Submitted URL: http://account.g.mail.nochargemail.com/reactivate/9JMpZV3ercbdZNtLNLrlGMaGuZF0LDkW/ZiJ0OjsLC8EKmnzkJX4dyk9xJfAnoOTm
Effective URL: http://account.g.mail.nochargemail.com/scam_training
Submission: On May 06 via manual from SG

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 54.252.116.154, located in Sydney, Australia and belongs to AMAZON-02 - Amazon.com, Inc., US. The main domain is account.g.mail.nochargemail.com.
This is the only time account.g.mail.nochargemail.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 4 54.252.116.154 16509 (AMAZON-02)
5 2
Apex Domain
Subdomains
Transfer
4 nochargemail.com
account.g.mail.nochargemail.com
5 KB
0 cloudfront.net Failed
d3fk1i533ipcm8.cloudfront.net Failed
5 2
Domain Requested by
4 account.g.mail.nochargemail.com 1 redirects account.g.mail.nochargemail.com
0 d3fk1i533ipcm8.cloudfront.net Failed account.g.mail.nochargemail.com
5 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://account.g.mail.nochargemail.com/scam_training
Frame ID: A2C686DB0FB4F010055E385451439BE8
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://account.g.mail.nochargemail.com/reactivate/9JMpZV3ercbdZNtLNLrlGMaGuZF0LDkW/ZiJ0OjsLC8EKmnzkJX4dyk9xJfAnoOTm HTTP 302
    http://account.g.mail.nochargemail.com/scam_training Page URL

Detected technologies

Overall confidence: 50%
Detected patterns
  • meta csrf-param /authenticity_token/i

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 50%
Detected patterns
  • meta csrf-param /authenticity_token/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

4 kB
Transfer

1 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://account.g.mail.nochargemail.com/reactivate/9JMpZV3ercbdZNtLNLrlGMaGuZF0LDkW/ZiJ0OjsLC8EKmnzkJX4dyk9xJfAnoOTm HTTP 302
    http://account.g.mail.nochargemail.com/scam_training Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set scam_training
account.g.mail.nochargemail.com/
Redirect Chain
  • http://account.g.mail.nochargemail.com/reactivate/9JMpZV3ercbdZNtLNLrlGMaGuZF0LDkW/ZiJ0OjsLC8EKmnzkJX4dyk9xJfAnoOTm
  • http://account.g.mail.nochargemail.com/scam_training
1 KB
2 KB
Document
General
Full URL
http://account.g.mail.nochargemail.com/scam_training
Protocol
HTTP/1.1
Server
54.252.116.154 Sydney, Australia, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
launch.phriendlyphishing.com
Software
Apache/2.4.18 (Ubuntu) / Phusion Passenger 5.3.4
Resource Hash
656f334562e98095c0fec05d5d858fd3c7a4bf3d4f27d2efa1e996c026d786c2
Security Headers
Name Value
Content-Security-Policy default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Host
account.g.mail.nochargemail.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Cookie
XSRF-TOKEN=9WHZIuNFq49Dy2GsFgWmiv9HB1Jjspp7R7cSx1Lk108tpm%2BFexmzo9zUtytFAEDYjhZfkVsZsT1TXDT7nkCXxA%3D%3D; _session_id=b32d90ff756ba00dff569611e71737d2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 06 May 2019 06:02:43 GMT
Server
Apache/2.4.18 (Ubuntu)
Cache-Control
max-age=0, private, must-revalidate max-age=86400, public
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
e997d0c1-6f65-44d3-877f-dfe8bf9ed684
X-Download-Options
noopen
X-Runtime
0.040735
X-Frame-Options
sameorigin
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Powered-By
Phusion Passenger 5.3.4
Set-Cookie
XSRF-TOKEN=OEKE%2B2%2BRiVvteakV3nlSLt1k0mUQPuNalnbrrSJThe7ghTJc982Rd3Jmf5KNfLR8rDWKpiiVyByCnc2R7vfFZQ%3D%3D; path=/; HttpOnly; SameSite=Lax
Vary
Host,Accept-Encoding
ETag
W/"896ac46386962527993200a34a674a7d-gzip"
Status
200 OK
Content-Encoding
gzip
Content-Length
843
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=utf-8

