technicalbappe.com
Open in
urlscan Pro
2606:4700:3030::681b:a6c1
Malicious Activity!
Public Scan
Effective URL: https://technicalbappe.com/attRR/adfs/index.html
Submission: On April 17 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 8th 2020. Valid for: 9 months.
This is the only time technicalbappe.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 20 | 2606:4700:303... 2606:4700:3030::681b:a6c1 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
18 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
technicalbappe.com
2 redirects
technicalbappe.com |
144 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
20 | technicalbappe.com |
2 redirects
technicalbappe.com
|
18 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
oidc.idp.elogin.att.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-01-08 - 2020-10-09 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://technicalbappe.com/attRR/adfs/index.html
Frame ID: 1B0D7F5D05FF1AC982046C15A3B6153F
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://technicalbappe.com/attRR
HTTP 301
https://technicalbappe.com/attRR/ HTTP 302
https://technicalbappe.com/attRR/adfs/index.html Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Click Here
Search URL Search Domain Scan URL
Title: Forgot Password?
Search URL Search Domain Scan URL
Title: Return to legacy Global Logon
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://technicalbappe.com/attRR
HTTP 301
https://technicalbappe.com/attRR/ HTTP 302
https://technicalbappe.com/attRR/adfs/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
technicalbappe.com/attRR/adfs/ Redirect Chain
|
89 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main4b6d.css
technicalbappe.com/attRR/adfs/resources/static/styles/ |
21 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts4b6d.css
technicalbappe.com/attRR/adfs/resources/static/styles/ |
820 B 284 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.min4b6d.js
technicalbappe.com/attRR/adfs/resources/js/ |
95 KB 32 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.blockUI4b6d.js
technicalbappe.com/attRR/adfs/resources/js/ |
19 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mk4b6d.js
technicalbappe.com/attRR/adfs/resources/js/ |
19 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ua-parser4b6d.js
technicalbappe.com/attRR/adfs/resources/js/ua-parser-js-master/src/ |
51 KB 12 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
json24b6d.js
technicalbappe.com/attRR/adfs/resources/js/JSON-js-master/ |
18 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script4b6d.js
technicalbappe.com/attRR/adfs/resources/static/scripts/ |
45 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
backEndFunctions4b6d.js
technicalbappe.com/attRR/adfs/resources/static/scripts/ |
14 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ie74b6d.js
technicalbappe.com/attRR/adfs/resources/js/ |
9 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
att_logo_97x40.png
technicalbappe.com/attRR/adfs/resources/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GLO_Question_Icon.png
technicalbappe.com/attRR/adfs/resources/images/ |
223 B 371 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flat_down_icon_rgb_blu_modified_12x12.png
technicalbappe.com/attRR/adfs/resources/images/ |
623 B 889 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flat_faq-reverse_icon_rgb_blu_modified_18x18.png
technicalbappe.com/attRR/adfs/resources/images/ |
1023 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Rg.woff
technicalbappe.com/attRR/adfs/resources/static/fonts/WOFF/ |
22 KB 22 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ATTAleckSans_W_Md.woff
technicalbappe.com/attRR/adfs/resources/static/fonts/WOFF/ |
23 KB 23 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flat_check_icon_rgb_wht_16x16.png
technicalbappe.com/attRR/adfs/resources/images/ |
472 B 587 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)197 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| constants function| MobileKeyHandler function| MobileKeyVerifier function| UAParser boolean| g_MockMobile object| g_StateCookieHandler object| g_SessionCookieHandler function| changeVerificationForm function| mobileKeyChangeForm function| changeForm function| doChangeForm function| toggleBusinessDirectSettings function| hideQuestionSelector function| showQuestionSelector function| setMockMobile function| onMobile boolean| g_isMobileDevice function| isMobileDevice function| isDeskTop function| hardOrSoft function| toggleSelectDiv function| changeSecretQuestion function| generateSecretQuestions function| enableSubmit function| disableSubmit function| glopasswordButtonEnabler function| glopasswordButtonEnablerOnPaste function| glopasswordVerificationButtonEnabler function| glopasswordVerificationButtonEnablerOnPaste function| mobileKeyButtonEnabler function| mobileKeyButtonEnablerOnPaste function| mobileKeyMFAButtonEnabler function| mobileKeyMFAButtonEnablerOnPaste function| mtipsButtonEnabler function| mtipsButtonEnablerOnPaste function| mtipsMFAButtonEnabler function| mtipsMFAButtonEnablerOnPaste function| safenetButtonEnabler function| safenetButtonEnablerOnPaste function| safenetMFAButtonEnabler function| safenetMFAButtonEnablerOnPaste function| securIDsoftwareTokenButtonEnabler function| securIDsoftwareTokenButtonEnablerOnPaste function| securIDhardwareTokenButtonEnabler function| securIDhardwareTokenButtonEnablerOnPaste function| securIDMFAsoftwareTokenButtonEnabler function| securIDMFAsoftwareTokenOnPaste