training.phriendlyphishing.com
Open in
urlscan Pro
13.224.250.3
Public Scan
Submission: On September 27 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon on June 29th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 13.224.250.3 13.224.250.3 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 142.251.10.95 142.251.10.95 | 15169 (GOOGLE) (GOOGLE) | |
1 | 74.125.24.95 74.125.24.95 | 15169 (GOOGLE) (GOOGLE) | |
8 | 13.227.254.122 13.227.254.122 | 16509 (AMAZON-02) (AMAZON-02) | |
27 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-250-3.sin52.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-227-254-122.sin52.r.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
phriendlyphishing.com
training.phriendlyphishing.com |
5 MB |
8 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
5 KB |
3 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 40 ajax.googleapis.com — Cisco Umbrella Rank: 293 |
33 KB |
27 | 3 |
Domain | Requested by | |
---|---|---|
11 | training.phriendlyphishing.com |
training.phriendlyphishing.com
ajax.googleapis.com |
8 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
training.phriendlyphishing.com |
2 | fonts.googleapis.com |
training.phriendlyphishing.com
client |
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
27 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon |
2022-06-29 - 2023-07-29 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-09-05 - 2022-11-28 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2022-07-16 - 2023-08-14 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=ntCD631o7JCV85-xfZ2uAMvEdPXgI8iJ&p=WHUG9mPikH86hotKDyHT2qFshCRmYpkt
Frame ID: 367CD1A60D52E0367896D55DB964297A
Requests: 10 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/tincan_production/cell_300/course_84/training_package_168/training_package_version_582/index_lms.html?tincan=true&endpoint=https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/&auth=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Im50Q0Q2MzFvN0pDVjg1LXhmWjJ1QU12RWRQWGdJOGlKOldIVUc5bVBpa0g4NmhvdEtEeUhUMnFGc2hDUm1ZcGt0IiwiZmlyc3RfbmFtZSI6IlJpdGEiLCJsaWNlbnNlX2VuZCI6IjIwMjMtMTItMDVUMjM6NTk6NTkrMTE6MDAifSwiaWF0IjoxNjY0MjQ1NTYyLCJleHAiOjUwNzE4ODE5NzJ9.2fcqY2QN4INosbOsOmB42KJrVijokuYz8nHp7P78pEw&actor=%7B%22name%22:%5B%22Rita%22%5D,%22mbox%22:%22mailto:%22,%22objectType%22:%22Agent%22%7D®istration=bb5314e0-3e0b-11ed-bae7-1f8df63ae498
Frame ID: 5DFB87B547A58F99E059070AC36669F3
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
SCAM Training LauncherDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ |
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
2 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_lms.html
training.phriendlyphishing.com/tincan_production/cell_300/course_84/training_package_168/training_package_version_582/ Frame 5DFB |
59 KB 60 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ Frame 5DFB |
5 KB 688 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xapiwrapper.min.js
training.phriendlyphishing.com/tincan_production/cell_300/course_84/training_package_168/training_package_version_582/ Frame 5DFB |
42 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SCORMToXAPIFunctions.js
training.phriendlyphishing.com/tincan_production/cell_300/course_84/training_package_168/training_package_version_582/ Frame 5DFB |
54 KB 54 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
training.phriendlyphishing.com/tincan_production/cell_300/course_84/training_package_168/training_package_version_582/ Frame 5DFB |
5 MB 5 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame 5DFB |
0 592 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame 5DFB |