Redirect headers

Date
Mon, 06 May 2019 06:02:43 GMT
Server
Apache/2.4.18 (Ubuntu)
Cache-Control
no-cache max-age=86400, public
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
cfb0d9c9-8811-4796-aa8a-b683fdaf8291
X-Download-Options
noopen
X-Runtime
0.204928
X-Frame-Options
sameorigin
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Powered-By
Phusion Passenger 5.3.4
Set-Cookie
XSRF-TOKEN=9WHZIuNFq49Dy2GsFgWmiv9HB1Jjspp7R7cSx1Lk108tpm%2BFexmzo9zUtytFAEDYjhZfkVsZsT1TXDT7nkCXxA%3D%3D; path=/; HttpOnly; SameSite=Lax _session_id=b32d90ff756ba00dff569611e71737d2; path=/; HttpOnly; SameSite=Lax
Vary
Host
Location
http://account.g.mail.nochargemail.com/scam_training#/home?landing_slide=true
Status
302 Found
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
csp_report
account.g.mail.nochargemail.com/
0
952 B
Other
General
Full URL
http://account.g.mail.nochargemail.com/csp_report?report_only=true
Requested by
Host: account.g.mail.nochargemail.com
URL: http://account.g.mail.nochargemail.com/scam_training
Protocol
HTTP/1.1
Server
54.252.116.154 Sydney, Australia, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
launch.phriendlyphishing.com
Software
Apache/2.4.18 (Ubuntu) / Phusion Passenger 5.3.4
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
http://account.g.mail.nochargemail.com/scam_training
Origin
http://account.g.mail.nochargemail.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/csp-report

Response headers

Date
Mon, 06 May 2019 06:02:44 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Powered-By
Phusion Passenger 5.3.4
Status
200 OK
Connection
Keep-Alive
Vary
Host
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
034a2660-47a8-414d-ad6b-d47616c9387a
X-Runtime
0.016910
Server
Apache/2.4.18 (Ubuntu)
X-Download-Options
noopen
X-Frame-Options
sameorigin
Content-Type
text/plain; charset=utf-8
Cache-Control
no-cache, max-age=86400, public
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
Keep-Alive
timeout=5, max=98
scam_training-4a91142198518bd9eb7aecc5f98888bf.css
d3fk1i533ipcm8.cloudfront.net/assets/
0
0

csp_report
account.g.mail.nochargemail.com/
0
957 B
Other
General
Full URL
http://account.g.mail.nochargemail.com/csp_report?report_only=true
Requested by
Host: account.g.mail.nochargemail.com
URL: http://account.g.mail.nochargemail.com/scam_training
Protocol
HTTP/1.1
Server
54.252.116.154 Sydney, Australia, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
launch.phriendlyphishing.com
Software
Apache/2.4.18 (Ubuntu) / Phusion Passenger 5.3.4
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
http://account.g.mail.nochargemail.com/scam_training
Origin
http://account.g.mail.nochargemail.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/csp-report

Response headers

Date
Mon, 06 May 2019 06:02:44 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Powered-By
Phusion Passenger 5.3.4
Status
200 OK
Connection
Keep-Alive
Vary
Host
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
caa41017-805f-4153-ab51-fed7069e0415
X-Runtime
0.009336
Server
Apache/2.4.18 (Ubuntu)
X-Download-Options
noopen
X-Frame-Options
sameorigin
Content-Type
text/plain; charset=utf-8
Cache-Control
no-cache, max-age=86400, public
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
Keep-Alive
timeout=5, max=100
scam_training-e5ea2d0553b6045f1ed271e1550ffdaf.js
d3fk1i533ipcm8.cloudfront.net/assets/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d3fk1i533ipcm8.cloudfront.net
URL
http://d3fk1i533ipcm8.cloudfront.net/assets/scam_training-4a91142198518bd9eb7aecc5f98888bf.css
Domain
d3fk1i533ipcm8.cloudfront.net
URL
http://d3fk1i533ipcm8.cloudfront.net/assets/scam_training-e5ea2d0553b6045f1ed271e1550ffdaf.js

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

2 Cookies

Domain/Path Name / Value
account.g.mail.nochargemail.com/ Name: XSRF-TOKEN
Value: OEKE%2B2%2BRiVvteakV3nlSLt1k0mUQPuNalnbrrSJThe7ghTJc982Rd3Jmf5KNfLR8rDWKpiiVyByCnc2R7vfFZQ%3D%3D
account.g.mail.nochargemail.com/ Name: _session_id
Value: b32d90ff756ba00dff569611e71737d2

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

account.g.mail.nochargemail.com
d3fk1i533ipcm8.cloudfront.net
d3fk1i533ipcm8.cloudfront.net
54.252.116.154
656f334562e98095c0fec05d5d858fd3c7a4bf3d4f27d2efa1e996c026d786c2
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855