multiplexlogic.com
Open in
urlscan Pro
108.179.232.32
Malicious Activity!
Public Scan
Submission: On February 08 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 24th 2023. Valid for: 3 months.
This is the only time multiplexlogic.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Cox (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 15 | 108.179.232.32 108.179.232.32 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
2 | 18.66.147.4 18.66.147.4 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 65.9.86.82 65.9.86.82 | 16509 (AMAZON-02) (AMAZON-02) | |
14 | 3 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: sma-accounting.com
multiplexlogic.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-66-147-4.fra60.r.cloudfront.net
global.oktacdn.com |
ASN16509 (AMAZON-02, US)
PTR: server-65-9-86-82.ams1.r.cloudfront.net
gateway.foresee.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
multiplexlogic.com
4 redirects
multiplexlogic.com |
231 KB |
2 |
oktacdn.com
global.oktacdn.com — Cisco Umbrella Rank: 9626 |
47 KB |
1 |
foresee.com
gateway.foresee.com — Cisco Umbrella Rank: 4884 |
3 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
15 | multiplexlogic.com |
4 redirects
multiplexlogic.com
|
2 | global.oktacdn.com |
multiplexlogic.com
global.oktacdn.com |
1 | gateway.foresee.com |
multiplexlogic.com
|
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.catfinancials.multiplexlogic.com R3 |
2023-01-24 - 2023-04-24 |
3 months | crt.sh |
*.oktacdn.com DigiCert TLS RSA SHA256 2020 CA1 |
2023-01-03 - 2024-01-02 |
a year | crt.sh |
foresee.com Amazon |
2022-05-28 - 2023-06-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://multiplexlogic.com/CoxMado/web/login.php?web/cox/SignOn
Frame ID: C8902B5DC868DA9929C1C1E6926CD986
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.woff HTTP 301
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.woff/
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.woff HTTP 301
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.woff/
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.ttf HTTP 301
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.ttf/
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.ttf HTTP 301
- https://multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.ttf/
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
multiplexlogic.com/CoxMado/web/ |
27 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
okta-sign-in.min.css
global.oktacdn.com/okta-signin-widget/3.8.2/css/ |
180 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flex-presentation.css
multiplexlogic.com/CoxMado/web/assets/css/ |
173 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cox-residential-aemapp.css
multiplexlogic.com/CoxMado/web/assets/css/ |
424 KB 88 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flex2text-styles.min.css
multiplexlogic.com/CoxMado/web/assets/css/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overrides.min.css
multiplexlogic.com/CoxMado/web/assets/css/ |
49 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oo_icon_white.gif
gateway.foresee.com/code/5.10.4-oo/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cox_logo.png
multiplexlogic.com/CoxMado/web/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox-default.svg
multiplexlogic.com/CoxMado/web/assets/img/ |
270 B 311 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
okticon.woff
global.oktacdn.com/okta-signin-widget/3.8.2/font/ |
20 KB 21 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.woff/ Redirect Chain
|
100 KB 20 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.woff/ Redirect Chain
|
100 KB 20 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Regular-webfont.ttf/ Redirect Chain
|
100 KB 20 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
multiplexlogic.com/CoxMado/web/assets/css/fonts/OpenSans-Semibold-webfont.ttf/ Redirect Chain
|
100 KB 20 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Cox (Telecommunication)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange object| now number| year0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gateway.foresee.com
global.oktacdn.com
multiplexlogic.com
108.179.232.32
18.66.147.4
65.9.86.82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