Submitted URL: http://email.friendbuy-mail.com/wf/click?upn=l8cG4mK6zWRdO634ApOvVaj8O3KUkoZsI9D8alIRb-2FsWRu5V9u09Wu1kVm-2FvmWwOmIF5LBOFr-2Bmty...
Effective URL: https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
Submission: On November 05 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 54.67.70.128, located in San Jose, United States and belongs to AMAZON-02 - Amazon.com, Inc., US. The main domain is ws.friendbuy.com.
TLS certificate: Issued by RapidSSL TLS RSA CA G1 on February 26th 2018. Valid for: a year.
This is the only time ws.friendbuy.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.123.54 11377 (SENDGRID)
1 54.67.70.128 16509 (AMAZON-02)
1 1
Apex Domain
Subdomains
Transfer
1 friendbuy.com
ws.friendbuy.com
685 B
1 friendbuy-mail.com
email.friendbuy-mail.com
314 B
1 2
Domain Requested by
1 ws.friendbuy.com
1 email.friendbuy-mail.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
*.friendbuy.com
RapidSSL TLS RSA CA G1
2018-02-26 -
2019-05-28
a year crt.sh

This page contains 1 frames:

Primary Page: https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
Frame ID: E16A3E0F3B47A18B9638A229F5E5F1B3
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://email.friendbuy-mail.com/wf/click?upn=l8cG4mK6zWRdO634ApOvVaj8O3KUkoZsI9D8alIRb-2FsWRu5V9u09Wu1kVm-2F... HTTP 302
    https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s= Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://email.friendbuy-mail.com/wf/click?upn=l8cG4mK6zWRdO634ApOvVaj8O3KUkoZsI9D8alIRb-2FsWRu5V9u09Wu1kVm-2FvmWwOmIF5LBOFr-2BmtyI8fViejVix9Vjrdqab3xayIzhl5e1BKC6MZjByCc7GODA7HgbOl4dO2K4Yy6zufLvJGAcUC1A-3D-3D_ynUpSU0Baky9QlRmVPixbI3euIfSMOaCR6yEw5awKWdkImhkcXkjejtHxVTkFMqJkxDYl7J6z3NWvsaKahIlhFHlrh6py-2F2ZQhfBAA4p5eKM-2Fv-2BTd6u3YczQy7URniiiFR7izG0XwxbjM0M1yGOPOUrS-2BfC1273enqIASEAbIUDxoUywwx5AjrYkDiiU0yCVpIbS4udZuNihOOFw3QGdDwbS0DLP-2FW1r3dyvicbiFj6rfH8ha-2BO-2FledFbbExnmCjNcvNVKerxp9FEgJuCVmilUqqxiXx2J-2FZ87bNn0PRc4jYILa3GnvmFS0ai08SU6EKeOZyKzENGZ2Pf3m90EsaYkvEGdrrx6ZGk0S-2BZsZx0rCaT8D7Xc2DKwhtWJNacqlT HTTP 302
    https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
ws.friendbuy.com/email_opt_out/
Redirect Chain
  • http://email.friendbuy-mail.com/wf/click?upn=l8cG4mK6zWRdO634ApOvVaj8O3KUkoZsI9D8alIRb-2FsWRu5V9u09Wu1kVm-2FvmWwOmIF5LBOFr-2BmtyI8fViejVix9Vjrdqab3xayIzhl5e1BKC6MZjByCc7GODA7HgbOl4dO2K4Yy6zufLvJGAc...
  • https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
720 B
685 B
Document
General
Full URL
https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.67.70.128 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-67-70-128.us-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
65f448491a924f424b7bcad94b0e49352e29dd4c2a1fb2be5c469917f0f8c4d1

Request headers

:method
GET
:authority
ws.friendbuy.com
:scheme
https
:path
/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 05 Nov 2018 22:16:03 GMT
content-type
text/html; charset=utf-8
content-length
327
server
nginx
content-encoding
gzip
vary
Accept-Encoding
p3p
CP="Please see our privacy policy, https://www.friendbuy.com/privacy/"
set-cookie
current_shopper="YczYlX11mDJQOMOhdVek/9V/0AU=?current_shopper_code=VjQ2Nzc0YWMyLWE2YTAtNDA0ZC04ZTU5LTJhOWQ4NTRlNDBiMQpwMAou"; Domain=.friendbuy.com; Expires=Tue, 05-Nov-2019 22:16:03 GMT; Max-Age=31536000; Path=/

Redirect headers

Server
nginx
Date
Mon, 05 Nov 2018 22:16:03 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
Location
https://ws.friendbuy.com/email_opt_out/553dx9aM3MugW5xeeIG0rMzS14ycvsec5IqItO-a1NLikODFx57TmLat5mbO09s=
X-Robots-Tag
noindex, nofollow

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
.friendbuy.com/ Name: current_shopper
Value: "YczYlX11mDJQOMOhdVek/9V/0AU=?current_shopper_code=VjQ2Nzc0YWMyLWE2YTAtNDA0ZC04ZTU5LTJhOWQ4NTRlNDBiMQpwMAou"

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

email.friendbuy-mail.com
ws.friendbuy.com
167.89.123.54
54.67.70.128
65f448491a924f424b7bcad94b0e49352e29dd4c2a1fb2be5c469917f0f8c4d1