webphone.cxt.att.disabilitas.id
Open in
urlscan Pro
2001:df1:7800:2::7:211c
Malicious Activity!
Public Scan
Submission Tags: tweet @pingineer_jp #phishing #scam #att Search All
Submission: On February 08 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on February 7th 2023. Valid for: 3 months.
This is the only time webphone.cxt.att.disabilitas.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2001:df1:7800... 2001:df1:7800:2::7:211c | 58487 (CRI-AS-AP...) (CRI-AS-AP CV. Rumahweb Indonesia) | |
21 | 2001:1890:1c0... 2001:1890:1c00:3221::4:1068 | 7018 (ATT-INTER...) (ATT-INTERNET4) | |
1 | 2001:1890:1c0... 2001:1890:1c00:6222::4:1009 | 7018 (ATT-INTER...) (ATT-INTERNET4) | |
32 | 4 |
ASN58487 (CRI-AS-AP CV. Rumahweb Indonesia, ID)
webphone.cxt.att.disabilitas.id |
ASN7018 (ATT-INTERNET4, US)
static-js-al-econtent.att.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
att.com
oidc.idp.elogin.att.com — Cisco Umbrella Rank: 198555 static-js-al-econtent.att.com — Cisco Umbrella Rank: 438972 |
1 MB |
1 |
disabilitas.id
webphone.cxt.att.disabilitas.id |
18 KB |
32 | 2 |
Domain | Requested by | |
---|---|---|
21 | oidc.idp.elogin.att.com |
webphone.cxt.att.disabilitas.id
oidc.idp.elogin.att.com |
1 | static-js-al-econtent.att.com |
webphone.cxt.att.disabilitas.id
|
1 | webphone.cxt.att.disabilitas.id | |
32 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.e-access.att.com |
www.att.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
webphone.cxt.att.disabilitas.id R3 |
2023-02-07 - 2023-05-08 |
3 months | crt.sh |
oidc.idp.elogin.att.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-29 - 2023-07-30 |
a year | crt.sh |
*.att.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-30 - 2023-06-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://webphone.cxt.att.disabilitas.id/mylogins.cso.web/login.html
Frame ID: 0452A81027598E7BA9FFAF4BB1DE1122
Requests: 33 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: Update Security Profile
Search URL Search Domain Scan URL
Title: Terms
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
32 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.html
webphone.cxt.att.disabilitas.id/mylogins.cso.web/ |
118 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/styles/ |
21 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/styles/ |
668 B 740 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cato.css
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/styles/ |
240 B 724 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox.css
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/styles/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
att_common.js
static-js-al-econtent.att.com/scripts/ |
232 KB 233 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.12.4.min.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/js/ |
95 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.blockUI.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/js/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mk.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/js/ |
9 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utilities.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/js/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/scripts/ |
63 KB 63 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backEndFunctions.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/scripts/ |
6 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ie7.js
oidc.idp.elogin.att.com/lrr/attLRR/resources/js/ |
5 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
att_logo_97x40.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GLO_Question_Icon.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
223 B 726 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobileKeyImg.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rsaImg.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safeNetLogo.svg
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
398 KB 398 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtipsLogo.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
howto-for-mobile-devices.gif
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
95 KB 95 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
howto-for-desktop-devices.gif
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
93 KB 94 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flat_faq-reverse_icon_rgb_blu_modified_18x18.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
1023 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Md.woff
