Submitted URL: https://protect-au.mimecast.com/s/D9MMCJyBPjFBvyLjUVUiia?domain=ticketingmanager.traulic.org
Effective URL: https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Submission: On July 05 via manual from AU

Summary

This website contacted 3 IPs in 2 countries across 5 domains to perform 3 HTTP transactions. The main IP is 52.222.157.8, located in Seattle, United States and belongs to AMAZON-02 - Amazon.com, Inc., US. The main domain is training.phriendlyphishing.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on June 2nd 2019. Valid for: 3 months.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2 124.47.150.19 136792 (MIMECAST-...)
1 1 54.252.116.154 16509 (AMAZON-02)
1 52.222.157.8 16509 (AMAZON-02)
1 205.185.208.52 20446 (HIGHWINDS3)
1 52.222.157.101 16509 (AMAZON-02)
3 3
Domain Requested by
2 protect-au.mimecast.com 2 redirects
1 d1djgeblw6va9k.cloudfront.net training.phriendlyphishing.com
1 code.jquery.com training.phriendlyphishing.com
1 training.phriendlyphishing.com
1 ticketingmanager.traulic.org 1 redirects
3 5

This site contains no links.

Subject Issuer Validity Valid
cdn.staging1.launch.phriendlyphishing.com
Let's Encrypt Authority X3
2019-06-02 -
2019-08-31
3 months crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh

This page contains 1 frames:

Primary Page: https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Frame ID: F1D116BA75F5D896D1623B7C00739E0F
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://protect-au.mimecast.com/s/D9MMCJyBPjFBvyLjUVUiia?domain=ticketingmanager.traulic.org HTTP 307
    https://protect-au.mimecast.com/redirect/eNpVUV1v0zAU_SuTH3hK3DhpvipNW9V1qBQ6GCpDVaXIcUzqNbYj-1psmvjv3AyQxpP... HTTP 307
    http://ticketingmanager.traulic.org/?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O HTTP 302
    https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN931... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

5
Domains

5
Subdomains

3
IPs

2
Countries

53 kB
Transfer

113 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://protect-au.mimecast.com/s/D9MMCJyBPjFBvyLjUVUiia?domain=ticketingmanager.traulic.org HTTP 307
    https://protect-au.mimecast.com/redirect/eNpVUV1v0zAU_SuTH3hK3DhpvipNW9V1qBQ6GCpDVaXIcUzqNbYj-1psmvjv3AyQxpPte865957jF-LECGRBQGk6BHGWANcBPJVdoDyQiAxWkAWLiENWGhHpVYfvuqzTPCmTOiKgYWc7iT2SJEOBGvGaz2map5SxgrJ8jtVxklXziAQ3IH4CGBfH2XEGapqpTK-54b10FBwPgxLUuv44u4JL9bziefO9FIf9Ji52T7ct3243pV52H37Gj7df3o2X1fub7fCwljfndXF-Ktqv3mqxqzNWHb71ZXOH4-XkcX1olnsWs7xZ4Zkuq6RJE1ajDdZkDQ8gnWYxuojTrE6qMsnSHLWtJ4uyQAsckyD_pAhwMXVdnaQ47-8_YkEED1ZLJ_7k8YbqTeewoswPe-1D-9Ylok72yhrER2dBCoh5oFppKbgHKqyeGoT2EQkbg0saDkjnw8V96Nvni8_cgZHOnzD51-_4ZIPBtMlfR68WxH-7__oNj96ZqQ HTTP 307
    http://ticketingmanager.traulic.org/?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O HTTP 302
    https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request launcher.html
training.phriendlyphishing.com/
Redirect Chain
  • https://protect-au.mimecast.com/s/D9MMCJyBPjFBvyLjUVUiia?domain=ticketingmanager.traulic.org
  • https://protect-au.mimecast.com/redirect/eNpVUV1v0zAU_SuTH3hK3DhpvipNW9V1qBQ6GCpDVaXIcUzqNbYj-1psmvjv3AyQxpPte865957jF-LECGRBQGk6BHGWANcBPJVdoDyQiAxWkAWLiENWGhHpVYfvuqzTPCmTOiKgYWc7iT2SJEOBGvGaz2ma...
  • http://ticketingmanager.traulic.org/?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
  • https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
9 KB
9 KB
Document
General
Full URL
https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.8 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-157-8.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a0b45f9cedac4a994f2d8ece3415d098c4fc7e2059de7ac0ad3c6b70c3106c68

