![](/screenshots/8c6630bd-02c2-4d0e-b2f3-7411f5085bcf.png)
training.phriendlyphishing.com
Open in
urlscan Pro
13.249.85.23
Public Scan
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On June 28 via manual from AU — Scanned from US
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on December 7th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 99.84.160.81 99.84.160.81 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 13.249.85.23 13.249.85.23 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 1 |
ASN16509 (AMAZON-02, US)
PTR: server-99-84-160-81.ord52.r.cloudfront.net
nextstopparking.com.lifae.us |
ASN16509 (AMAZON-02, US)
PTR: server-13-249-85-23.ord52.r.cloudfront.net
training.phriendlyphishing.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
phriendlyphishing.com
training.phriendlyphishing.com |
328 KB |
1 |
lifae.us
1 redirects
nextstopparking.com.lifae.us |
1 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
9 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
1 | nextstopparking.com.lifae.us | 1 redirects |
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2022-12-07 - 2024-01-05 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: B03C0EFA5033FE6F7E593E706F5A9112
Requests: 8 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: 5EA779D36B5DF01A4A454E6699ECC99B
Requests: 1 HTTP requests in this frame
Screenshot
![](/screenshots/8c6630bd-02c2-4d0e-b2f3-7411f5085bcf.png)
Page Title
Simulation Link ExpiredPage URL History Show full URLs
-
http://nextstopparking.com.lifae.us/?t=&p=aV7PZ9j4KFyjbvzj5uZgwd7XqXRQ17qT
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Ruby on Rails.png)
Detected patterns
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://nextstopparking.com.lifae.us/?t=&p=aV7PZ9j4KFyjbvzj5uZgwd7XqXRQ17qT
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/ |
67 B 400 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/ |
120 KB 75 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
517 KB 155 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame 5EA7 |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/ |
75 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
213 KB 43 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
53 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
307 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
77 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
nextstopparking.com.lifae.us/ | Name: XSRF-TOKEN Value: b5oOmm4wb%2FzBBwAu3c13ltZCyyMMUwSR0pGsLo%2FvVIy9d%2BLs7rYhGq8SiCeeEOIZaooca1m73STiWHVVwPPCww%3D%3D |
|
nextstopparking.com.lifae.us/ | Name: _session_id Value: 5ed82022337e6945aca80ec6ab4d0123 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nextstopparking.com.lifae.us
training.phriendlyphishing.com
13.249.85.23
99.84.160.81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