training.phriendlyphishing.com
Open in
urlscan Pro
143.204.98.112
Public Scan
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Rik6mybFk
Submission: On January 11 via manual from NZ — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 7th 2022. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.26.155.101 52.26.155.101 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 54.252.116.154 54.252.116.154 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 143.204.98.112 143.204.98.112 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:82a::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 143.204.98.68 143.204.98.68 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 143.204.98.50 143.204.98.50 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-26-155-101.us-west-2.compute.amazonaws.com
smex12-5-en-ctp.trendmicro.com |
ASN16509 (AMAZON-02, US)
PTR: launch.phriendlyphishing.com
54.252.116.154 |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-98-112.fra50.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-98-68.fra50.r.cloudfront.net
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-98-50.fra50.r.cloudfront.net
d1djgeblw6va9k.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
phriendlyphishing.com
training.phriendlyphishing.com |
35 KB |
2 |
cloudfront.net
d1djgeblw6va9k.cloudfront.net |
171 KB |
2 |
amazonaws.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
3 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 37 ajax.googleapis.com — Cisco Umbrella Rank: 258 |
32 KB |
1 |
trendmicro.com
1 redirects
smex12-5-en-ctp.trendmicro.com |
182 B |
13 | 5 |
Domain | Requested by | |
---|---|---|
7 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | d1djgeblw6va9k.cloudfront.net |
training.phriendlyphishing.com
|
2 | i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
training.phriendlyphishing.com
|
1 | fonts.googleapis.com |
training.phriendlyphishing.com
|
1 | smex12-5-en-ctp.trendmicro.com | 1 redirects |
13 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.phriendlyphishing.com R3 |
2022-01-07 - 2022-04-07 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2021-11-29 - 2022-02-21 |
3 months | crt.sh |
*.execute-api.ap-southeast-2.amazonaws.com Amazon |
2021-08-15 - 2022-09-13 |
a year | crt.sh |
*.cloudfront.net Amazon |
2021-03-19 - 2022-03-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.phriendlyphishing.com/launcher.html?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Rik6mybFk
Frame ID: 6F274A53AD31ABDA1AC8E997201C6A43
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
SCAM Training LauncherPage URL History Show full URLs
-
https://smex12-5-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2f54.252.116.154%2f%3ft%3dzFRq1G0aMsTO...
HTTP 302
http://54.252.116.154/?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Rik6mybFk/times... HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Ri... Page URL
Detected technologies
Ruby on Rails (Web Frameworks) ExpandDetected patterns
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://smex12-5-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2f54.252.116.154%2f%3ft%3dzFRq1G0aMsTOTfcP5K3Kwhi%5fMvAA9WZi%26p%3dLcteMMcIRBxBgQ4d9roI6%2d6Rik6mybFk%2ftimesheet&umid=30b99827-519f-4df7-8ea7-0ec7f4f53814&auth=4208f9d292d4bb72367c9cdb6e8d9affc9f9dfab-c1948f6b27f1317fea9b45349cf8cadd6d3197a3
HTTP 302
http://54.252.116.154/?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Rik6mybFk/timesheet HTTP 302
https://training.phriendlyphishing.com/launcher.html?t=zFRq1G0aMsTOTfcP5K3Kwhi_MvAA9WZi&p=LcteMMcIRBxBgQ4d9roI6-6Rik6mybFk Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
launcher.html
training.phriendlyphishing.com/ Redirect Chain
|
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.css
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.css
training.phriendlyphishing.com/micro_course_handler/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing_page_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie_handler.js
