training.phriendlyphishing.com
Open in
urlscan Pro
99.84.140.7
Public Scan
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On October 05 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by Amazon on June 29th 2022. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 13.227.254.59 13.227.254.59 | 16509 (AMAZON-02) (AMAZON-02) | |
14 | 99.84.140.7 99.84.140.7 | 16509 (AMAZON-02) (AMAZON-02) | |
15 | 2 |
ASN16509 (AMAZON-02, US)
PTR: server-13-227-254-59.sin52.r.cloudfront.net
incidentreport.com.securityresponse.org |
ASN16509 (AMAZON-02, US)
PTR: server-99-84-140-7.nrt57.r.cloudfront.net
training.phriendlyphishing.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
phriendlyphishing.com
training.phriendlyphishing.com |
2 MB |
1 |
securityresponse.org
1 redirects
incidentreport.com.securityresponse.org |
1 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
1 | incidentreport.com.securityresponse.org | 1 redirects |
15 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon |
2022-06-29 - 2023-07-29 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: 25BF0A7A47280D9FC7EE62B1CD481E36
Requests: 21 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: 96A94A9D5564E66ECFA94A3A1E54C4B9
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Simulation Link ExpiredPage URL History Show full URLs
-
http://incidentreport.com.securityresponse.org/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Detected technologies
Paths.js (JavaScript Graphics) ExpandDetected patterns
- paths(?:\.min)?\.js
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Ruby on Rails (Web Frameworks) Expand
Detected patterns
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://incidentreport.com.securityresponse.org/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/ |
67 B 437 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/ |
120 KB 120 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
517 KB 518 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame 96A9 |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/ |
75 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
213 KB 214 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
53 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
863 KB 864 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
25 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paths.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
15 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-light.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 21 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-regular.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 20 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-bold.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
21 KB 21 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 6 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 3 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 17 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 18 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
6mAli7uDFFi.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- training.phriendlyphishing.com
- URL
- https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/6mAli7uDFFi.js
Verdicts & Comments Add Verdict or Comment
84 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views function| GetPlayer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
incidentreport.com.securityresponse.org/ | Name: XSRF-TOKEN Value: 2oHwEFKf%2FHphQpG%2BL7w9hYEdYv9EmeM5SxebOl04TWSYb4H%2FFUfxp9t76rfluRbPdCpq0d1Yto9aBYT4KWEWgw%3D%3D |
|
incidentreport.com.securityresponse.org/ | Name: _session_id Value: 8d5704a810d71374a9fa2e785ff2e560 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
incidentreport.com.securityresponse.org
training.phriendlyphishing.com
training.phriendlyphishing.com
13.227.254.59
99.84.140.7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