Request headers

:method
GET
:authority
training.phriendlyphishing.com
:scheme
https
:path
/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-type
text/html
content-length
8772
date
Tue, 02 Jul 2019 01:27:28 GMT
last-modified
Sun, 12 May 2019 04:33:27 GMT
etag
"a385b9eb3ad4871b5a6339fe2dc06654"
x-amz-version-id
I.laxUPCrWSlP9oJL0jZigrrYZxoD1lh
accept-ranges
bytes
server
AmazonS3
age
75870
x-cache
Hit from cloudfront
via
1.1 492376a657ddc8d381dbc676ab798325.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53
x-amz-cf-id
WIPZyYAeW9yAi11v38KbXkOo-i_uZaVk1cAiQc8gXZD0jyDSwlRCAQ==

Redirect headers

Date
Fri, 05 Jul 2019 00:46:27 GMT
Server
Apache/2.4.18 (Ubuntu)
Cache-Control
no-cache max-age=86400, public
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
4d6d8866-65ef-43f1-b347-6203468d35dd
X-Download-Options
noopen
X-Runtime
0.349573
X-Frame-Options
sameorigin
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src https:; connect-src 'self' https:; img-src data: *; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; report-uri /csp_report?report_only=true
X-Powered-By
Phusion Passenger 5.3.4
Set-Cookie
XSRF-TOKEN=NnruCrnIEq7elTQBFq%2Bede4mK27CUWwwCMLTHGUQvFFYK%2F50y%2BWHkn5XlDfV3D4%2BEHwxlC6wvGx%2BQwdKEo2hsg%3D%3D; path=/; HttpOnly; SameSite=Lax _session_id=3babbcb0518c471578ac8e7714f476dc; path=/; HttpOnly; SameSite=Lax
Vary
Host
Location
https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Status
302 Found
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
jquery-1.12.4.min.js
code.jquery.com/
95 KB
33 KB
Script
General
Full URL
https://code.jquery.com/jquery-1.12.4.min.js
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404

Request headers

Referer
https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 05 Jul 2019 00:46:28 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 May 2016 17:18:54 GMT
Server
nginx
ETag
W/"573f46fe-17b8b"
Vary
Accept-Encoding
X-HW
1562287588.dop015.am5.shc,1562287588.dop015.am5.t,1562287588.cds026.am5.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33738
landing-page-bubble.png
d1djgeblw6va9k.cloudfront.net/
10 KB
10 KB
Image
General
Full URL
https://d1djgeblw6va9k.cloudfront.net/landing-page-bubble.png
Requested by
Host: training.phriendlyphishing.com
URL: https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.157.101 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-157-101.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2c66d5d4f3257ab79c870a73bbe1a9787e7f9e56fee41b8d96c8284ba1d22593

Request headers

Referer
https://training.phriendlyphishing.com/launcher.html?t=iyCa5_X7cZUI-6NxFbaKKI7mAdJw-jFQ&p=8GDKlWEeDkE6kx6bSsomcN9318ZVg7_O
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 02 Jul 2019 01:27:30 GMT
via
1.1 1d0fc03b30809d10a25a905ba30d8170.cloudfront.net (CloudFront)
last-modified
Thu, 23 Aug 2018 03:59:23 GMT
server
AmazonS3
age
75869
etag
"1be33d583673ca23c1b56a72a2cd3d50"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA53
accept-ranges
bytes
content-length
10209
x-amz-cf-id
MUtUzklwHn1HCrOPCVoUaCVK_fzRETqsRYarqHVxc2JB9g_cUAMvWQ==

Verdicts & Comments Add Verdict or Comment

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery string| base_url function| getQueryVariable function| renderPhishingLandingPageMSG function| getCookie function| setCookies function| login_already function| authorise_and_load_resource

0 Cookies