sync-opus.com
Open in
urlscan Pro
149.248.13.193
Malicious Activity!
Public Scan
Effective URL: https://sync-opus.com/
Submission: On June 29 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on June 28th 2022. Valid for: 3 months.
This is the only time sync-opus.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 33 | 149.248.13.193 149.248.13.193 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
32 | 1 |
ASN20473 (AS-CHOOPA, US)
PTR: 149.248.13.193.vultrusercontent.com
sync-opus.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
33 |
sync-opus.com
1 redirects
sync-opus.com |
1 MB |
32 | 1 |
Domain | Requested by | |
---|---|---|
33 | sync-opus.com |
1 redirects
sync-opus.com
|
32 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
oidc.idp.elogin.att.com |
www.e-access.att.com |
www.att.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sync-opus.com R3 |
2022-06-28 - 2022-09-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://sync-opus.com/
Frame ID: 87BB6A44C895EB5F3CCA4D545DF0C035
Requests: 32 HTTP requests in this frame
Screenshot
Page Title
AT&T Security Server: LoginPage URL History Show full URLs
-
http://sync-opus.com/
HTTP 301
https://sync-opus.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Forgot Password?
Search URL Search Domain Scan URL
Title: Register a password
Search URL Search Domain Scan URL
Title: Update Security Profile
Search URL Search Domain Scan URL
Title: Terms
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://sync-opus.com/
HTTP 301
https://sync-opus.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
32 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
sync-opus.com/ Redirect Chain
|
121 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
sync-opus.com/index_files/ |
21 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonts.css
sync-opus.com/index_files/ |
668 B 914 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cato.css
sync-opus.com/index_files/ |
240 B 485 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox.css
sync-opus.com/index_files/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
att_common.js
sync-opus.com/index_files/ |
236 KB 236 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.js
sync-opus.com/index_files/ |
95 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
sync-opus.com/index_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mk.js
sync-opus.com/index_files/ |
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utilities.js
sync-opus.com/index_files/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
sync-opus.com/index_files/ |
61 KB 61 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backEndFunctions.js
sync-opus.com/index_files/ |
6 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ie7.js
sync-opus.com/index_files/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
att_logo_97x40.png
sync-opus.com/index_files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
GLO_Question_Icon.png
sync-opus.com/index_files/ |
223 B 469 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobileKeyImg.png
sync-opus.com/index_files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rsaImg.png
sync-opus.com/index_files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safeNetLogo.svg
sync-opus.com/index_files/ |
398 KB 398 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtipsLogo.png
sync-opus.com/index_files/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
howto-for-mobile-devices.gif
sync-opus.com/index_files/ |
95 KB 95 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
howto-for-desktop-devices.gif
sync-opus.com/index_files/ |
93 KB 93 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flat_faq-reverse_icon_rgb_blu_modified_18x18.png
sync-opus.com/index_files/ |
1023 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Md.woff
sync-opus.com/fonts/WOFF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Rg.woff
sync-opus.com/fonts/WOFF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Bd.woff
sync-opus.com/fonts/WOFF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flat_check_icon_rgb_wht.png
sync-opus.com/images/ |
564 B 564 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Md.woff2
sync-opus.com/fonts/WOFF2/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Rg.woff2
sync-opus.com/fonts/WOFF2/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Bd.woff2
sync-opus.com/fonts/WOFF2/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Md.ttf
sync-opus.com/fonts/TTF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Rg.ttf
sync-opus.com/fonts/TTF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATTAleckSans_W_Bd.ttf
sync-opus.com/fonts/TTF/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)256 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| globals function| $ function| jQuery object| constants function| MobileKeyHandler function| ErrorMsgs object| scriptConstants function| HaloEBrowserInfo object| haloEBrowserInfo function| haloEAlert function| getEventTargetElement object| g_BlockUISettings boolean| g_MockMobile object| g_StateCookieHandler object| g_SessionCookieHandler boolean| g_enterPressed object| g_selectedQuestion function| handleEnterKey function| isPopulated function| trimElementValue function| trimFormUserId function| preventMultipleEnterKeys function| mobileLanguageChanged function| changeVerificationForm function| updateUserId function| globalPasswordChangeForm function| mobileKeyChangeForm function| onClickUseMobileKeyPasscodeOrTemporaryPasscode function| onClickMobileKeyNotification function| securityKeyChangeForm function| bioKeyChangeForm function| windowsChangeForm function| changeForm function| genericChangeForm function| disableActiveForm function| doChangeForm function| setFocusOnActiveForm function| setMenuItem object| bdAuthorizationTypes function| toggleBusinessDirectSettings function| setMockMobile function| onMobile boolean| g_isMobileDevice function| isMobileDevice function| isDeskTop function| hardOrSoft function| toggleSelectDiv