phishing-training.hornetsecurity.com
Open in
urlscan Pro
94.100.132.71
Public Scan
Effective URL: https://phishing-training.hornetsecurity.com/?token=oV0-c7dO
Submission: On March 23 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 4th 2023. Valid for: 3 months.
This is the only time phishing-training.hornetsecurity.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 94.100.132.71 94.100.132.71 | 25394 (MK-NETZDI...) (MK-NETZDIENSTE-AS) | |
8 | 94.100.132.57 94.100.132.57 | 25394 (MK-NETZDI...) (MK-NETZDIENSTE-AS) | |
21 | 3 |
ASN25394 (MK-NETZDIENSTE-AS, DE)
my.sharepoint.com-office365.com | |
phishing-training.hornetsecurity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
hornetsecurity.com
phishing-training.hornetsecurity.com |
239 KB |
8 |
it-seal.de
cdn.it-seal.de |
144 KB |
1 |
com-office365.com
1 redirects
my.sharepoint.com-office365.com |
269 B |
21 | 3 |
Domain | Requested by | |
---|---|---|
13 | phishing-training.hornetsecurity.com |
phishing-training.hornetsecurity.com
|
8 | cdn.it-seal.de |
phishing-training.hornetsecurity.com
cdn.it-seal.de |
1 | my.sharepoint.com-office365.com | 1 redirects |
21 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.hornetsecurity.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
phishing-training.hornetsecurity.com R3 |
2023-02-04 - 2023-05-05 |
3 months | crt.sh |
cdn.it-seal.de R3 |
2023-02-25 - 2023-05-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://phishing-training.hornetsecurity.com/?token=oV0-c7dO
Frame ID: A978AA1332722AA62D5CF12C0F1B788E
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
Glück gehabt! Das hätte eine Phishing-Mail sein können. | IT-SealPage URL History Show full URLs
-
http://my.sharepoint.com-office365.com/documents/2023/budget/2023_03_20_IntraConnect%20GmbH_Budgetplanung_2023?key=...
HTTP 301
https://phishing-training.hornetsecurity.com/?token=oV0-c7dO Page URL
Detected technologies
Nuxt.js (JavaScript Frameworks) ExpandDetected patterns
- /_nuxt/
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Polyfill (JavaScript Libraries) Expand
Detected patterns
- /polyfill\.min\.js
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Title: Datenschutz
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://my.sharepoint.com-office365.com/documents/2023/budget/2023_03_20_IntraConnect%20GmbH_Budgetplanung_2023?key=oV0-c7dO
HTTP 301
https://phishing-training.hornetsecurity.com/?token=oV0-c7dO Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
phishing-training.hornetsecurity.com/ Redirect Chain
|
69 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
introjs.min.css
phishing-training.hornetsecurity.com/vendor/intro.js/minified/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a0d2b01.js
phishing-training.hornetsecurity.com/_nuxt/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cc66057.js
phishing-training.hornetsecurity.com/_nuxt/ |
210 KB 70 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1644191.js
phishing-training.hornetsecurity.com/_nuxt/ |
185 KB 60 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e1112bc.js
phishing-training.hornetsecurity.com/_nuxt/ |
133 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2ce7311.js
phishing-training.hornetsecurity.com/_nuxt/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans.css
cdn.it-seal.de/it-seal/fonts/open-sans/ |
940 B 273 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
courier-prime-sans.css
cdn.it-seal.de/it-seal/fonts/courier-prime-sans/ |
352 B 477 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hornet.css
cdn.it-seal.de/it-seal/fonts/hornet/ |
1017 B 299 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aseadmin.svg
cdn.it-seal.de/hornet/ |
12 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
made_in_germany_positiv.svg
cdn.it-seal.de/it-seal/ |
9 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phishing-mail.d26ceac.svg
phishing-training.hornetsecurity.com/_nuxt/img/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
polyfill.min.js
phishing-training.hornetsecurity.com/vendor/ |
77 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
intro.min.js
phishing-training.hornetsecurity.com/vendor/intro.js/minified/ |
28 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-underwater.dbb8074.svg
phishing-training.hornetsecurity.com/_nuxt/img/ |
64 KB 16 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
675 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
754 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Bold.woff2
cdn.it-seal.de/it-seal/fonts/open-sans/ |
45 KB 45 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Light.woff2
cdn.it-seal.de/it-seal/fonts/open-sans/ |
45 KB 45 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Regular.woff2
cdn.it-seal.de/it-seal/fonts/open-sans/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
tracking
phishing-training.hornetsecurity.com/api/v1/ |
19 B 72 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ef50635.js
phishing-training.hornetsecurity.com/_nuxt/ |
21 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| __NUXT__ function| introJs object| webpackJsonp object| __core-js_shared__ object| core object| regeneratorRuntime function| setImmediate function| clearImmediate object| onNuxtReadyCbs function| onNuxtReady function| _ object| $nuxt2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
phishing-training.hornetsecurity.com/ | Name: i18n_redirected Value: de |
|
phishing-training.hornetsecurity.com/ | Name: token Value: oV0-c7dO |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.it-seal.de
my.sharepoint.com-office365.com
phishing-training.hornetsecurity.com
94.100.132.57
94.100.132.71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