet.vzbuilders.com |
www.okta.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://vzwcorp.co/
Frame ID: 0724018ADC9437236541AB490539DA7D
Requests: 13 HTTP requests in this frame
Screenshot

Detected technologies
Detected patterns
- /_nuxt/
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
12
Requests
0
%
HTTPS
0
%
IPv6
1
Domains
1
Subdomains
2
IPs
1
Countries
253
kB
Transfer
706
kB
Size
0
Cookies
2 Outgoing links
These are links going to different origins than the main page.
Title: Help
Search URL Search Domain Scan URL
Title: Okta
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
vzwcorp.co/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
vzwcorp.co/scripts/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6a6c442.js
vzwcorp.co/_nuxt/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c67442c.js
vzwcorp.co/_nuxt/ |
203 KB 70 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ae99e97.js
vzwcorp.co/_nuxt/ |
72 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d795c50.js
vzwcorp.co/_nuxt/ |
233 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
725727e.js
vzwcorp.co/_nuxt/ |
13 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
settings
144.202.117.57/api/app/ |
26 KB 26 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.2dc2af8.png
vzwcorp.co/_nuxt/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox-sign-in-widget.cca9326.png
vzwcorp.co/_nuxt/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
montserrat-light-webfont.47314ef.woff
vzwcorp.co/_nuxt/fonts/ |
22 KB 22 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
montserrat-regular-webfont.5623bc4.woff
vzwcorp.co/_nuxt/fonts/ |
21 KB 22 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Okta (Online) Verizon (Telecommunication)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery object| __NUXT__ object| webpackJsonp function| installComponents object| __core-js_shared__ object| core object| regeneratorRuntime function| setImmediate function| clearImmediate object| onNuxtReadyCbs function| onNuxtReady object| $nuxt0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
vzwcorp.co
144.202.117.57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