training.phriendlyphishing.com/landing_page_handler/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
micro_course_handler.js
training.phriendlyphishing.com/micro_course_handler/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phish_reporter.png
training.phriendlyphishing.com/micro_course_handler/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
3 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
login
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
character-bg.jpg
d1djgeblw6va9k.cloudfront.net/ |
160 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onsecuritypolicyviolation object| onslotchange function| $ function| jQuery function| renderPhishingLandingPageMSG function| initialLogoPosition function| getCookie function| setCookies function| clearBrowserData function| showGallery function| showZoneInfo string| baseUrl string| portalUrl string| ph2Token function| getCertificate function| getQueryVariable function| authorise_and_load_resource function| onSlideChange string| html9 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
54.252.116.154/ | Name: XSRF-TOKEN Value: 8jfamaq0F1XJOi83LHDJ%2B5Fw3wZ2sMfZV7KgjzzrMXiuIcrtxMZJz8REUg0r5aDdbdzmTzlmy%2FPbqN1NGbXndw%3D%3D |
|
54.252.116.154/ | Name: _session_id Value: 4de5b991841e1d5e8ecbdb563c6aa035 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Policy Value: eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cCo6Ly90cmFpbmluZy5waHJpZW5kbHlwaGlzaGluZy5jb20vbWljcm9fY291cnNlX3Byb2R1Y3Rpb24vKiIsIkNvbmRpdGlvbiI6eyJEYXRlTGVzc1RoYW4iOnsiQVdTOkVwb2NoVGltZSI6MTY2NDU0NjM5OTAwMH19fV19 |
|
training.phriendlyphishing.com/ | Name: CloudFront-Signature Value: KYVEv8UlAsepN~2aGbzyewPATiq28rRfyeosRrqVk5kT4ofVcUEzqkTE87De-pBYmhG3nNl-NoCtC67256EZr9Ui-0vlvM57nWKEOhqA5yxbI5jaEQM~G5liruQFwEfJlV7wvNd9xDk3P8N~TrtJqBi76QF7ladX~42j4LCL3FNYIXYC08JtsF1FbyzGURwIQDb8zbWsM4hic57LKdilwQ4PNmBWMe-qFUmBeT3mduj7im5DlIPpTP6OII8GlPixzp6dhVzmdXY3D6AMmkyHN2tjkxv0NrSKxXT1q0SpBj5oOL4QpP1R3XVK3aXdvcWtSa8qKbIwVYakOT-oUs-fpg__ |
|
training.phriendlyphishing.com/ | Name: CloudFront-Key-Pair-Id Value: APKAJOUANF3WQ4HHRA6Q |
|
training.phriendlyphishing.com/ | Name: ph2-end-point Value: https://i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com/production/xapi/ |
|
training.phriendlyphishing.com/ | Name: ph2-token Value: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6InpGUnExRzBhTXNUT1RmY1A1SzNLd2hpX012QUE5V1ppOkxjdGVNTWNJUkJ4QmdRNGQ5cm9JNi02UmlrNm15YkZrIiwiZmlyc3RfbmFtZSI6IlBhbWVsYSIsImxpY2Vuc2VfZW5kIjoiMjAyMi0wOS0zMFQyMzo1OTo1OSsxMDowMCJ9LCJpYXQiOjE2NDE5MzQxODUsImV4cCI6MjQyNTQxNDc3MzB9.qNMVajSTxHOZ7pccVHvpd_Czke2bMQ_LRH7LA7cAIfA |
|
training.phriendlyphishing.com/ | Name: basic-url Value: tincan_production%2Fcell_300%2Fcourse_1%2Ftraining_package_4%2Ftraining_package_version_383%2Findex_lms.html%3Ftincan%3Dtrue%26endpoint%3Dhttps%3A%2F%2Fi6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com%2Fproduction%2Fxapi%2F%26auth%3DeyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJkYXRhIjp7InRva2VucyI6InpGUnExRzBhTXNUT1RmY1A1SzNLd2hpX012QUE5V1ppOkxjdGVNTWNJUkJ4QmdRNGQ5cm9JNi02UmlrNm15YkZrIiwiZmlyc3RfbmFtZSI6IlBhbWVsYSIsImxpY2Vuc2VfZW5kIjoiMjAyMi0wOS0zMFQyMzo1OTo1OSsxMDowMCJ9LCJpYXQiOjE2NDE5MzQxODUsImV4cCI6MjQyNTQxNDc3MzB9.qNMVajSTxHOZ7pccVHvpd_Czke2bMQ_LRH7LA7cAIfA%26actor%3D%257B%2522name%2522%3A%255B%2522Pamela%2522%255D%2C%2522mbox%2522%3A%2522mailto%3A%2522%2C%2522objectType%2522%3A%2522Agent%2522%257D%26registration%3D02383af0-7320-11ec-9ddb-0d64fb725986 |
|
training.phriendlyphishing.com/ | Name: logo-path Value: tincan_production/cell_300/course_1/training_package_4/landing_page/ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
d1djgeblw6va9k.cloudfront.net
fonts.googleapis.com
i6xr3fe2e8.execute-api.ap-southeast-2.amazonaws.com
smex12-5-en-ctp.trendmicro.com
training.phriendlyphishing.com
143.204.98.112
143.204.98.50
143.204.98.68
2a00:1450:4001:808::200a
2a00:1450:4001:82a::200a
52.26.155.101
54.252.116.154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