Submitted URL: http://account.g.mail.nochargemail.com/reactivate/W8QWtf8q9G/8jr2ox
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Submission: On February 24 via manual from AU

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 9 HTTP transactions. The main IP is 13.35.253.67, located in Seattle, United States and belongs to AMAZON-02, US. The main domain is training.phriendlyphishing.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 3rd 2020. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 54.252.116.154 16509 (AMAZON-02)
9 13.35.253.67 16509 (AMAZON-02)
9 2
Domain Requested by
9 training.phriendlyphishing.com training.phriendlyphishing.com
1 account.g.mail.nochargemail.com 1 redirects
9 2

This site contains no links.

Subject Issuer Validity Valid
*.launch.phriendlyphishing.com
Let's Encrypt Authority X3
2020-02-03 -
2020-05-03
3 months crt.sh

This page contains 1 frames:

Primary Page: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Frame ID: 39FAACC60B7A937D4B1D253C7653B215
Requests: 10 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://account.g.mail.nochargemail.com/reactivate/W8QWtf8q9G/8jr2ox HTTP 302
    https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
  2. https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

9
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

1804 kB
Transfer

1803 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://account.g.mail.nochargemail.com/reactivate/W8QWtf8q9G/8jr2ox HTTP 302
    https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
  2. https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://account.g.mail.nochargemail.com/reactivate/W8QWtf8q9G/8jr2ox HTTP 302
  • https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/
Redirect Chain
  • http://account.g.mail.nochargemail.com/reactivate/W8QWtf8q9G/8jr2ox
  • https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
11 KB
12 KB
Document
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
763c34ef370091de892ce2834a04d8fbbaf1a5a9b9986e727a582d393b2e07fd

Request headers

:method
GET
:authority
training.phriendlyphishing.com
:scheme
https
:path
/landing_pages/simulated_phishing_page/story.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-type
text/html
content-length
11500
date
Mon, 24 Feb 2020 00:22:02 GMT
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
etag
"c3de36d4139e845b1d20f6c62c5e56bb"
x-amz-version-id
null
accept-ranges
bytes
server
AmazonS3
x-cache
Hit from cloudfront
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
RcX3HQY5jrJo2tbtIOxxtvxcF6ZkixGDEkSc4NT7Qljxep_wh4L69A==
age
28057

Redirect headers

Date
Mon, 24 Feb 2020 08:09:37 GMT
Server
Apache/2.4.18 (Ubuntu)
Cache-Control
no-cache max-age=86400, public
Vary
Origin,Host
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
c0c299e8-d839-4095-ad49-7a5c3be5f942
X-Download-Options
noopen
X-Runtime
0.011600
X-Frame-Options
sameorigin
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Powered-By
Phusion Passenger 5.3.4
Set-Cookie
XSRF-TOKEN=5PqQPEfVwC34YdQ9OBCXEPcWcvM2ufQAUKGxOZ%2BBFFlehuyFUZ4OI2VYhm8%2B8I0ssBpnE3cnKfYwRfvZD7WFSg%3D%3D; path=/; HttpOnly; SameSite=Lax _session_id=ae7b9f05d64a63ec7cdd2c109f7cdbc1; path=/; HttpOnly; SameSite=Lax
Location
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Status
302 Found
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
Primary Request story_html5.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/
17 KB
18 KB
Document
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a67b66729622a0f85c4c01308c2edc0c3dbe669e5543f8ed895f3910a6414257

Request headers

:method
GET
:authority
training.phriendlyphishing.com
:scheme
https
:path
/landing_pages/simulated_phishing_page/story_html5.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
same-origin
sec-fetch-mode
navigate
referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html

Response headers

status
200
content-type
text/html
content-length
17608
date
Mon, 24 Feb 2020 08:09:40 GMT
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
etag
"83bc21c3b7f8a9313ee61523a97c1ac4"
x-amz-version-id
null
accept-ranges
bytes
server
AmazonS3
x-cache
Miss from cloudfront
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
w9V43a9iYWw4Tf1atPWal_SJMayqBkKmnVAXyJO4xS5kVm971Kmybw==
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/
30 B
374 B
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/user.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
711e48016d1d010c1501a5bade576969e6c5922d6db5d9f872785ca9e71e8f81

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 08:09:40 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"c8276f1e0abd74a19d834c296fe8f977"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
application/javascript
content-length
30
x-amz-cf-id
kdfeq8U_7w__Q_iIpQyiypNOXOQbqYufMPqOCdsQR5z5bmDVSJ8I_A==
main.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/
106 KB
106 KB
Stylesheet
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/main.min.css
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cbdce9f99fa99e0f5071d4084a8d42d171c59f1153f3d8a3f1b0771d6bf96202

