Submitted URL: http://tasklistviewer.zezol.mobi/
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On December 12 via manual from AU — Scanned from AU

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 9 HTTP transactions. The main IP is 18.173.5.71, located in United States and belongs to AMAZON-02, US. The main domain is training.phriendlyphishing.com.
TLS certificate: Issued by Amazon RSA 2048 M02 on December 7th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 13.33.88.28 16509 (AMAZON-02)
8 18.173.5.71 16509 (AMAZON-02)
9 2
Apex Domain
Subdomains
Transfer
8 phriendlyphishing.com
training.phriendlyphishing.com
329 KB
1 zezol.mobi
tasklistviewer.zezol.mobi
1 KB
9 2
Domain Requested by
8 training.phriendlyphishing.com training.phriendlyphishing.com
1 tasklistviewer.zezol.mobi 1 redirects
9 2

This site contains no links.

Subject Issuer Validity Valid
training.phriendlyphishing.com
Amazon RSA 2048 M02
2022-12-07 -
2024-01-05
a year crt.sh

This page contains 2 frames:

Primary Page: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: ABD607B1010A7EEACDC459E57479145D
Requests: 8 HTTP requests in this frame

Frame: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: B8F7FD1022B04D2F38EF07757E3CE9AA
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Simulation Link Expired

Page URL History Show full URLs

  1. http://tasklistviewer.zezol.mobi/ HTTP 302
    https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 75%
Detected patterns

Page Statistics

9
Requests

89 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

329 kB
Transfer

988 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://tasklistviewer.zezol.mobi/ HTTP 302
    https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/
Redirect Chain
  • http://tasklistviewer.zezol.mobi/
  • https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
7 KB
3 KB
Document
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cde2de58cf50b2affbad070c31545310d96a1b0f1653e5916287fc51e5957ebc

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

age
52938
content-encoding
gzip
content-type
text/html
date
Mon, 12 Dec 2022 09:10:54 GMT
etag
W/"5b1ac56e51999716362b24737984a9c4"
last-modified
Wed, 28 Sep 2022 09:04:48 GMT
server
AmazonS3
vary
Accept-Encoding
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
x-amz-cf-id
2cidTLzxuHd2kqZXaS9ekJJd6y-x_o2eg6V1uQLt06Fk-hQg9azGtA==
x-amz-cf-pop
CPH50-P1
x-cache
Hit from cloudfront

Redirect headers

Cache-Control
no-cache max-age=86400, public
Connection
keep-alive
Content-Security-Policy
default-src https:; connect-src 'self' https:; font-src data: *; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
Content-Type
text/html; charset=utf-8
Date
Mon, 12 Dec 2022 23:53:09 GMT
Location
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Server
Apache
Status
302 Found
Transfer-Encoding
chunked
Vary
Origin,Host
Via
1.1 29ec57392a878e133a2e208c0dbdc3e2.cloudfront.net (CloudFront)
X-Amz-Cf-Id
dhy9Ag0HmaWwwBnLdwqvcy_v-MuMgMCqf2jhjeqHe81EqEYGgd1OSg==
X-Amz-Cf-Pop
SIN2-P2
X-Cache
Miss from cloudfront
X-Content-Type-Options
nosniff
X-Download-Options
noopen
X-Frame-Options
sameorigin
X-Permitted-Cross-Domain-Policies
none
X-Powered-By
Phusion Passenger 5.3.4
X-Request-Id
52553836-31d0-4d14-9139-d8a6db7ffbcf
X-Runtime
0.029191
X-XSS-Protection
1; mode=block
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/
67 B
399 B
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/user.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
7f2842721eb704c5dd8810dda0221c8f4f87b5743e0e28b9dafe55f0c114c004

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 04:41:06 GMT
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 09:03:24 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
age
69126
etag
"a85671704f0073177c1110ad8d5ff5ae"
x-cache
Hit from cloudfront
content-type
application/javascript
accept-ranges
bytes
content-length
67
x-amz-cf-id
JjjbTMz46z_8bA9BQjn6IqGA6GLV6m8-7Egq1DK8u2kByh3BQmHs7Q==
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/
120 KB
75 KB
Stylesheet
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/output.min.css
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
320a89566e2a438aa3dce47e0fd38462c04a5881fbb6fd8bd68a6bb46e154681