function| enableSubmit function| disableSubmit function| formInputHandler function| glopasswordInputHandler function| glopasswordVerificationButtonEnabler function| glopasswordVerificationButtonEnablerOnPaste function| mobileKeyInputHandler function| mobileKeyDeviceATTUIDInputHandler function| mobileKeyMFAButtonEnabler function| mobileKeyMFAButtonEnablerOnPaste function| securIDsoftwareTokenInputHandler function| securIDhardwareTokenInputHandler function| safenetButtonInputHandler function| safenetZkButtonInputHandler function| pickerPageUIDInputHandler function| mtipsButtonInputHandler function| mtipsMFAButtonEnabler function| mtipsMFAButtonEnablerOnPaste function| safenetMFAButtonEnabler function| safenetMFAButtonEnablerOnPaste function| securIDMFAsoftwareTokenButtonEnabler function| securIDMFAsoftwareTokenOnPaste function| securIDMFAhardwareTokenButtonEnabler function| securIDMFAhardwareTokenButtonEnablerOnPaste function| mobileCancelFrontEnd function| mobileTimeOutFrontEnd function| mobileDeniedFrontEnd function| mobileErrorFrontEnd function| sendPushFrontEnd function| hideDropdown function| showDropdown function| getUserIdErrorMsg function| doPasswordOnClick function| doMobileKeyOnClick function| doSecuridSoftTokenOnClick function| doSecuridHardTokenOnClick function| doSafenetOnClick function| doMtipsOnClick function| verifyMKUserOnClick function| setStrReqLnkCookieForWinAuth function| doWindowsOnClick function| setPageUsedCookie function| setCSPEnvURL function| setStateCookie function| setPageReqCookie function| getWinAuthAlways function| getHardTokenPin function| getSoftOrHardToken function| getUserId function| chkRememberMe function| doYubiKeyOnClick function| doBioKeyOnClick function| doSecondaryAuthFormOnClick function| setCookie function| deleteCookie function| deleteCookieWithDomain function| enableRememeberMe function| getCookie function| translateToSpanish function| translateToEnglish function| removeError_script function| setBackgroundToDevRed function| changeUserId function| isSliderEnabled function| isSelectBoxVisible function| toggleCheckBoxClass function| toggleRememberMe function| toggleBDUserId function| updateRememberMe function| setRememberMe function| toggleMobileKeyPasscode function| StateCookieHandler function| SessionCookieHandler function| BusinessDirectHandler object| g_BusinessDirectHandler function| switchTokenStepEnabled function| setBDUserId function| sendBDUserId function| getTargetAuthPolicyOrWebsealUrl function| showYubiOTP function| getNextTabIndexElement function| initTabbing function| gloAutoFillChecker function| displayAuthNotificationMessage function| getZenKeyLearnLink function| goToZenKey function| getEncodedWarnerMediaUrlParams function| getEncodedCricketADUserUrl function| setUserIdReadOnly function| initStepUpConfiguration function| initZKLinkConfiguration function| goToZkUnderConst function| goToZkUnauthIDV function| goBacktoGLO function| showPickerPage function| pickerPageDoMobileKey function| rsaPopup function| disableApp function| checkAuthnLevel function| isSecurIdAuthType3 function| lrrError function| switchToCricket function| hasClass function| addClass function| removeClass function| displayError function| displayInfo function| loginError function| pushDeniedError function| passwordExpirationInfo function| removeError function| enableBusinessDirect function| displayCricketLogo function| displayATTLogo function| mobileCancel function| mobileTimeOut function| mobileDenied function| mobileResend function| setSuccessName function| enableDevStyling function| updateInnerHTML function| displayBanner function| displayPresetBannerMessage function| displayInfoSection function| displayInfoSectionMessage function| changeMobileKeySubmitValue function| getUserIdText function| changeLanguage function| switchLanguage function| setLanguageDisplayText object| g_validLanguages function| initLanguage function| setLink function| displayMFA function| IeVersion object| IE function| sleep function| send_request function| getFaqLink string| strReqLnkCookieForWinAuth string| strWinAuthErrorNoError string| strWinAuthErrorOccured string| strWinAuthErrorCancelled string| strWinAuthErrorWindowsAuthFailed string| strWinAuthErrorInvalidDomain string| strWinAuthErrorCantFindATTUID string| strWinAuthErrorIDNotInCSP string| strWinAuthErrorInvalidCSPDomain string| strWinAuthErrorPwdExpired string| strWinAuthErrorBlockedAutoAuth string| strWinAuthErrorCantAutoAuth string| strMobileKeyErrorHlte26NotFound string| strMobileKeyErrorRememberMeNotFound string| strMobileKeyErrorExcessiveFailures string| strMobileKeyErrorLoginWithAnotherMethod string| strMobileKeyErrorNoDevicesRegistered string| strMobileKeyErrorUnableToInitiate string| strMobileKeyErrorNoSessionId string| strMobileKeyErrorStatusDenied string| strMobileKeyErrorInvalidAction string| strMobileKeyErrorInvalidValues string| strMobileKeyErrorInvalidParameters string| strMobileKeyErrorSoftLock string| strTokenOnly string| strLogonOption string| strRememberMe boolean| strPwdPlusStepEnabled string| SQ1 string| SQ2 string| strTokenStepEnabled string| strWinAuthAlwaysEnabled string| strShowBd string| strShowBanner string| strExternalRequest string| strShowCricket string| strHideATT string| strAttOnly string| statusCookieName string| hlte26CookieName boolean| strMobileKeyEnabled boolean| strMobileKeyPasscodeEnabled string| strUser string| mkClassName object| elems undefined| bannerMessage undefined| d undefined| expires undefined| selectobject undefined| hlte26Value string| optOutOption boolean| showOptOutLink undefined| legacyCookieValue undefined| issuesDiv undefined| msg function| initMobileKeyHandler function| jspSendPush function| jspCancelMobileKey function| getErrorMessage function| doGlobalLoginPasswordOnclick object| jQuery1124010963276823131696 string| type0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
10 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sync-opus.com
149.248.13.193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