
training.phriendlyphishing.com
Open in
urlscan Pro
99.86.7.112
Public Scan
Submission: On March 31 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 7th 2022. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 99.86.7.112 99.86.7.112 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:828::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 143.204.215.58 143.204.215.58 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 143.204.215.15 143.204.215.15 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-99-86-7-112.fra6.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-215-58.fra53.r.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-215-15.fra53.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
phriendlyphishing.com
training.phriendlyphishing.com |
35 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
4 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 45 ajax.googleapis.com — Cisco Umbrella Rank: 280 |
32 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
7 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
13 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.phriendlyphishing.com R3 |
2022-01-07 - 2022-04-07 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-03-17 - 2022-06-09 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2021-08-15 - 2022-09-13 |
a year | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=D726moQo5L0DTyYUE_ZPrSOZ9oFVG-Ay&p=priWbX_VBNSoNoidkuW8x2Hf9cJEtF2A
Frame ID: AAB1D7CF1060B20AC9E3A5B4DE072973
Requests: 12 HTTP requests in this frame
Screenshot

Page Title
SCAM Training LauncherDetected technologies

Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ |
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
3 KB 4 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX3Byb2R1Y3Rpb24vKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTY3NzU4OTE5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: av-5RbuIoBvVmuyTXGpSyPtE7Auysj1XQArrPk7sIrdjkgb3i--rYYGgbjkro3GaO7Uyw9wpVFe9DyDUQECfYE~6fCel5prZLDLT5y-exUcpHcLKnKcX-oPTlBeXa13~1Ah-MZjPmMwHZs9qCz0aowKPsQdRrn1fuiGkgFBcLEI1e-1K3FJXDi-sHAUPzxHQUcxgL3VNLQCG5kmOP8J-PMRglH45mjScj7Knxd6dP01m6o4e2u-FiNwXyTEzubm4XtxMnvoR1L2KVnmTlJEHiYyFWhVX7312MFRVmLvL0xNiBJx62EI5uLAzvmkqXRTJXUa6BC7YQQ8weG7fef3Q2A__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAJOUANF3WQ4HHRA6Q |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IkQ3MjZtb1FvNUwwRFR5WVVFX1pQclNPWjlvRlZHLUF5OnByaVdiWF9WQk5Tb05vaWRrdVc4eDJIZjljSkV0RjJBIiwiZmlyc3RfbmFtZSI6Ikhhc2hpbSIsImxpY2Vuc2VfZW5kIjoiMjAyMy0wMi0yOFQyMzo1OTo1OSsxMTowMCJ9LCJpYXQiOjE2NDg3NDI0NzcsImV4cCI6MzA0OTU0NjM2Mjh9.69kThgZMSknmZUYVWVgcl2GiHw6zx1OVGTkIY3bKpkE |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_398%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fi6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6IkQ3MjZtb1FvNUwwRFR5WVVFX1pQclNPWjlvRlZHLUF5OnByaVdiWF9WQk5Tb05vaWRrdVc4eDJIZjljSkV0RjJBIiwiZmlyc3RfbmFtZSI6Ikhhc2hpbSIsImxpY2Vuc2VfZW5kIjoiMjAyMy0wMi0yOFQyMzo1OTo1OSsxMTowMCJ9LCJpYXQiOjE2NDg3NDI0NzcsImV4cCI6MzA0OTU0NjM2Mjh9.69kThgZMSknmZUYVWVgcl2GiHw6zx1OVGTkIY3bKpkE%26actor%3D%257B%2522name%2522%3A%255B%2522Hashim%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3Dccc51f30-b10b-11ec-8a0a-cb5a7a339ce8 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
training.phriendlyphishing.com
143.204.215.15
143.204.215.58
2a00:1450:4001:828::200a
2a00:1450:4001:830::200a
99.86.7.112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