0 594 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame 5DFB |
0 592 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ Frame 5DFB |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
4cb8917e-7c33-4d7d-803c-231c179cdfa5
https://training.phriendlyphishing.com/ Frame 5DFB |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ Frame 5DFB |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame 5DFB |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS |
state
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- https://fonts.googleapis.com/css?family=Open+Sans:400,700&display=swap
- Domain
- training.phriendlyphishing.com
- URL
- blob:https://training.phriendlyphishing.com/4cb8917e-7c33-4d7d-803c-231c179cdfa5
- Domain
- fonts.googleapis.com
- URL
- https://fonts.googleapis.com/css?family=Roboto:400,500,700&display=swap|Open+Sans&display=swap|family=Montserrat:400,400i,500,700&display=swap
- Domain
- i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
- URL
- https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/state?activityId=http%3A%2F%2Fe7ed7690-0c25-472f-a412-de93377d585c-13257&agent=%7B%22name%22%3A%22Rita%22%2C%22mbox%22%3A%22mailto%3A%22%2C%22objectType%22%3A%22Agent%22%7D&stateId=https%3A%2F%2Fw3id.org%2Fxapi%2Fscorm%2Factivity-state&tincan=true
- Domain
- i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
- URL
- https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/activities/state?activityId=http%3A%2F%2Fe7ed7690-0c25-472f-a412-de93377d585c-13257&agent=%7B%22name%22%3A%22Rita%22%2C%22mbox%22%3A%22mailto%3A%22%2C%22objectType%22%3A%22Agent%22%7D&stateId=https%3A%2F%2Fw3id.org%2Fxapi%2Fscorm%2Factivity-state&tincan=true
Verdicts & Comments Add Verdict or Comment
26 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vdGluY2FuX3Byb2R1Y3Rpb24vY2VsbF8zMDAvY291cnNlXzg0L3RyYWluaW5nX3BhY2thZ2VfMTY4LyoiLCJDb25kaXRpb24iOnsiRGF0ZUxlc3NUaGFuIjp7IkFXUzpFcG9jaFRpbWUiOjE3MDE3ODExOTkwMDB9fX1dfQ__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: K-lBC0CVaJb7OfAF8VpQHtDnLg8h6AAq536nqb-p2VAPyaEi6eJdFKorqXZTIpcnJ8qmnu0wdy0vUMznWdd84siPavInuunOec107VGDYineMuo11E9qZqscPhgIBbv2wTCNergFXXHQZsKYO0xl8uzdtLQzLzKgUj-msCMSq2ka5LzN3HKm7BrYEcVOE0EWyY6mdd05xNd1i5CAfTEsSywAhw1BzrNGylsKrVmc86XviT0agneodEymqnTtuVt6KnMoZpMIUaQAIrVWq0pLcjn7QoBcHbnsj94V9px1fUsSMh0Wfdzxsu8f0G~LVyNOxOWtD1jHoGflXNUMdjxRWA__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAJOUANF3WQ4HHRA6Q |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Im50Q0Q2MzFvN0pDVjg1LXhmWjJ1QU12RWRQWGdJOGlKOldIVUc5bVBpa0g4NmhvdEtEeUhUMnFGc2hDUm1ZcGt0IiwiZmlyc3RfbmFtZSI6IlJpdGEiLCJsaWNlbnNlX2VuZCI6IjIwMjMtMTItMDVUMjM6NTk6NTkrMTE6MDAifSwiaWF0IjoxNjY0MjQ1NTYyLCJleHAiOjUwNzE4ODE5NzJ9.2fcqY2QN4INosbOsOmB42KJrVijokuYz8nHp7P78pEw |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_84%2Ftraining_package_168%2Ftraining_package_version_582%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fi6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6Im50Q0Q2MzFvN0pDVjg1LXhmWjJ1QU12RWRQWGdJOGlKOldIVUc5bVBpa0g4NmhvdEtEeUhUMnFGc2hDUm1ZcGt0IiwiZmlyc3RfbmFtZSI6IlJpdGEiLCJsaWNlbnNlX2VuZCI6IjIwMjMtMTItMDVUMjM6NTk6NTkrMTE6MDAifSwiaWF0IjoxNjY0MjQ1NTYyLCJleHAiOjUwNzE4ODE5NzJ9.2fcqY2QN4INosbOsOmB42KJrVijokuYz8nHp7P78pEw%26actor%3D%257B%2522name%2522%3A%255B%2522Rita%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Dbb5314e0-3e0b-11ed-bae7-1f8df63ae498 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_84/training_package_168/landing_page/ |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
13.224.250.3
13.227.254.122
142.251.10.95
74.125.24.95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