Submitted URL: http://internal-mail.userid-81d.ws/?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Submission: On March 19 via manual from SG

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 3 HTTP transactions. The main IP is 99.86.3.7, located in Seattle, United States and belongs to AMAZON-02, US. The main domain is training.phriendlyphishing.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 3rd 2020. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 54.252.116.154 16509 (AMAZON-02)
1 99.86.3.7 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 143.204.202.97 16509 (AMAZON-02)
3 3
Domain Requested by
1 d1djgeblw6va9k.cloudfront.net training.phriendlyphishing.com
1 ajax.googleapis.com training.phriendlyphishing.com
1 training.phriendlyphishing.com
1 internal-mail.userid-81d.ws 1 redirects
3 4

This site contains no links.

Subject Issuer Validity Valid
*.launch.phriendlyphishing.com
Let's Encrypt Authority X3
2020-02-03 -
2020-05-03
3 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh

This page contains 1 frames:

Primary Page: https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Frame ID: 3E372B78A7DFDAC2E9F417CEF6EF04F8
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://internal-mail.userid-81d.ws/?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ HTTP 302
    https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9gi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

3
Requests

100 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

58 kB
Transfer

119 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://internal-mail.userid-81d.ws/?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ HTTP 302
    https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request launcher.html
training.phriendlyphishing.com/
Redirect Chain
  • http://internal-mail.userid-81d.ws/?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
  • https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
14 KB
14 KB
Document
General
Full URL
https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.7 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-7.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
17b8ae53177e864f3694817df5ecef268b57bba16990e74b90d993e407c1ea50

Request headers

:method
GET
:authority
training.phriendlyphishing.com
:scheme
https
:path
/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-type
text/html
content-length
14191
date
Thu, 19 Mar 2020 03:02:24 GMT
last-modified
Thu, 12 Mar 2020 06:38:20 GMT
etag
"94cb400c5c58e818185c61e815e8f9da"
x-amz-version-id
nJjRkLqwmh0Ga8.IaLB.IITGl_.raxUG
accept-ranges
bytes
server
AmazonS3
x-cache
Miss from cloudfront
via
1.1 94faae20b0f122c4555025f52a2fd745.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
KatESbz7YusiFUS8BuXRIuRxaA76MQSAOiESOVvh-R5Ut48QriiVIw==

Redirect headers

Date
Thu, 19 Mar 2020 03:02:21 GMT
Server
Apache/2.4.18 (Ubuntu)
Cache-Control
no-cache max-age=86400, public
Vary
Origin,Host
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
2edc1b52-3f28-41b3-94ee-94cbf2f35e83
X-Download-Options
noopen
X-Runtime
0.103830
X-Frame-Options
sameorigin
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Powered-By
Phusion Passenger 5.3.4
Set-Cookie
XSRF-TOKEN=fTJFUcDdmlCkPXzpKxi3cjad9UT%2FRvEbLpji1P64i%2BpB3FkBSvnc3QtFTtq%2BO%2FOJSo7LBHPAJFKM1wQfHViK6g%3D%3D; path=/; HttpOnly; SameSite=Lax _session_id=30116d77b3c8d72edb7112d10874ecb8; path=/; HttpOnly; SameSite=Lax
Location
https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Status
302 Found
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.12.4/
95 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 23:25:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2000192
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
33951
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 23 Feb 2021 23:25:51 GMT
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/
10 KB
10 KB
Image
General
Full URL
https://d1djgeblw6va9k.cloudfront.net/landing-page-bubble.png
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.97 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-97.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2c66d5d4f3257ab79c870a73bbe1a9787e7f9e56fee41b8d96c8284ba1d22593

Request headers

Referer
https://training.phriendlyphishing.com/launcher.html?t=hvhIBCvwqFTXuR83ki7_lfF67eVdEmXd&p=1ZyfBZOGoqRe0usJi5vVic9giX2i-6YZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 19 Mar 2020 03:02:25 GMT
via
1.1 25ffb5a941b5a46b102cd385a9cdbb50.cloudfront.net (CloudFront)
last-modified
Thu, 23 Aug 2018 03:59:23 GMT
server
AmazonS3
x-amz-cf-pop
FRA53-C1
etag
"1be33d583673ca23c1b56a72a2cd3d50"
x-cache
Miss from cloudfront
content-type
image/png
status
200
accept-ranges
bytes
content-length
10209
x-amz-cf-id
3Q_9SIIkhMnQJPFRHjYv9udelgpVcUA_vQmTBiCfisKAks81HYnaZw==

Verdicts & Comments Add Verdict or Comment

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery string| base_url function| getCertificate function| getQueryVariable function| renderPhishingLandingPageMSG function| getCookie function| setCookies function| clearBrowserData function| authorise_and_load_resource

0 Cookies