training.knowbe4.com
Open in
urlscan Pro
2600:9000:200d:b600:5:dd1f:dcc0:93a1
Malicious Activity!
Public Scan
Effective URL: https://training.knowbe4.com/pages/88ee5bad29b2/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3R...
Submission: On October 11 via manual from US
Summary
TLS certificate: Issued by Amazon on October 8th 2018. Valid for: a year.
This is the only time training.knowbe4.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Phishing Simulation (Internet)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.72.175.22 52.72.175.22 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
8 | 2600:9000:200... 2600:9000:200d:b600:5:dd1f:dcc0:93a1 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
11 | 3 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-72-175-22.compute-1.amazonaws.com
ftp.phishing.guru |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
training.knowbe4.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
knowbe4.com
training.knowbe4.com |
897 KB |
1 |
phishing.guru
ftp.phishing.guru |
683 B |
0 |
uchicago.edu
Failed
security.bsd.uchicago.edu Failed |
|
11 | 3 |
Domain | Requested by | |
---|---|---|
8 | training.knowbe4.com |
ftp.phishing.guru
training.knowbe4.com |
1 | ftp.phishing.guru | |
0 | security.bsd.uchicago.edu Failed |
training.knowbe4.com
|
11 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
34.75.2o2.lol |
security.bsd.uchicago.edu |
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.knowbe4.com Amazon |
2018-10-08 - 2019-11-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://training.knowbe4.com/pages/88ee5bad29b2/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvODhlZTViYWQyOWIy
Frame ID: 6028E7BF89BA43D7025BE208ADC468AF
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://ftp.phishing.guru/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3... Page URL
- https://training.knowbe4.com/pages/88ee5bad29b2/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5f... Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
- env /^Modernizr$/i
Moment.js (JavaScript Libraries) Expand
Detected patterns
- env /^moment$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Protect my account
Search URL Search Domain Scan URL
Title: http://security.bsd.uchicago.edu/phish
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://ftp.phishing.guru/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvODhlZTViYWQyOWIy Page URL
- https://training.knowbe4.com/pages/88ee5bad29b2/XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvODhlZTViYWQyOWIy Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvODhlZTViYWQyOWIy
ftp.phishing.guru/ |
341 B 683 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
XcmVejaXBpZWh50X2lkPTKM4ODg3eVNDY2PMyZjYW1wsYWWlnbl9ydW5faWQ9MTUzAMjUwNCZhY3Rpb249Y2xpY2smdXJsPWh0dHBzOi8vdHJhaW5pbmcua25vd2JlNC5jb20vcGFnZXMvODhlZTViYWQyOWIy
training.knowbe4.com/pages/88ee5bad29b2/ |
52 KB 38 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-405b1be04ef2476f9afb17154e5df63b79570ecdf8d066a4971a25a495671e23.js
training.knowbe4.com/assets/ |
3 MB 837 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
training.knowbe4.com/assets/ |
50 KB 16 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-watermark-b0b90df080d521e4c17ef323d0af819c49f1337c52ae3df28f861dcead05bb1c.css
training.knowbe4.com/assets/ |
606 B 669 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-modal-18bd5ec103f064289d063ed0d12338765b0e2721fb4e99e6ea0b6d59d7a1344c.css
training.knowbe4.com/assets/ |
624 B 739 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-tooltip-765b79bc8e03650717748466e848ae546208dafc86bc4903d33d56badb3f67b1.css
training.knowbe4.com/assets/ |
2 KB 939 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-5d737a9fc0b8eb1f5c0718dc7e6c9d994112556b34c564b7ababf85152ebe82d.css
training.knowbe4.com/assets/ |
1 KB 908 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing_redflags_08-2017.png
security.bsd.uchicago.edu/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
security.bsd.uchicago.edu/phishing_redflags_08-2017/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sei-flag-fc5e7621ba0e98c5c6728e3b2bdf802311c0a0953a05e60a7551cb0c7bed00a9.png
training.knowbe4.com/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- security.bsd.uchicago.edu
- URL
- https://security.bsd.uchicago.edu/phishing_redflags_08-2017.png
- Domain
- security.bsd.uchicago.edu
- URL
- https://security.bsd.uchicago.edu/phishing_redflags_08-2017/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Phishing Simulation (Internet)36 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _typeof boolean| windowIsDefined function| _extends function| FlatpickrInstance function| _flatpickr function| flatpickr function| updateQueryStringParameter function| getParam function| colSort function| ES6Promise function| $ function| jQuery object| jQuery112405845021687777123 function| Retina function| RetinaImagePath function| RetinaImage function| Color function| Chart object| Chartkick function| proj4 function| AjaxBootstrapSelect function| AjaxBootstrapSelectList function| AjaxBootstrapSelectRequest function| Slider object| Utils object| asap_questionaire function| AsapStoreViewer object| Routes function| moment object| FullCalendar function| _ object| ProgressBar object| html5 object| Modernizr object| asap object| kb40 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ftp.phishing.guru
security.bsd.uchicago.edu
training.knowbe4.com
security.bsd.uchicago.edu
2600:9000:200d:b600:5:dd1f:dcc0:93a1
52.72.175.22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