vgw1-06.mke-michiganstreetcommons.mdu.attwifi.com Open in urlscan Pro
12.30.239.234  Public Scan

Submitted URL: https://vgw1-06.mke-michiganstreetcommons.mdu.attwifi.com/
Effective URL: https://vgw1-06.mke-michiganstreetcommons.mdu.attwifi.com/portal/attwifi?desired_url=https%3A%2F%2Fvgw1-06.mke-michiganstreetcommons.mdu.attwifi.com%2F
Submission: On July 07 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST /portal/attwifi/shared_credential_login

<form id="shared_credential_login" action="/portal/attwifi/shared_credential_login" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token"
    value="6vXYW5BC1q8R55VocM9lTDP-WgZXImfU3k-14eSOpMagD7f2GTb0IhlBB-kXkYs6qUVNgrzFdBIUmJj4f-pstQ" autocomplete="off">
  <input autocomplete="off" type="hidden" name="credential" id="credential">
  <input type="submit" name="commit" value="Guest Wi-Fi" class="btn btn-lg btn-primary guest-btn" data-disable-with="Please wait...">
</form>

GET /portal/attwifi/quick_purchase

<form action="/portal/attwifi/quick_purchase" accept-charset="UTF-8" method="get">
  <input value="true" autocomplete="off" type="hidden" name="residential" id="residential">
  <aside id="coupon-modal" class="modal" aria-labelled-by="forgot-password-title" tabindex="-1" role="dialog">
    <div class="modal-dialog modal-dialog-scrollable modal-dialog-centered modal-md" role="document">
      <div class="modal-content">
        <header class="modal-header">
          <h2 id="forgot-password-title" class="w-100 modal-title"> Please Provide Sign-Up Code </h2><button class="btn-close" data-bs-dismiss="modal" aria-label="Close" type="button"></button>
        </header>
        <main class="modal-body">
          <p> Your leasing office should provide you with a code that will allow you to sign up for service: </p>
          <div class="mb-3"><label class="form-label visually-hidden required" for="plans_coupon">Signup Code</label><input class="form-control form-control  " required="required" maxlength="254" autocomplete="off" autocorrect="off"
              name="plans_coupon" id="plans_coupon" size="254" type="text"></div>
        </main>
        <footer class="modal-footer">
          <button class="me-md-4 btn btn-secondary" data-bs-dismiss="modal" role="button" type="button">Back</button>
          <input type="submit" name="commit" value="Continue" class="btn btn-primary ">
        </footer>
      </div>
    </div>
  </aside>
</form>

Text Content

You are Located at:
Michigan Street Commons
Attn: Patrick Wattles
MILWAUKEE, WI. 53233-1545
att_logo_large_text_black Created with Sketch.



WELCOME TO AT&T
RESIDENTIAL BROADBAND!


WELCOME TO
AT&T
RESIDENTIAL BROADBAND!

You are Located at:
Michigan Street Commons
Attn: Patrick Wattles
MILWAUKEE, WI. 53233-1545
 * Activation in minutes
 * No additional fees
 * Speeds up to 400 Mbps1
 * Highly secure and private
 * Both wired and Wi-Fi access2
 * A self-service management portal: add devices, passwords and more

Sign up now


Existing customers should use the Wi-Fi Network
“attinternet”
To manage your account, you may log in to the portal

For support, please call 1 (877) 755‑0625 1 Speeds vary, not guaranteed. Wi-Fi
speed can be affected by many factors. 2 Internet speed claims represent maximum
network service capabilities and are based on a wired connection. Actual
customer speeds may vary based on a number of factors and are not guaranteed.
Download speeds for Internet 1000 are typically up to 940Mbps download and up to
880Mbps upload due to overhead capacity reserved to deliver the data. For more
information, go to:

www.att.com/speed101 © 2024 AT&T Intellectual Property. All rights reserved.
AT&T, the AT&T Globe logo, Mobilizing Your World are registered trademarks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are
the property of their respective owners.


PLEASE PROVIDE SIGN-UP CODE

Your leasing office should provide you with a code that will allow you to sign
up for service:

Signup Code
Back


TERMS OF SERVICE

By using our internet service, you hereby expressly acknowledge and agree that
there are significant security, privacy and confidentiality risks inherent in
accessing or transmitting information through the internet, whether the
connection is facilitated through wired or wireless technology. Security issues
include, without limitation, interception of transmissions, loss of data, and
the introduction or viruses and other programs that can corrupt or damage your
computer.

Accordingly, you agree that the owner and/or provider of this network is NOT
liable for any interception or transmissions, computer worms or viruses, loss of
data, file corruption, hacking or damage to your computer or other devices that
result from the transmission or download of information or materials through the
internet service provided.

Use of the wireless network is subject to the general restrictions outlined
below. If abnormal, illegal, or unauthorized behavior is detected, the network
provider reserves the right to permanently disconnect the offending device from
the wireless network.

EXAMPLES OF ILLEGAL USES

The following are representative examples only and do not comprise a
comprehensive list of illegal uses:

 1. Spamming and invasion of privacy - Sending of unsolicited bulk and/or
    commercial messages over the Internet using the Service or using the Service
    for activities that invade another's privacy.
 2. Intellectual property right violations - Engaging in any activity that
    infringes or misappropriates the intellectual property rights of others,
    including patents, copyrights, trademarks, service marks, trade secrets, or
    any other proprietary right of any third party.
 3. Accessing illegally or without authorization computers, accounts, equipment
    or networks belonging to another party, or attempting to
    penetrate/circumvent security measures of another system. This includes any
    activity that may be used as a precursor to an attempted system penetration,
    including, but not limited to, port scans, stealth scans, or other
    information gathering activity.
 4. The transfer of technology, software, or other materials in violation of
    applicable export laws and regulations.
 5. Export Control Violations
 6. Using the Service in violation of applicable law and regulation, including,
    but not limited to, advertising, transmitting, or otherwise making available
    ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating
    software, or making fraudulent offers to sell or buy products, items, or
    services.
 7. Uttering threats;
 8. Distribution of pornographic materials to minors;
 9. and Child pornography.

EXAMPLES OF UNACCEPTABLE USES

The following are representative examples only and do not comprise a
comprehensive list of unacceptable uses:

 1.  Obscene or indecent speech or materials
 2.  Defamatory or abusive language
 3.  Using the Service to transmit, post, upload, or otherwise making available
     defamatory, harassing, abusive, or threatening material or language that
     encourages bodily harm, destruction of property or harasses another.
 4.  Forging or misrepresenting message headers, whether in whole or in part, to
     mask the originator of the message.
 5.  Facilitating a Violation of these Terms of Use
 6.  Hacking
 7.  Distribution of Internet viruses, Trojan horses, or other destructive
     activities
 8.  Distributing information regarding the creation of and sending Internet
     viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial
     of service attacks. Also, activities that disrupt the use of or interfere
     with the ability of others to effectively use the node or any connected
     network, system, service, or equipment.
 9.  Advertising, transmitting, or otherwise making available any software
     product, product, or service that is designed to violate these Terms of
     Use, which includes the facilitation of the means to spam, initiation of
     pinging, flooding, mail-bombing, denial of service attacks, and piracy of
     software.
 10. Seeking information on passwords or data belonging to another user.
 11. Making unauthorized copies of proprietary software, or offering
     unauthorized copies of proprietary software to others.
 12. Intercepting or examining the content of messages, files or communications
     in transit on a data network.

Close