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Rg.woff
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Bd.woff
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flat_check_icon_rgb_wht.png
oidc.idp.elogin.att.com/lrr/attLRR/resources/images/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
89 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Md.woff2
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Rg.woff2
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Bd.woff2
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Md.ttf
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Rg.ttf
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ATTAleckSans_W_Bd.ttf
oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ATTAleckSans_W_Md.woff
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ATTAleckSans_W_Rg.woff
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF/ATTAleckSans_W_Bd.woff
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ATTAleckSans_W_Md.woff2
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ATTAleckSans_W_Rg.woff2
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/WOFF2/ATTAleckSans_W_Bd.woff2
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ATTAleckSans_W_Md.ttf
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ATTAleckSans_W_Rg.ttf
- Domain
- oidc.idp.elogin.att.com
- URL
- https://oidc.idp.elogin.att.com/lrr/attLRR/resources/static/fonts/TTF/ATTAleckSans_W_Bd.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)256 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange object| globals function| $ function| jQuery object| constants function| incrementTransIds function| MobileKeyHandler function| ErrorMsgs object| scriptConstants function| HaloEBrowserInfo object| haloEBrowserInfo function| haloEAlert function| getEventTargetElement object| g_BlockUISettings boolean| g_MockMobile object| g_StateCookieHandler object| g_SessionCookieHandler boolean| g_enterPressed object| g_selectedQuestion function| handleEnterKey function| isPopulated function| trimElementValue function| trimFormUserId function| preventMultipleEnterKeys function| mobileLanguageChanged function| changeVerificationForm function| updateUserId function| globalPasswordChangeForm function| mobileKeyChangeForm function| onClickUseMobileKeyPasscodeOrTemporaryPasscode function| onClickMobileKeyNotification function| securityKeyChangeForm function| bioKeyChangeForm function| windowsChangeForm function| changeForm function| genericChangeForm function| disableActiveForm function| doChangeForm function| setFocusOnActiveForm function| setMenuItem object| bdAuthorizationTypes function| toggleBusinessDirectSettings function| setMockMobile function| onMobile boolean| g_isMobileDevice function| isMobileDevice function| isDeskTop function| hardOrSoft function| toggleSelectDiv function| enableSubmit function| disableSubmit function| doPreSubmit function| doMkPreSubmit function| formInputHandler function| glopasswordInputHandler function| glopasswordVerificationButtonEnabler function| glopasswordVerificationButtonEnablerOnPaste function| mobileKeyInputHandler function| mobileKeyDeviceATTUIDInputHandler function| mobileKeyMFAButtonEnabler function| mobileKeyMFAButtonEnablerOnPaste function| securIDsoftwareTokenInputHandler function| securIDhardwareTokenInputHandler function| safenetButtonInputHandler function| safenetZkButtonInputHandler function| pickerPageUIDInputHandler function| mtipsButtonInputHandler function| mtipsMFAButtonEnabler function| mtipsMFAButtonEnablerOnPaste function| safenetMFAButtonEnabler function| safenetMFAButtonEnablerOnPaste function| securIDMFAsoftwareTokenButtonEnabler function| securIDMFAsoftwareTokenOnPaste function| securIDMFAhardwareTokenButtonEnabler function| securIDMFAhardwareTokenButtonEnablerOnPaste function| mobileCancelFrontEnd function| mobileTimeOutFrontEnd function| mobileDeniedFrontEnd function| mobileErrorFrontEnd function| sendPushFrontEnd function| hideDropdown function| showDropdown function| getUserIdErrorMsg function| doPasswordOnClick function| doMobileKeyOnClick function| doSecuridSoftTokenOnClick function| doSecuridHardTokenOnClick function| doSafenetOnClick function| doMtipsOnClick function| verifyMKUserOnClick function| setUidFocus function| setStrReqLnkCookieForWinAuth function| doWindowsOnClick function| setPageUsedCookie function| setCSPEnvURL function| setStateCookie function| setPageReqCookie function| getWinAuthAlways function| getHardTokenPin function| getSoftOrHardToken function| getUserId function| chkRememberMe function| doYubiKeyOnClick function| doBioKeyOnClick