![](/screenshots/2084629d-2546-4c2c-bece-fa81ebbba79e.png)
training.phriendlyphishing.com
Open in
urlscan Pro
65.9.121.91
Public Scan
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On June 12 via manual from NZ — Scanned from US
Summary
TLS certificate: Issued by R3 on March 31st 2022. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.252.116.154 54.252.116.154 | 16509 (AMAZON-02) (AMAZON-02) | |
10 | 65.9.121.91 65.9.121.91 | 16509 (AMAZON-02) (AMAZON-02) | |
11 | 2 |
ASN16509 (AMAZON-02, US)
PTR: launch.phriendlyphishing.com
nzealandbank.co.nz.lang-en.us |
ASN16509 (AMAZON-02, US)
PTR: server-65-9-121-91.qro50.r.cloudfront.net
training.phriendlyphishing.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
phriendlyphishing.com
training.phriendlyphishing.com |
2 MB |
1 |
lang-en.us
1 redirects
nzealandbank.co.nz.lang-en.us |
1 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
1 | nzealandbank.co.nz.lang-en.us | 1 redirects |
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.phriendlyphishing.com R3 |
2022-03-31 - 2022-06-29 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: F84F9AD67A41411E028D1F380CA8A477
Requests: 10 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: F86900D8A59E88A116DDFEA8C9BD6CDD
Requests: 1 HTTP requests in this frame
Screenshot
![](/screenshots/2084629d-2546-4c2c-bece-fa81ebbba79e.png)
Page Title
Simulation Link ExpiredPage URL History Show full URLs
-
http://nzealandbank.co.nz.lang-en.us/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Ruby on Rails.png)
Detected patterns
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://nzealandbank.co.nz.lang-en.us/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/ |
67 B 435 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/ |
120 KB 120 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
517 KB 518 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame F869 |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/ |
75 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
213 KB 213 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
53 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
863 KB 864 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
25 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
paths.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- training.phriendlyphishing.com
- URL
- https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/paths.js
Verdicts & Comments Add Verdict or Comment
81 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nzealandbank.co.nz.lang-en.us/ | Name: XSRF-TOKEN Value: a7UZ2Pf1mvW23srxmBjP4yr%2FXKmYf2Q3v0Cg8mHjyC9lr5kIr8oHMp42HQTGhkqll4WCLjaDTw591awf%2FSAmEw%3D%3D |
|
nzealandbank.co.nz.lang-en.us/ | Name: _session_id Value: 5ea0528b42911ae28d871ac9c8c0dea6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nzealandbank.co.nz.lang-en.us
training.phriendlyphishing.com
training.phriendlyphishing.com
54.252.116.154
65.9.121.91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