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 23:53:13 GMT
content-encoding
gzip
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 08:39:01 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
etag
W/"fbdf733bcc1d76da5053f362befec37c"
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
text/css
x-amz-cf-id
_q-W1wDSCd4LjBSPzCKV0qnJVAQ332hp6sol1WeiDS6hNVmjOere7Q==
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/
517 KB
155 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9b1cc45728d7609fd30b41ef8c908bffaa9d53eb27dba298eb4e0b0b9f6529ff

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 00:33:05 GMT
content-encoding
br
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 08:39:30 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
age
84007
etag
W/"f72b2483da1cf1a3a97c7b7d488395f8"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
x-amz-cf-id
i8hs0ERfxWiZBLbLPruLkeuPnSGUOJFxMpHjBNjAvFfvIPUECwpBbQ==
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame B8F7
4 KB
2 KB
Document
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3efd124f9ab9ca67e8975eaa24bda7491077f465caef02b8a0c97e9f47ad2aea

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

content-encoding
br
content-type
text/html
date
Mon, 12 Dec 2022 23:53:15 GMT
etag
W/"720f8fd109feb2d463d8870da8d58c54"
last-modified
Wed, 28 Sep 2022 09:04:39 GMT
server
AmazonS3
vary
Accept-Encoding
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
x-amz-cf-id
TRVhX9D3OAvi9loY2z91D8Nlqe6FR5ToYiGPrQ7uPnJNUAPykqDbgg==
x-amz-cf-pop
CPH50-P1
x-cache
Miss from cloudfront
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/
75 KB
15 KB
Stylesheet
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/desktop.min.css
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
81eb553107675b148b8a53eeb552bfc06c530fe23e9e47cdead9aba2d8a1e942

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 23:53:15 GMT
content-encoding
br
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 08:39:53 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
etag
W/"287e05c0df257d2d18e1dca4e187e21c"
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
content-type
text/css
x-amz-cf-id
z7gcrZuMq--E7vWrEt3UXaBYOl6u2EO-9opZrPHHvMD4VhzbQi27vA==
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/
213 KB
43 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-frame.desktop.min.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
22813a7f396bb750749214970cd1d1bbc66d4c37baac1d831e083ab1809f31b3

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 10:39:09 GMT
content-encoding
br
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 08:39:36 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
age
47644
etag
W/"74b07897614195827b3ac812a97c5701"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
x-amz-cf-id
GJ07RV1qDU3kImvVfiCM40eyHnGrvn_o4dPDVl-QjguIhKhux4TnXg==
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/
53 KB
37 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/frame.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.173.5.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-173-5-71.cph50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a70cd8485a6fa08adbc6920af94710ed1d2f0d84792f731c1c6b0af5f05cf532

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

date
Mon, 12 Dec 2022 23:53:15 GMT
content-encoding
br
via
1.1 78a128491ada170a2d9b82ba12d23d7a.cloudfront.net (CloudFront)
last-modified
Wed, 28 Sep 2022 08:39:17 GMT
server
AmazonS3
x-amz-cf-pop
CPH50-P1
etag
W/"fbec9a3624cfe085fd59e59fdc40f489"
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript
x-amz-cf-id
4Pbqj5J384GAlvRdr_vZinA9y5XiuoIHLXgf_gwrUdwdVvTP8IAYxA==
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
training.phriendlyphishing.com
URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-slides.min.js

Verdicts & Comments Add Verdict or Comment

75 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| oncontentvisibilityautostatechange object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views

2 Cookies

Domain/Path Name / Value
tasklistviewer.zezol.mobi/ Name: XSRF-TOKEN
Value: Dj%2Fu6hBu2D4h%2BehuqVJL4NBdVpcfNiSx7TYuTYd5Z1o5YZX%2FOozqJ150RxuwC8A5pevpLf2dOmMb%2F9HiQbDhKw%3D%3D
tasklistviewer.zezol.mobi/ Name: _session_id
Value: 813787992de90238d031b226cb355748