training.phriendlyphishing.com
Open in
urlscan Pro
13.224.250.3
Public Scan
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On September 19 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon on June 29th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 13.227.254.11 13.227.254.11 | 16509 (AMAZON-02) (AMAZON-02) | |
18 | 13.224.250.3 13.224.250.3 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.227.254.75 13.227.254.75 | 16509 (AMAZON-02) (AMAZON-02) | |
20 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-13-227-254-11.sin52.r.cloudfront.net
intranet.userid-81d.ws |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-250-3.sin52.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-227-254-75.sin52.r.cloudfront.net
metrics.articulate.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
phriendlyphishing.com
training.phriendlyphishing.com |
2 MB |
2 |
articulate.com
metrics.articulate.com — Cisco Umbrella Rank: 9492 |
488 B |
1 |
userid-81d.ws
1 redirects
intranet.userid-81d.ws |
1 KB |
20 | 3 |
Domain | Requested by | |
---|---|---|
18 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | metrics.articulate.com |
training.phriendlyphishing.com
|
1 | intranet.userid-81d.ws | 1 redirects |
20 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon |
2022-06-29 - 2023-07-29 |
a year | crt.sh |
articulate.com Amazon |
2021-09-14 - 2022-10-13 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: A89481AFDF3C6BB78C37530B7F393E19
Requests: 24 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: 1FE6AFB26457A4B0E1ACAE8964C904D2
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Simulation Link ExpiredPage URL History Show full URLs
-
http://intranet.userid-81d.ws/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Detected technologies
Paths.js (JavaScript Graphics) ExpandDetected patterns
- paths(?:\.min)?\.js
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Ruby on Rails (Web Frameworks) Expand
Detected patterns
React (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+data-react
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://intranet.userid-81d.ws/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/ |
67 B 442 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/ |
120 KB 120 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
517 KB 518 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame 1FE6 |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/ |
75 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
213 KB 213 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
53 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
863 KB 864 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
25 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paths.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
15 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-light.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 21 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-regular.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 20 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-bold.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
21 KB 21 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 6 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 3 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 17 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 18 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6mAli7uDFFi.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
11 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6YZa6fLFTdd_FFFFFF_P_0_526_1920_398_DX2700_DY2700_CX1488_CY309.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
74 KB 74 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6YWoKSSNnuT_DX340_DY340_CX251_CY78.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6fhDxiV0YFn_DX1222_DY1222_CX916_CY723.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
71 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
import
metrics.articulate.com/v1/ Frame 1FE6 |
21 B 488 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
import
metrics.articulate.com/v1/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
105 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views function| GetPlayer function| SVGPathSeg function| SVGPathSegClosePath function| SVGPathSegMovetoAbs function| SVGPathSegMovetoRel function| SVGPathSegLinetoAbs function| SVGPathSegLinetoRel function| SVGPathSegCurvetoCubicAbs function| SVGPathSegCurvetoCubicRel function| SVGPathSegCurvetoQuadraticAbs function| SVGPathSegCurvetoQuadraticRel function| SVGPathSegArcAbs function| SVGPathSegArcRel function| SVGPathSegLinetoHorizontalAbs function| SVGPathSegLinetoHorizontalRel function| SVGPathSegLinetoVerticalAbs function| SVGPathSegLinetoVerticalRel function| SVGPathSegCurvetoCubicSmoothAbs function| SVGPathSegCurvetoCubicSmoothRel function| SVGPathSegCurvetoQuadraticSmoothAbs function| SVGPathSegCurvetoQuadraticSmoothRel function| SVGPathSegList2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
intranet.userid-81d.ws/ | Name: XSRF-TOKEN Value: E9u82MH85WhYOrfzCMkbueoBu%2FOc28X6A0Y1Amj%2FR%2BVIoQO5S1%2FxJA40nvLZsp3qJOfT8kHQSfDEdXyCA61FoA%3D%3D |
|
intranet.userid-81d.ws/ | Name: _session_id Value: 08ad3a12f56db773fc49130e9d86004f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
intranet.userid-81d.ws
metrics.articulate.com
training.phriendlyphishing.com
13.224.250.3
13.227.254.11
13.227.254.75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