federalextauth.verizongov.com
Open in
urlscan Pro
2600:40f0:212:80d::21
Malicious Activity!
Public Scan
Effective URL: https://federalextauth.verizongov.com/fam/?goto=https://eis.verizongov.com/
Submission: On July 03 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by DigiCert Baltimore TLS RSA SHA256 202... on February 23rd 2023. Valid for: a year.
This is the only time federalextauth.verizongov.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Verizon (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:2800:233... 2606:2800:233:c780:9c4e:5d5f:78b0:1bd3 | 15133 (EDGECAST) (EDGECAST) | |
1 1 | 68.141.23.177 68.141.23.177 | 701 (UUNET) (UUNET) | |
1 9 | 2600:40f0:212... 2600:40f0:212:80d::21 | 701 (UUNET) (UUNET) | |
1 | 2a00:1450:400... 2a00:1450:4001:80e::200a | 15169 (GOOGLE) (GOOGLE) | |
9 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
verizongov.com
2 redirects
eis.verizongov.com federalextauth.verizongov.com |
2 MB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 433 |
30 KB |
1 |
verizon.com
1 redirects
eis.verizon.com |
143 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
9 | federalextauth.verizongov.com |
1 redirects
federalextauth.verizongov.com
|
1 | ajax.googleapis.com |
federalextauth.verizongov.com
|
1 | eis.verizongov.com | 1 redirects |
1 | eis.verizon.com | 1 redirects |
9 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
federaleis.verizongov.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
federalextauth.verizongov.com DigiCert Baltimore TLS RSA SHA256 2020 CA1 |
2023-02-23 - 2024-02-22 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-06-19 - 2023-09-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://federalextauth.verizongov.com/fam/?goto=https://eis.verizongov.com/
Frame ID: 75F759C460BAC92FE6FC3BEEF89B25EC
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign InPage URL History Show full URLs
-
http://eis.verizon.com/
HTTP 302
https://eis.verizongov.com/ HTTP 302
https://federalextauth.verizongov.com/fam?goto=https://eis.verizongov.com/ HTTP 302
https://federalextauth.verizongov.com/fam/?goto=https://eis.verizongov.com/ Page URL
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Password
Search URL Search Domain Scan URL
Title: UserName
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://eis.verizon.com/
HTTP 302
https://eis.verizongov.com/ HTTP 302
https://federalextauth.verizongov.com/fam?goto=https://eis.verizongov.com/ HTTP 302
https://federalextauth.verizongov.com/fam/?goto=https://eis.verizongov.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
federalextauth.verizongov.com/fam/ Redirect Chain
|
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.8066511e.css
federalextauth.verizongov.com/fam/css/ |
159 KB 159 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.2eeb972e.css
federalextauth.verizongov.com/fam/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.da9b0fab.js
federalextauth.verizongov.com/fam/js/ |
84 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chunk-vendors.f628abf3.js
federalextauth.verizongov.com/fam/js/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vzlogoLarge.21ecaab0.png
federalextauth.verizongov.com/fam/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NHaasGroteskDSW02-75Bd.2f1d500c.woff2
federalextauth.verizongov.com/fam/fonts/ |
42 KB 42 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NeueHaasGroteskText55Roman.a445694f.woff
federalextauth.verizongov.com/fam/fonts/ |
43 KB 44 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Verizon (Telecommunication)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery object| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eis.verizongov.com/ | Name: pdcd61-vecsig-1d-vip Value: 0239e59e31-58a9-4eizjoEhPnxzO7Iu6k5DWfNngA0FvdwBsom1xe4buJQikdG9jt4ObrJc58AmcIk8SlIro |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=16070400; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
eis.verizon.com
eis.verizongov.com
federalextauth.verizongov.com
2600:40f0:212:80d::21
2606:2800:233:c780:9c4e:5d5f:78b0:1bd3
2a00:1450:4001:80e::200a
68.141.23.177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