www.cspsychology.com.au
Open in
urlscan Pro
27.121.64.145
Malicious Activity!
Public Scan
Submission: On November 08 via automatic, source openphish
Summary
This is the only time www.cspsychology.com.au was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AT&T (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 27.121.64.145 27.121.64.145 | 24446 (NETREGIST...) (NETREGISTRY-AS-AP NetRegistry Pty Ltd.) | |
1 15 | 2001:1890:1c0... 2001:1890:1c01:2::42 | 7018 (ATT-INTER...) (ATT-INTERNET4 - AT&T Services) | |
2 | 2a00:1288:80:... 2a00:1288:80:800::7001 | 203220 (YAHOO-DEB) (YAHOO-DEB) | |
17 | 3 |
ASN24446 (NETREGISTRY-AS-AP NetRegistry Pty Ltd., AU)
PTR: cp145.ezyreg.com
www.cspsychology.com.au |
ASN7018 (ATT-INTERNET4 - AT&T Services, Inc., US)
home.secureapp.att.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
att.net
1 redirects
home.secureapp.att.net |
196 KB |
2 |
yimg.com
s.yimg.com |
|
1 |
cspsychology.com.au
www.cspsychology.com.au |
4 KB |
17 | 3 |
Domain | Requested by | |
---|---|---|
15 | home.secureapp.att.net |
1 redirects
www.cspsychology.com.au
home.secureapp.att.net |
2 | s.yimg.com |
www.cspsychology.com.au
|
1 | www.cspsychology.com.au | |
17 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.att.net |
www.att.com |
uverseonline.att.net |
elportal.att.net |
home.secureapp.att.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
home.secureapp.att.net Symantec Class 3 Secure Server CA - G4 |
2017-08-17 - 2018-10-13 |
a year | crt.sh |
*.yahoo.com DigiCert SHA2 High Assurance Server CA |
2017-10-20 - 2017-12-06 |
2 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.cspsychology.com.au/att/attiinnddeexx.php
Frame ID: 1958.1
Requests: 17 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
Page Statistics
15 Outgoing links
These are links going to different origins than the main page.
Title: att.net
Search URL Search Domain Scan URL
Title: att.com
Search URL Search Domain Scan URL
Title: uverse.com
Search URL Search Domain Scan URL
Title: En Español
Search URL Search Domain Scan URL
Title: AT&T Support
Search URL Search Domain Scan URL
Title: Learn about shared passwords for AT&T email and your AT&T Access ID
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: AT&T Support
Search URL Search Domain Scan URL
Title: Advertise with Us
Search URL Search Domain Scan URL
Title: Terms of Service
Search URL Search Domain Scan URL
Title: Copyright
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Title: About Our Ads
Search URL Search Domain Scan URL
Title: Acceptable Use Policy
Search URL Search Domain Scan URL
Title: © 2017 AT&T Intellectual Property
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 15- https://home.secureapp.att.net/attportal/s/context.dll?id=9002001&type=clickthru&name=cgate.signIn.Pageviews.www-att-net&redirecturl=/i/s.gif?nocache=5072 HTTP 302
- https://home.secureapp.att.net/i/s.gif?nocache=5072
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
attiinnddeexx.php
www.cspsychology.com.au/att/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
main.css
home.secureapp.att.net/css/sso/slid/1201/ |
28 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
jquery-1.5.1.min.js
home.secureapp.att.net/js/jquery/ |
83 KB 83 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
jquery.simplemodal.js
home.secureapp.att.net/js/jquery/simplemodal/ |
9 KB 9 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
script.js
home.secureapp.att.net/js/sso/slid/1201/ |
47 KB 47 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
s.yimg.com/ik/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
mobile.css
home.secureapp.att.net/css/sso/slid/1201/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
pageBg.png
home.secureapp.att.net/design/cdls10/img/ui/ |
169 B 169 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
btnSumbit.png
home.secureapp.att.net/img/sso/slid/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
footerBg.png
home.secureapp.att.net/design/CDLS10/img/ui/ |
560 B 560 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
s.yimg.com/ik/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
attGlobalNavHeader-bg.gif
home.secureapp.att.net/design/cdls20/img/ui/ |
149 B 149 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
txt-clear.png
home.secureapp.att.net/img/sso/slid/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
att_globe_blue_80x80.png
home.secureapp.att.net/design/CDLS10/img/logos/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
support-icon.jpg
home.secureapp.att.net/img/sso/slid/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
ques.png
home.secureapp.att.net/img/sso/slid/ |
363 B 363 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
s.gif
home.secureapp.att.net/i/ Redirect Chain
|
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AT&T (Telecommunication)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.cspsychology.com.au/ | Name: IV_JCT Value: %2FcommonLogin |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
home.secureapp.att.net
s.yimg.com
www.cspsychology.com.au
2001:1890:1c01:2::42
27.121.64.145
2a00:1288:80:800::7001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