easy-pear-duck-tutu.cyclic.app
Open in
urlscan Pro
54.200.167.153
Malicious Activity!
Public Scan
Submission: On February 10 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on February 4th 2024. Valid for: a year.
This is the only time easy-pear-duck-tutu.cyclic.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 54.200.167.153 54.200.167.153 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 144.160.19.173 144.160.19.173 | 797 (AMERITECH-AS) (AMERITECH-AS) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 4 |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-200-167-153.us-west-2.compute.amazonaws.com
easy-pear-duck-tutu.cyclic.app |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
att.com
signin.att.com — Cisco Umbrella Rank: 27678 |
72 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 223 |
28 KB |
1 |
cyclic.app
easy-pear-duck-tutu.cyclic.app |
24 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | signin.att.com |
easy-pear-duck-tutu.cyclic.app
signin.att.com |
1 | cdnjs.cloudflare.com |
easy-pear-duck-tutu.cyclic.app
|
1 | easy-pear-duck-tutu.cyclic.app | |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cyclic.app Amazon RSA 2048 M02 |
2024-02-04 - 2025-03-05 |
a year | crt.sh |
*.att.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-05-01 - 2024-05-31 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://easy-pear-duck-tutu.cyclic.app/
Frame ID: 88B0741E61E1B1B2971D2F65CA83C805
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
easy-pear-duck-tutu.cyclic.app/ |
24 KB 24 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
signin.att.com/static/siam/en/halo_c/halo-c-login/ |
126 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
att_hz_lg_lkp_rgb_pos.svg
signin.att.com/static/siam/en/halo_c/images/logos/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Rg.woff2
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/fonts/att/ATTAleckSans/woff2/ |
18 KB 18 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Bd.woff2
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/fonts/att/ATTAleckSans/woff2/ |
18 KB 18 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| generateRandomString function| $ function| jQuery function| smb string| email object| dispemElement object| dispemdiv object| Signin object| userfield object| passfield object| Next0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
easy-pear-duck-tutu.cyclic.app
signin.att.com
144.160.19.173
2606:4700::6811:180e
54.200.167.153
2f47247427bbbc19d6a08ab626cc43994d0e3e2069a5a5a4a80ba5e513c42fdb
37a1212cc1ab5c935d9a3fee05c98c940eaa895a23510e5f83d550dfbb0d763f
df4cff0ac010bc2ae490916002c85a17a8cda07b85610c7cd1eb30ed30f2561a
e2740c7b209e33aca7176250d80f94b4924e5e5d18076ee3b95f32a0e20d1f58
ecc6e5c037a4e54c1ed4052c9880d55c27187bf709fb82fae2709c92d3a3a563
ff118d7ef60180182a4ef72d90fc80b20a407fc030fa35da3e60110310c6e633
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e