function| securIDMFAhardwareTokenButtonEnabler function| securIDMFAhardwareTokenButtonEnablerOnPaste function| secondaryAuthButtonEnabler function| secondaryAuthButtonEnablerOnPaste function| mobileCancelFrontEnd function| mobileTimeOutFrontEnd function| mobileDeniedFrontEnd function| mobileErrorFrontEnd function| sendPushFrontEnd function| hideDropdown function| showDropdown function| doMobileKeyOnclick function| doMobileKeyPassCodeOnclick function| doPasswordOnclick function| doWindowsOnclick function| setPageUsedCookie function| setCSPEnvURL function| setStateCookie function| setPageReqCookie function| getWinAuthAlways function| getHardTokenPin function| getSoftOrHardToken function| getUserId function| chkRememberMe function| doSafenetOnClick function| doMtipsOnclick function| doSecuridSoftTokenOnClick function| doSecuridHardTokenOnClick function| doSecondaryAuthFormOnClick function| setCookie function| deleteCookie function| enableRememeberMe function| getCookie function| translateToSpanish function| translateToEnglish function| removeError_script function| setBackgroundToDevRed function| changeUserId function| toggleCheckBoxClass function| toggleRememberMe function| toggleBDUserId function| updateRememberMe function| setRememberMe function| toggleMobileKeyPasscode function| StateCookieHandler function| SessionCookieHandler function| switchTokenStepEnabled function| setBDUserId function| sendBDUserId function| displayError function| displayInfo function| loginError function| pushDeniedError function| passwordExpirationInfo function| removeError function| displaySecondaryAuth function| enableBusinessDirect function| displayCricketLogo function| displayATTLogo function| mobileCancel function| mobileTimeOut function| mobileDenied function| mobileResend function| setSuccessName function| setMobileKeyUID function| enableDevStyling function| updateInnerHTML function| displayBanner function| displayPresetBannerMessage function| displayInfoSection function| displayInfoSectionMessage function| changeMobileKeySubmitValue function| getUserIdText function| changeLanguage function| switchLanguage function| setLanguageDisplayText object| g_validLanguages object| g_javascriptMessages function| initLanguage function| initJavascriptMessages function| setLink function| displayMFA function| hasClass function| addClass function| removeClass function| IeVersion object| IE boolean| g_isIECompatablityMode function| getFaqLink string| strReqLnkCookieForWinAuth string| strWinAuthURL function| isInputNumber string| strWinAuthErrorNoError string| strWinAuthErrorOccured string| strWinAuthErrorCancelled string| strWinAuthErrorWindowsAuthFailed string| strWinAuthErrorInvalidDomain string| strWinAuthErrorCantFindATTUID string| strWinAuthErrorIDNotInCSP string| strWinAuthErrorInvalidCSPDomain string| strWinAuthErrorPwdExpired string| strWinAuthErrorBlockedAutoAuth string| strWinAuthErrorCantAutoAuth string| strMobileKeyErrorHlte26NotFound string| strMobileKeyErrorRememberMeNotFound string| strMobileKeyErrorExcessiveFailures string| strMobileKeyErrorLoginWithAnotherMethod string| strMobileKeyErrorNoDevicesRegistered string| strMobileKeyErrorUnableToInitiate string| strMobileKeyErrorNoSessionId string| strMobileKeyErrorStatusDenied string| strMobileKeyErrorInvalidAction string| strMobileKeyErrorInvalidValues string| strTokenOnly string| strLogonOption string| strRememberMe string| strUserId string| strPwdPlusStepEnabled string| SQ1 string| SQ2 string| strTokenStepEnabled string| strWinAuthAlwaysEnabled string| strShowBd string| strShowBanner string| strExternalRequest string| strShowCricket string| strHideATT string| strAttOnly string| statusCookieName string| hlte26CookieName boolean| strMobileKeyEnabled boolean| strMobileKeyPasscodeEnabled object| javascriptMessages string| bannerMessage undefined| d undefined| expires undefined| selectobject undefined| hlte26Value undefined| secretQuestionsArr object| g_MobileKeyHandler function| initMobileKeyHandler function| jspSendPush function| jspCancelMobileKey function| verifyMKUser function| getErrorMessage function| doGlobalLoginPasswordOnclick1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.technicalbappe.com/ | Name: __cfduid Value: d1cb33c635061466ff3bed9d9a80c1ed01587122597 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
technicalbappe.com
2606:4700:3030::681b:a6c1
07b3a3d0f02092988f8b70fa51992fa109b23bbc82638fc857dee5ee0e3ad5dc
0e1a5ab44e620c7a5412e625a748636ade95ad9345392aa621b048375d87b241
0ff42599ca3f4d81ba97a622cac5035262cf3af9db0a04d37bf541b2969b2f8d
287e57ae4b394a4912f51899e4537fb4a9c3a9f307ad0e1f539f8aeb46bdb042
3571629e1a1388a9d16740f2f50a5ef540ded04d6930db9bc97f67a1b4fd9321
3d8b2a38b0f975d28c48d85c6a1fe494c0dff18054814ef24be879ce998d5114
45d927a482326cc94769d1295e7dbc7a40ce62c9c68897c2f51eb9a9ecfbf985
46ae8c20ff718133d1b34e09314a6636df03de7a39e84a459ee38bb06c05e885
4a6500fffb1823beca8bd2c203014d05111e97a82dbbb8516a642abb03bf7bf2
5e4b3f7da07ff693285db4cecbb566d82a665853f97f01d83a20d6ab9b840cb7
5f43c44a03507663f45f0275597874d6ed132cf38a09775d997ba3669f64edb4
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
6cc43eb82e2962dc58fe514b01377194e65f0b735a36d2b6647cd4923f8cb6b0
820dd504313cbb867c7aa8a53349c99dc994f544580de0b1372012838b634f94
a106b0f8926e51c250f5055831c1673f12020d3fa1bfcfa4bb14f614dcd31a17
c9c46bcfe2b827be80003c1a393900040ae01a6cf996ac007e3b95cef554460a
cc7ddc2da053a7b922bc0da7023f734bb80d6e00b87926715206d530664bc415
d0c4812c9f1b672a7ea3420b10ea389cabb4b50694418965003250c876a2b13b