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Mon, 24 Feb 2020 08:09:41 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"57c3d9bae0743b2bb4bc15f4618a1904"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
text/css
content-length
108320
x-amz-cf-id
iVD-5s6kFdoOLc7gj1e8MEaYA3c01se_AmBwcglwxKgBSk7o3zeR7A==
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/
91 KB
92 KB
Stylesheet
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/output.min.css
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
8e952172dc73a3d097086d89f4c44db412487cd7dbd79d7cc0a325b24210a0c7

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Mon, 24 Feb 2020 08:09:41 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:34 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"ff382a3833204837986fe39e4c2a06f7"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
text/css
content-length
93222
x-amz-cf-id
cVt_-fIl94zFgtKXV57CR33jgkmHJO3e4wmM2YZZzgmFEJCLh0X9pQ==
app.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/
1 MB
1 MB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/app.min.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9ff317809debfcaee37f9e27bbeb2204386e9b443e5ec13109c7551d8cdc4202

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 08:09:41 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"17b90fc70bb80603c9563c080ac7d8b5"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
application/javascript
content-length
1534568
x-amz-cf-id
Rw7XeERjhrpPnSGHKdCZvIJx9Y28OUwJ7XiSKvtU1BtWC2GkWsPL9Q==
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5fff9f63d2ad3ebbf7ef9fda138e1b5727b9e1bea3231ffc8da08d7298aa236e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
data.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/
23 KB
23 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/data.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/app.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4a1d0dc97e26a64ba0e2bcfc9d784c95c0e9e42f648d849598997869deef8bc3

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 08:09:44 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:34 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"c8e45e0d298d1ad444bb1dfe1549cf40"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
application/javascript
content-length
23270
x-amz-cf-id
kf9nsD8h5_4cQE2tYUhHk_gjtDkZWYBxY2Qm0UKXWebs3tKlkwaBxw==
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/
42 KB
43 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/frame.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/app.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
322aff956db48553f7ae59ee247e553b9d41e8c43a8d8f91f693e101def20930

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 08:09:44 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:34 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"4cbc4f7639347ed51c5ea34e56f213a8"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
application/javascript
content-length
43215
x-amz-cf-id
v15L1ErESZeWD7_tQ48KOEn88-oMOuZgcPvMJ77aj8Uny_OOkZNJwg==
paths.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/
10 KB
10 KB
Script
General
Full URL
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/paths.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/app.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.67 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-35-253-67.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
44ea8887c8c7905945e8ca6d3e93437e460ed05f8c75d16578de1b38b7b880b9

Request headers

Referer
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_html5.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 08:09:44 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Wed, 20 Jun 2018 11:05:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA6-C1
etag
"7a77e58aae66db26aa35b586c4643bf1"
x-cache
Miss from cloudfront
x-amz-version-id
null
status
200
accept-ranges
bytes
content-type
application/javascript
content-length
10266
x-amz-cf-id
tYL22Cd11BsbdnBwqYJjw1uSd-mQLrYSRyVKTh_dX76uRpCu1A57Bw==

Verdicts & Comments Add Verdict or Comment

89 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| isMobile object| globals undefined| doc undefined| loader function| requirejs function| require function| define object| CryptoJS function| TinCan function| _ function| $ function| jQuery object| StyleFix object| PrefixFree object| Backbone object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin object| captionator function| TimelineLite function| SVGPathSeg function| SVGPathSegClosePath function| SVGPathSegMovetoAbs function| SVGPathSegMovetoRel function| SVGPathSegLinetoAbs function| SVGPathSegLinetoRel function| SVGPathSegCurvetoCubicAbs function| SVGPathSegCurvetoCubicRel function| SVGPathSegCurvetoQuadraticAbs function| SVGPathSegCurvetoQuadraticRel function| SVGPathSegArcAbs function| SVGPathSegArcRel function| SVGPathSegLinetoHorizontalAbs function| SVGPathSegLinetoHorizontalRel function| SVGPathSegLinetoVerticalAbs function| SVGPathSegLinetoVerticalRel function| SVGPathSegCurvetoCubicSmoothAbs function| SVGPathSegCurvetoCubicSmoothRel function| SVGPathSegCurvetoQuadraticSmoothAbs function| SVGPathSegCurvetoQuadraticSmoothRel function| SVGPathSegList function| globalProvideData function| handleBeforeUnload

0 Cookies

1 Console Messages

Source Level URL
Text
console-api debug URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/app.min.js(Line 6)
Message:
Download the React DevTools for a better development experience: https://fb.me/react-devtools