ssoteadyauth.arnot-health.org
Open in
urlscan Pro
107.189.3.191
Malicious Activity!
Public Scan
Submission: On August 22 via manual from US — Scanned from DE
Summary
This is the only time ssoteadyauth.arnot-health.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 107.189.3.191 107.189.3.191 | 53667 (PONYNET) (PONYNET) | |
6 | 144.161.77.234 144.161.77.234 | 797 (AMERITECH-AS) (AMERITECH-AS) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:2af::2db1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
att.com
signin.att.com — Cisco Umbrella Rank: 20982 www.att.com — Cisco Umbrella Rank: 12138 |
112 KB |
1 |
arnot-health.org
ssoteadyauth.arnot-health.org |
6 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
6 | signin.att.com |
ssoteadyauth.arnot-health.org
signin.att.com |
1 | www.att.com |
ssoteadyauth.arnot-health.org
|
1 | ssoteadyauth.arnot-health.org | |
8 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.att.com |
attreg.att.net |
about.att.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.att.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-09-22 - 2022-09-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://ssoteadyauth.arnot-health.org/
Frame ID: 5A3FE2B5C302E74F6F87F7872B5AE72E
Requests: 8 HTTP requests in this frame
8 Outgoing links
These are links going to different origins than the main page.
Title: Forgot user ID?
Search URL Search Domain Scan URL
Title: Forgot password?
Search URL Search Domain Scan URL
Title: Create one now
Search URL Search Domain Scan URL
Title: Legal policy center
Search URL Search Domain Scan URL
Title: Privacy policy
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Do not sell my personal info
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ssoteadyauth.arnot-health.org/ |
16 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
signin.att.com/static/siam/en/halo_c/halo-c-login/ |
154 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/images/ |
8 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
errornew.svg
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/images/ |
566 B 964 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
signin.att.com/static/siam/en/halo_c/halo-c-login/ |
115 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
detm-container-ftr.js
www.att.com/scripts/adobe/prod/ |
666 B 744 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Rg.woff2
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/fonts/att/ATTAleckSans/woff2/ |
18 KB 18 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Md.woff2
signin.att.com/static/siam/en/halo_c/halo-c-login/assets/fonts/att/ATTAleckSans/woff2/ |
19 KB 20 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation object| loginJspEnvVars string| loginLanguage object| webpackJsonp function| detmExecuteFooter1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ssoteadyauth.arnot-health.org/ | Name: PHPSESSID Value: f6517e04e904dea8a4b7ad600fc031b7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
signin.att.com
ssoteadyauth.arnot-health.org
www.att.com
107.189.3.191
144.161.77.234
2a02:26f0:6c00:2af::2db1
03d188255a6f1b49c8aabe7174fc431642965f906a9be9ea9efab3c202c1b080
43f774da83292822f54305d69e01286ca018b6f3f0fe86250451ad93d9252f9c
59ea63b5ffe0f060e37c24a44b6406943df9e4fca39e2ef43023c2ae9783f220
6982fbe858e30068de9301b49438c83838bc7beb058146703b22b701e6709c7e
9b8659596c575886c9202ec3a8506949e69140b50818ca4fc1e58494f3d4e8c9
db8f928b76604c3c3411437b6df8dcd9017c21758430804a9f2db77f2ae88ffc
e2740c7b209e33aca7176250d80f94b4924e5e5d18076ee3b95f32a0e20d1f58
f2ffb70723e205deac81edd08e61585e8923c1a695a47c18913d7622cfcae530