oidc.idp.elogin.e-access.sso.us.org
Open in
urlscan Pro
198.54.116.155
Malicious Activity!
Public Scan
Submission: On July 22 via manual from US — Scanned from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on July 21st 2022. Valid for: a year.
This is the only time oidc.idp.elogin.e-access.sso.us.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 22 | 198.54.116.155 198.54.116.155 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 2 | 2606:4700::68... 2606:4700::6810:7baf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
22 | 2 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server71-5.web-hosting.com
oidc.idp.elogin.e-access.sso.us.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
us.org
1 redirects
oidc.idp.elogin.e-access.sso.us.org |
654 KB |
2 |
unpkg.com
1 redirects
unpkg.com — Cisco Umbrella Rank: 893 |
8 KB |
22 | 2 |
Domain | Requested by | |
---|---|---|
22 | oidc.idp.elogin.e-access.sso.us.org |
1 redirects
oidc.idp.elogin.e-access.sso.us.org
|
2 | unpkg.com |
1 redirects
oidc.idp.elogin.e-access.sso.us.org
|
22 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
oidc.idp.elogin.att.com |
www.e-access.att.com |
www.att.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
oidc.idp.elogin.e-access.sso.us.org Sectigo RSA Domain Validation Secure Server CA |
2022-07-21 - 2023-07-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/
Frame ID: 596A98248D65F95C89B461460AC542F8
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
AT&T Security Server: LoginPage URL History Show full URLs
-
https://oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91
HTTP 301
https://oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/ Page URL
Detected technologies
Axios (JavaScript libraries) ExpandDetected patterns
- /axios(@|/)([\d.]+)(?:/[a-z]+)?/axios(?:.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Forgot Password?
Search URL Search Domain Scan URL
Title: FAQs
Search URL Search Domain Scan URL
Title: Update Security Profile
Search URL Search Domain Scan URL
Title: Terms
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91
HTTP 301
https://oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://unpkg.com/axios/dist/axios.min.js HTTP 302
- https://unpkg.com/axios@0.27.2/dist/axios.min.js
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/ Redirect Chain
|
94 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
unpkg.com/axios@0.27.2/dist/ Redirect Chain
|
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/js/ |
6 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/js/ |
81 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/js/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.js
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/js/ |
95 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cato.css
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/css/ |
330 B 342 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox.css
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/css/ |
3 KB 902 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
att_logo_97x40.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GLO_Question_Icon.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
223 B 423 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mobileKeyImg.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rsaImg.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
safeNetLogo.svg
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
398 KB 298 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mtipsLogo.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
howto-for-mobile-devices.gif
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
95 KB 95 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
howto-for-desktop-devices.gif
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
93 KB 93 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flat_faq-reverse_icon_rgb_blu_modified_18x18.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Rg.woff
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/fonts/ |
22 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flat_check_icon_rgb_wht.png
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Md.woff
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/fonts/ |
23 KB 24 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Bd.woff
oidc.idp.elogin.e-access.sso.us.org/attLRR/LrrController/Status/Employee/0x91/fonts/ |
23 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)159 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| axios number| attempted_count boolean| submitted_once function| submitRSA function| disableOverlay function| enableOverlay function| isSoftwareToken object| scriptConstants function| HaloEBrowserInfo object| haloEBrowserInfo function| haloEAlert function| getEventTargetElement object| g_BlockUISettings boolean| g_MockMobile object| g_StateCookieHandler object| g_SessionCookieHandler boolean| g_enterPressed object| g_selectedQuestion function| handleEnterKey function| isPopulated function| trimElementValue function| trimFormUserId function| preventMultipleEnterKeys function| mobileLanguageChanged function| changeVerificationForm function| updateUserId function| globalPasswordChangeForm function| mobileKeyChangeForm function| onClickUseMobileKeyPasscodeOrTemporaryPasscode function| onClickMobileKeyNotification function| securityKeyChangeForm function| bioKeyChangeForm function| windowsChangeForm function| changeForm function| genericChangeForm function| disableActiveForm function| doChangeForm function| setFocusOnActiveForm function| setMenuItem object| bdAuthorizationTypes function| toggleBusinessDirectSettings function| setMockMobile function| onMobile object| g_isMobileDevice function| isMobileDevice function| isDeskTop function| hardOrSoft function| toggleSelectDiv function| enableSubmit function| disableSubmit function| formInputHandler function| glopasswordInputHandler function| glopasswordVerificationButtonEnabler function| glopasswordVerificationButtonEnablerOnPaste function| mobileKeyInputHandler function| mobileKeyDeviceATTUIDInputHandler function| mobileKeyMFAButtonEnabler function| mobileKeyMFAButtonEnablerOnPaste function| securIDsoftwareTokenInputHandler function| securIDhardwareTokenInputHandler function| safenetButtonInputHandler function| safenetZkButtonInputHandler function| pickerPageUIDInputHandler function| mtipsButtonInputHandler function| mtipsMFAButtonEnabler function| mtipsMFAButtonEnablerOnPaste function| safenetMFAButtonEnabler function| safenetMFAButtonEnablerOnPaste function| securIDMFAsoftwareTokenButtonEnabler function| securIDMFAsoftwareTokenOnPaste function| securIDMFAhardwareTokenButtonEnabler function| securIDMFAhardwareTokenButtonEnablerOnPaste function| mobileCancelFrontEnd function| mobileTimeOutFrontEnd function| mobileDeniedFrontEnd function| mobileErrorFrontEnd function| sendPushFrontEnd function| hideDropdown function| showDropdown function| getUserIdErrorMsg function| doPasswordOnClick function| doMobileKeyOnClick function| doSecuridSoftTokenOnClick function| doSecuridHardTokenOnClick function| doSafenetOnClick function| doMtipsOnClick function| verifyMKUserOnClick function| setStrReqLnkCookieForWinAuth function| doWindowsOnClick function| setPageUsedCookie function| setCSPEnvURL function| setStateCookie function| setPageReqCookie function| getWinAuthAlways function| getHardTokenPin function| getSoftOrHardToken function| getUserId function| chkRememberMe function| doYubiKeyOnClick function| doBioKeyOnClick function| doSecondaryAuthFormOnClick function| setCookie function| deleteCookie function| deleteCookieWithDomain function| enableRememeberMe function| getCookie function| translateToSpanish function| translateToEnglish function| removeError_script function| setBackgroundToDevRed function| changeUserId function| isSliderEnabled function| isSelectBoxVisible function| toggleCheckBoxClass function| toggleRememberMe function| toggleBDUserId function| updateRememberMe function| setRememberMe function| toggleMobileKeyPasscode function| StateCookieHandler function| SessionCookieHandler function| BusinessDirectHandler object| g_BusinessDirectHandler function| switchTokenStepEnabled function| setBDUserId function| sendBDUserId function| getTargetAuthPolicyOrWebsealUrl function| showYubiOTP function| getNextTabIndexElement function| initTabbing function| gloAutoFillChecker function| displayAuthNotificationMessage function| getZenKeyLearnLink function| goToZenKey function| getEncodedWarnerMediaUrlParams function| getEncodedCricketADUserUrl function| setUserIdReadOnly function| initStepUpConfiguration function| initZKLinkConfiguration function| goToZkUnderConst function| goToZkUnauthIDV function| goBacktoGLO function| showPickerPage function| pickerPageDoMobileKey function| rsaPopup function| disableApp function| checkAuthnLevel function| isSecurIdAuthType3 object| globals function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
oidc.idp.elogin.e-access.sso.us.org
unpkg.com
198.54.116.155
2606:4700::6810:7baf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