function| doSecondaryAuthFormOnClick function| setCookie function| deleteCookie function| deleteCookieWithDomain function| enableRememeberMe function| getCookie function| translateToSpanish function| translateToEnglish function| removeError_script function| setBackgroundToDevRed function| changeUserId function| getLocalStorage function| setLocalStorage function| getLocalUserId function| setLocalUserId function| isSliderEnabled function| isSelectBoxVisible function| toggleCheckBoxClass function| toggleRememberMe function| toggleBDUserId function| updateRememberMe function| setRememberMe function| toggleMobileKeyPasscode function| StateCookieHandler function| SessionCookieHandler function| BusinessDirectHandler object| g_BusinessDirectHandler function| switchTokenStepEnabled function| setBDUserId function| sendBDUserId function| getTargetAuthPolicyOrWebsealUrl function| showYubiOTP function| getNextTabIndexElement function| initTabbing function| gloAutoFillChecker function| displayAuthNotificationMessage function| getZenKeyLearnLink function| goToZenKey function| getEncodedWarnerMediaUrlParams function| getEncodedCricketADUserUrl function| setUserIdReadOnly function| initStepUpConfiguration function| initZKLinkConfiguration function| goToZkUnderConst function| goToZkUnauthIDV function| goBacktoGLO function| showPickerPage function| pickerPageDoMobileKey function| rsaPopup function| disableApp function| setLoginTypes function| getLevelFromAcrValue function| isSecurIdAuthType3 function| lrrError function| switchToCricket function| doWindowsAuth function| tryIntegratedSignIn function| hasClass function| addClass function| removeClass function| displayError function| displayInfo function| loginError function| pushDeniedError function| passwordExpirationInfo function| removeError function| enableBusinessDirect function| displayCricketLogo function| displayATTLogo function| mobileCancel function| mobileTimeOut function| mobileDenied function| mobileResend function| setSuccessName function| enableDevStyling function| updateInnerHTML function| displayBanner function| displayPresetBannerMessage function| displayInfoSection function| displayInfoSectionMessage function| changeMobileKeySubmitValue function| getUserIdText function| changeLanguage function| switchLanguage function| setLanguageDisplayText object| g_validLanguages function| initLanguage function| setLink function| displayMFA function| IeVersion object| IE function| getFaqLink string| strReqLnkCookieForWinAuth string| strWinAuthErrorNoError string| strWinAuthErrorOccured string| strWinAuthErrorCancelled string| strWinAuthErrorWindowsAuthFailed string| strWinAuthErrorInvalidDomain string| strWinAuthErrorCantFindATTUID string| strWinAuthErrorIDNotInCSP string| strWinAuthErrorInvalidCSPDomain string| strWinAuthErrorPwdExpired string| strWinAuthErrorBlockedAutoAuth string| strWinAuthErrorCantAutoAuth string| strMobileKeyErrorHlte26NotFound string| strMobileKeyErrorRememberMeNotFound string| strMobileKeyErrorExcessiveFailures string| strMobileKeyErrorLoginWithAnotherMethod string| strMobileKeyErrorNoDevicesRegistered string| strMobileKeyErrorUnableToInitiate string| strMobileKeyErrorNoSessionId string| strMobileKeyErrorStatusDenied string| strMobileKeyErrorInvalidAction string| strMobileKeyErrorInvalidValues string| strMobileKeyErrorInvalidParameters string| strMobileKeyErrorSoftLock string| strTokenOnly string| strLogonOption string| strRememberMe boolean| strPwdPlusStepEnabled string| SQ1 string| SQ2 string| strTokenStepEnabled string| strWinAuthAlwaysEnabled string| strShowBd string| strShowBanner string| strExternalRequest string| strShowCricket string| strHideATT string| strAttOnly string| statusCookieName string| hlte26CookieName boolean| strMobileKeyEnabled boolean| strMobileKeyPasscodeEnabled string| strUser string| mkClassName object| elems undefined| bannerMessage undefined| d undefined| expires undefined| selectobject undefined| hlte26Value undefined| optOutOption undefined| showOptOutLink undefined| legacyCookieValue undefined| issuesDiv undefined| msg function| initMobileKeyHandler function| jspSendPush function| jspCancelMobileKey function| getErrorMessage function| doGlobalLoginPasswordOnclick0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
20 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
oidc.idp.elogin.att.com
static-js-al-econtent.att.com
webphone.cxt.att.disabilitas.id
oidc.idp.elogin.att.com
2001:1890:1c00:3221::4:1068
2001:1890:1c00:6222::4:1009
2001:df1:7800:2::7:211c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