URL: https://attopus.me/
Submission: On August 12 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 194.5.156.54, located in Netherlands and belongs to AS-HOSTINGER, LT. The main domain is attopus.me.
TLS certificate: Issued by Let's Encrypt Authority X3 on August 1st 2019. Valid for: 3 months.
This is the only time attopus.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: AT&T (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
3 194.5.156.54 47583 (AS-HOSTINGER)
3 1
Apex Domain
Subdomains
Transfer
3 attopus.me
attopus.me
33 KB
3 1
Domain Requested by
3 attopus.me attopus.me
3 1

This site contains links to these domains. Also see Links.

Domain
www.att.com
oidc.idp.elogin.att.com
Subject Issuer Validity Valid
attopus.me
Let's Encrypt Authority X3
2019-08-01 -
2019-10-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://attopus.me/
Frame ID: 4C121CD11CA8E2C6D70A73DF361CF882
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

33 kB
Transfer

106 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
attopus.me/
103 KB
30 KB
Document
General
Full URL
https://attopus.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
194.5.156.54 , Netherlands, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed / PHP/7.2.20
Resource Hash
edef965436bdde82b2c5747fd4ca021e02ded9c7111b131bcc8b3ef95d225fe8

Request headers

:method
GET
:authority
attopus.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
x-powered-by
PHP/7.2.20
content-type
text/html; charset=UTF-8
content-encoding
br
vary
Accept-Encoding
date
Mon, 12 Aug 2019 14:39:14 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
common.js
attopus.me/lrr/attLRR/resources/js/
0
0
Script
General
Full URL
https://attopus.me/lrr/attLRR/resources/js/common.js
Requested by
Host: attopus.me
URL: https://attopus.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
194.5.156.54 , Netherlands, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://attopus.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 14:39:14 GMT
content-encoding
br
last-modified
Thu, 11 Jul 2019 08:03:34 GMT
server
LiteSpeed
etag
"999-5d26ed56-d89b209773b71f17;br"
vary
Accept-Encoding
content-type
text/html
status
404
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
914
logo_homepage2.gif
attopus.me/
3 KB
3 KB
Image
General
Full URL
https://attopus.me/logo_homepage2.gif
Requested by
Host: attopus.me
URL: https://attopus.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
194.5.156.54 , Netherlands, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
6af62124f222b73ff5a777574dcccfedd892dd0a7dbfddf41fe6ccf99eec7b33

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://attopus.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 14:39:14 GMT
last-modified
Thu, 01 Aug 2019 18:12:07 GMT
server
LiteSpeed
etag
"a53-5d432b77-3e98302adfc845aa;;;"
content-type
image/gif
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
2643
expires
Mon, 19 Aug 2019 14:39:14 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: AT&T (Telecommunication)

145 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask boolean| bShowNonPrimaryUsage boolean| bNoLoginButton boolean| bIsIphone string| agent string| strReqLnkCookie string| strCSPEnvURLCookie string| strPKMSLogin object| astrShowBD object| astrBDOnly object| astrTokenOnly object| astrBDAppName object| astrIsurvey object| astrATTOnly object| astrATTOnlyExc object| astrHideATT object| astrShowCricket string| strUserIDText string| strBDUserIDText string| strATTUserIDText object| strCookieDomain string| strUserIDCookie string| strTokenUserCookie string| strTokenPINCookie string| strStateCookie string| strHlte26Cookie string| strHlte26CookieFT string| strV1StateCookie string| strPwd string| strToken string| strTokenGemalto string| strTokenMTips string| strMobileKey string| strAutoMK string| strTokenBasic string| strTokenAdvanced string| strTokenHard string| strTokenSoft string| strStateRemember string| mobileKeyUserId string| strStateForget string| strV1StateSep string| strStateSep string| strStateVersion string| strWriteStateVersion string| strStateSessionLifetime string| strWinAuthAlways string| strWinAuthDisabled string| strUserIDVal string| strTokenUserVal string| strTokenPINVal string| strStateVal string| strPwdOrTokenVal string| strTokenTypeVal string| strSoftOrHardTokenVal string| strWinAuthVal string| strVersionVal string| strAutoMKVal boolean| bcsplastlogincookieExistsMock number| strAutoMKLocalVal boolean| bSetupRememberMe boolean| bAllowTokenPINSave boolean| bSetupSoftwareToken boolean| bSupportSafenet boolean| bWriteSessionCookies boolean| bcsplastlogincookieExists string| strAuthnLevel string| strAuthnLevel2 string| strAuthnLevel3 string| strAuthnLevel4 string| strAuthnLevel5 string| strAuthnLevel6 string| strAuthnLevel7 string| strAuthnLevel8 string| strAuthnLevel9 string| redirectUrl string| mklauncherUrl string| strAACMtipsUrl string| strAACGemaltoUrl string| strLoginErrorCookie string| strLoginErrorTag function| isIE function| isNS function| isIOS function| delay function| getCookieExpiration function| setInputFocus function| checkSubmit function| checkFormSubmit function| checkCookiesOnLoad function| checkCookiesAtField function| ns4ElementById function| getObject function| getCookieVal function| getCookie function| setCookie function| setReqURL function| correctURLContainHashSymbol function| getTargetURL function| getRequestParamFromQueryString function| getReqURL function| setCSPEnvURL function| getShowBD function| getBDOnly function| showUserID function| getLoginError function| getBDUserID function| doBD function| handlePwdOrToken function| handleAdvanced function| handleTokenDefault function| handleSoftwareToken function| handleRememberMe function| isCSPTestSystem function| readStateCookies function| setStateCookies function| setAutoMKVal function| setMobileKeyFlow function| deleteStateCookies function| getUserName function| trim function| setFocus function| getUserIDText function| getTokenOnly function| getATTOnly function| getIsurvey function| getHideATT function| getShowCricket function| doSubmit function| decryptCookie function| start function| setCurrentLocale function| getIamlangCookie function| selectedLanguage function| saveButtonClick function| openPopupWindow function| closePopupWindow function| showLogin function| showPwd function| showToken function| showIsurveyLogin function| DeviceTypeChangeCss number| nCheckCSPAttCom

3 Cookies

Domain/Path Name / Value
attopus.me/ Name: PinLogin
Value: TestCookies
attopus.me/ Name: cspURL
Value: https%3A//attopus.me
attopus.me/ Name: cspReqLnk
Value: /mga/sps/oauth/oauth20/authorize%3Fnonce%3Dcw1TtNWmqw%26redirect_uri%3Dhttps%253A%252F%252Fwww.e-access.att.com%252Fisam%252Fsps%252Foidc%252Frp%252FATT-RP%252Fredirect%252FATT-Password%26response_mode%3Dform_post%26scope%3Dopenid%26Target%3Dhttps%253A%252F%252Fwww.e-access.att.com%252Fmycsp%252Fmycspportal%26response_type%3Did_token%26state%3Dr1Ralvj3C7%26client_id%3DPassword-ATT

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

attopus.me
194.5.156.54
6af62124f222b73ff5a777574dcccfedd892dd0a7dbfddf41fe6ccf99eec7b33
edef965436bdde82b2c5747fd4ca021e02ded9c7111b131bcc8b3ef95d225fe8