![](/screenshots/7f105a01-27b2-4ce7-b6c2-0dcad7de07bf.png)
training.knowbe4.com
Open in
urlscan Pro
52.72.23.215
Malicious Activity!
Public Scan
Effective URL: https://training.knowbe4.com/pages/5b6e2d87961b/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3R...
Submission: On July 09 via manual from US
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on March 31st 2016. Valid for: 3 years.
This is the only time training.knowbe4.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial) Phishing Simulation (Internet)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.72.175.22 52.72.175.22 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
7 | 52.72.23.215 52.72.23.215 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
4 | 52.216.18.107 52.216.18.107 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6811:f0cc | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2.18.233.20 2.18.233.20 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
14 | 5 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-72-175-22.compute-1.amazonaws.com
spamchallenge.msftemail.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-72-23-215.compute-1.amazonaws.com
training.knowbe4.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: s3-1.amazonaws.com
s3.amazonaws.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn2.hubspot.net |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-233-20.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
knowbe4.com
training.knowbe4.com |
826 KB |
4 |
amazonaws.com
s3.amazonaws.com |
86 KB |
1 |
paypalobjects.com
www.paypalobjects.com |
1 KB |
1 |
hubspot.net
cdn2.hubspot.net |
5 KB |
1 |
msftemail.com
spamchallenge.msftemail.com |
748 B |
14 | 5 |
Domain | Requested by | |
---|---|---|
7 | training.knowbe4.com |
spamchallenge.msftemail.com
training.knowbe4.com |
4 | s3.amazonaws.com |
training.knowbe4.com
|
1 | www.paypalobjects.com |
training.knowbe4.com
|
1 | cdn2.hubspot.net |
training.knowbe4.com
|
1 | spamchallenge.msftemail.com | |
14 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
34.75.2o2.lol |
Subject Issuer | Validity | Valid | |
---|---|---|---|
knowbe4.com Go Daddy Secure Certificate Authority - G2 |
2016-03-31 - 2019-02-25 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.knowbe4.com/pages/5b6e2d87961b/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvNWI2ZTJkODc5NjFi
Frame ID: 54BCE87225BD5D1CF2526F60D5000033
Requests: 14 HTTP requests in this frame
Screenshot
![](/screenshots/7f105a01-27b2-4ce7-b6c2-0dcad7de07bf.png)
Page URL History Show full URLs
- http://spamchallenge.msftemail.com/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3... Page URL
- https://training.knowbe4.com/pages/5b6e2d87961b/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5f... Page URL
Detected technologies
![](/vendor/wappa/icons/Ubuntu.png)
Detected patterns
- headers server /Ubuntu/i
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Detected patterns
- script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
- env /^Modernizr$/i
Detected patterns
- env /^moment$/i
Detected patterns
- env /^jQuery$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Login to My Account
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://spamchallenge.msftemail.com/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvNWI2ZTJkODc5NjFi Page URL
- https://training.knowbe4.com/pages/5b6e2d87961b/XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvNWI2ZTJkODc5NjFi Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvNWI2ZTJkODc5NjFi
spamchallenge.msftemail.com/ |
341 B 748 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
XcmVLjaXBpZWq50X2lkPTSM2NTk5uqMzg0WNyZjYW1wMYWTlnbl9ydW5faWQ9MTM1LMzU0NyZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvNWI2ZTJkODc5NjFi
training.knowbe4.com/pages/5b6e2d87961b/ |
81 KB 29 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-ccf0cac0b938179c2b38bf0524813e1a5c808e924d022de78f8a384d85aeea4d.js
training.knowbe4.com/assets/ |
3 MB 776 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
training.knowbe4.com/assets/ |
50 KB 16 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-modal-2499ddd86e83d42de26c1a524152b030baf291c077753bebd0b7ff667d3f517c.css
training.knowbe4.com/assets/ |
669 B 615 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-tooltip-765b79bc8e03650717748466e848ae546208dafc86bc4903d33d56badb3f67b1.css
training.knowbe4.com/assets/ |
2 KB 802 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-5d737a9fc0b8eb1f5c0718dc7e6c9d994112556b34c564b7ababf85152ebe82d.css
training.knowbe4.com/assets/ |
1 KB 771 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dd.css
s3.amazonaws.com/helpimg/landing_pages/css/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flags.css
s3.amazonaws.com/helpimg/landing_pages/css/ |
10 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
KB4-logo.png
cdn2.hubspot.net/hubfs/241394/html_file/files/img/ |
4 KB 5 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
logo_emailheader_113wx46h.gif
www.paypalobjects.com/en_US/i/logo/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9.png
training.knowbe4.com/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flagssprite_small.png
s3.amazonaws.com/helpimg/landing_pages/images/ |
70 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blank.gif
s3.amazonaws.com/helpimg/landing_pages/images/ |
53 B 408 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial) Phishing Simulation (Internet)56 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| updateQueryStringParameter function| getParam function| colSort function| ES6Promise function| $ function| jQuery object| jQuery112407577275788068152 function| Retina function| RetinaImagePath function| RetinaImage object| Select2 function| Color function| Chart object| Chartkick function| proj4 function| SimpleWidget object| Tree object| Utils object| asap_questionaire function| AsapStoreViewer object| Routes function| moment function| _ object| ProgressBar object| html5 object| Modernizr object| msBeautify object| translations string| en_lang string| sa_lang string| cn_lang string| cz_lang string| nl_lang string| fr_lang string| ca_lang string| de_lang string| in_lang string| hu_lang string| it_lang string| jp_lang string| kr_lang string| no_lang string| pl_lang string| pt_lang string| ru_lang string| es_lang string| mx_lang string| se_lang string| tr_lang string| gr_lang string| id_lang string| ua_lang function| translate object| select object| asap object| kb40 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn2.hubspot.net
s3.amazonaws.com
spamchallenge.msftemail.com
training.knowbe4.com
www.paypalobjects.com
2.18.233.20
2400:cb00:2048:1::6811:f0cc
52.216.18.107
52.72.175.22
52.72.23.215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