URL: https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e38...
Submission: On December 09 via manual from PT

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 54.243.74.141, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is t.yesware.com.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on February 15th 2018. Valid for: 3 years.
This is the only time t.yesware.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 54.243.74.141 14618 (AMAZON-AES)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 151.101.14.110 54113 (FASTLY)
1 162.247.242.19 23467 (NEWRELIC-...)
4 4
Domain Requested by
1 bam.nr-data.net js-agent.newrelic.com
1 js-agent.newrelic.com t.yesware.com
1 www.trustar.co t.yesware.com
1 t.yesware.com
4 4

This site contains no links.

Subject Issuer Validity Valid
*.yesware.com
COMODO RSA Domain Validation Secure Server CA
2018-02-15 -
2021-03-14
3 years crt.sh
www.trustar.co
CloudFlare Inc ECC CA-2
2019-12-03 -
2020-10-09
10 months crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-10 -
2020-03-21
a year crt.sh
*.nr-data.net
GeoTrust RSA CA 2018
2018-01-11 -
2020-03-17
2 years crt.sh

This page contains 1 frames:

Frame: https://www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
Frame ID: E907D199D54F912873849D68BA3DD3B6
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Page Statistics

4
Requests

100 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

31 kB
Transfer

46 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/
20 KB
20 KB
Document
General
Full URL
https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.243.74.141 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-243-74-141.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
1c9367b977f6615c5d10e070912044a883a40bd0d76e3ab21a1513232afa3b3c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
t.yesware.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

Server
Cowboy
Date
Mon, 09 Dec 2019 18:12:45 GMT
Connection
keep-alive
X-Frame-Options
SAMEORIGIN
X-Xss-Protection
1; mode=block
X-Content-Type-Options
nosniff
Content-Type
text/html; charset=utf-8
Set-Cookie
t=8sevk13MFoGk64qPZSscCg; domain=.yesware.com; path=/; expires=Sun, 09 Dec 2029 18:12:45 -0000; secure; HttpOnly
X-Request-Id
cea46af2-6638-45b4-89aa-7f7680f2e8da
X-Runtime
0.005678
Content-Length
20513
Via
1.1 vegur
F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
www.trustar.co/hubfs/
0
0
Document
General
Full URL
https://www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
Requested by
Host: t.yesware.com
URL: https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:71b4 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
www.trustar.co
:scheme
https
:path
/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf

Response headers

status
200
date
Mon, 09 Dec 2019 18:12:45 GMT
content-type
application/pdf
content-length
209108
set-cookie
__cfduid=df32298f038c7a78c0eecf20b1e1e5fb91575915165; expires=Wed, 08-Jan-20 18:12:45 GMT; path=/; domain=.www.trustar.co; HttpOnly __cfruid=2c3ec00af1ea821059843b242eab563b8a04dc40-1575915165; path=/; domain=.hscoscdn40.net; HttpOnly __cfruid=2c3ec00af1ea821059843b242eab563b8a04dc40-1575915165; path=/; domain=.www.trustar.co; HttpOnly
cf-ray
5428f2f7d84e599a-VIE
accept-ranges
bytes
age
8460
cache-control
s-maxage=1209600, max-age=1209600
etag
"c42398200ffe891a026778fce2c2d8b0"
last-modified
Mon, 18 Nov 2019 19:03:37 GMT
vary
Accept-Encoding
via
1.1 f7b7cf90592cf6a380fd34cc45e9c4b5.cloudfront.net (CloudFront)
cf-cache-status
HIT
edge-cache-tag
F-21445923530,P-3290543,FLS-ALL
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-amz-cf-id
T7Bd_xM0DI4poWGhfBX9ac_7ol07O8UQ0_7xqK6R67aE0DO4oHCmkg==
x-amz-cf-pop
FRA50-C1
x-amz-id-2
tD/6SQ2aSqB5bOw49NqRdE3VQFqeKKMUNbzKG2nHefOl69sT971D8KRb2UGisufUkVKQgXC/TYQ=
x-amz-meta-cache-tag
F-21445923530,P-3290543,FLS-ALL
x-amz-request-id
30586D04926EF244
x-amz-version-id
gmclcPfuuoSYWQ3UEnREhlB5itNu4RBl
x-cache
Miss from cloudfront
x-hs-cf-lambda
us-east-1.setCacheTagHeaders 43
server
cloudflare
nr-1153.min.js
js-agent.newrelic.com/
26 KB
10 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-1153.min.js
Requested by
Host: t.yesware.com
URL: https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c0f4eb8ed7fc767a6dc7512f7597e4d34e4259e797c7c2ee224d7a97d14ecd23

Request headers

Referer
https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 09 Dec 2019 18:12:45 GMT
content-encoding
gzip
x-amz-request-id
FFF93ED5F88A1822
x-cache
HIT
status
200
content-length
10041
x-amz-id-2
cTbmD7KheDnvH20xCq8BJ9Iq4Y9OXIhqhMfhON513gk+dbSmvVt2yVtjnFtyar3DfNOTYN9O34Q=
x-served-by
cache-fra19149-FRA
last-modified
Fri, 08 Nov 2019 16:26:28 GMT
server
AmazonS3
x-timer
S1575915165.304392,VS0,VE0
etag
"d3b942e7c79a167d59ed590feee5e193"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
5063
1a5da492d2
bam.nr-data.net/1/
57 B
261 B
Script
General
Full URL
https://bam.nr-data.net/1/1a5da492d2?a=2164051&v=1153.61ee9ba&to=Il9eRkQKCVtSERkICA9bH1FaDAZc&rst=496&ref=https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf&qt=6&ap=6&be=483&fe=486&dc=486&af=err,xhr,stn,ins&perf=%7B%22timing%22:%7B%22of%22:1575915164815,%22n%22:0,%22f%22:0,%22dn%22:0,%22dne%22:13,%22c%22:13,%22s%22:99,%22ce%22:276,%22rq%22:277,%22rp%22:478,%22rpe%22:478,%22dl%22:479,%22di%22:485,%22ds%22:485,%22de%22:485,%22dc%22:485,%22l%22:485,%22le%22:486%7D,%22navigation%22:%7B%7D%7D&jsonp=NREUM.setToken
Requested by
Host: js-agent.newrelic.com
URL: https://js-agent.newrelic.com/nr-1153.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.247.242.19 San Francisco, United States, ASN23467 (NEWRELIC-AS-1 - New Relic, US),
Reverse DNS
bam-7.nr-data.net
Software
/
Resource Hash
5e864c2e3f674c60970513411eaeeeafd2d615d842e65ec01d09ccfcb4a7b38d

Request headers

Referer
https://t.yesware.com/tt/b001b8d036eba81ae00863b988f9fe965eab3f78/640191b4ba9e848c695f69e863b8ece0/563bdbe78fc5e160e3831268f7275473/www.trustar.co/hubfs/F500-Retailer_Phishing-Case-Study_Nov2019_FINAL.pdf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
text/javascript;charset=ISO-8859-1
Content-Length
57
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| NREUM object| newrelic function| __nr_require

1 Cookies

Domain/Path Name / Value
.yesware.com/ Name: t
Value: 8sevk13MFoGk64qPZSscCg

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block