training.phriendlyphishing.com
Open in
urlscan Pro
18.164.116.13
Public Scan
Effective URL: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Submission: On November 04 via api from US — Scanned from US
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on October 8th 2024. Valid for: a year.
This is the only time training.phriendlyphishing.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 108.138.128.109 108.138.128.109 | 16509 (AMAZON-02) (AMAZON-02) | |
19 | 18.164.116.13 18.164.116.13 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 13.35.93.47 13.35.93.47 | 16509 (AMAZON-02) (AMAZON-02) | |
21 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-108-138-128-109.jfk50.r.cloudfront.net
healthalliance.hr.update.lang-en.us |
ASN16509 (AMAZON-02, US)
PTR: server-18-164-116-13.jfk50.r.cloudfront.net
training.phriendlyphishing.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-35-93-47.jfk50.r.cloudfront.net
metrics.articulate.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
phriendlyphishing.com
training.phriendlyphishing.com |
806 KB |
2 |
articulate.com
metrics.articulate.com — Cisco Umbrella Rank: 9551 |
488 B |
1 |
lang-en.us
1 redirects
healthalliance.hr.update.lang-en.us |
1 KB |
21 | 3 |
Domain | Requested by | |
---|---|---|
19 | training.phriendlyphishing.com |
training.phriendlyphishing.com
|
2 | metrics.articulate.com |
training.phriendlyphishing.com
|
1 | healthalliance.hr.update.lang-en.us | 1 redirects |
21 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
training.phriendlyphishing.com Amazon RSA 2048 M02 |
2024-10-08 - 2025-11-06 |
a year | crt.sh |
articulate.com Amazon RSA 2048 M03 |
2024-07-26 - 2025-08-24 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html
Frame ID: 193E977E2508A0AF1B6C7244BF1A69DB
Requests: 25 HTTP requests in this frame
Frame:
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html
Frame ID: 2EDF52F7A4800F30A990D14C6026D7BA
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Simulation Link ExpiredPage URL History Show full URLs
-
https://healthalliance.hr.update.lang-en.us/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Detected technologies
Paths.js (JavaScript Graphics) ExpandDetected patterns
- paths(?:\.min)?\.js
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Ruby on Rails (Web Frameworks) Expand
Detected patterns
React (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+data-react
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://healthalliance.hr.update.lang-en.us/
HTTP 302
https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
story.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/ |
67 B 417 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
output.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/ |
120 KB 75 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-bootstrap.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
517 KB 155 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics-frame.html
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/ Frame 2EDF |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
desktop.min.css
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/ |
75 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-frame.desktop.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
213 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
53 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ds-slides.min.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ |
863 KB 237 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
25 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paths.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
15 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-light.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 21 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-regular.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
20 KB 20 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-bold.woff
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/mobile-fonts/ |
21 KB 21 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 6 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 3 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 17 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
18 KB 18 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6mAli7uDFFi.js
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/ |
11 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
training.phriendlyphishing.com/ |
4 KB 5 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6YZa6fLFTdd_FFFFFF_P_0_526_1920_398_DX2700_DY2700_CX1488_CY309.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
74 KB 74 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6YWoKSSNnuT_DX340_DY340_CX251_CY78.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6fhDxiV0YFn_DX1222_DY1222_CX916_CY723.png
training.phriendlyphishing.com/landing_pages/simulated_phishing_page/mobile/ |
71 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
import
metrics.articulate.com/v1/ Frame 2EDF |
21 B 488 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
import
metrics.articulate.com/v1/ Frame |
0 0 |
Preflight
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
95 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| THREE object| isMobile object| DS object| globals function| ExecuteScript object| doc object| loader object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| _ function| globalProvideData object| com function| _gsDefine function| Ease function| Power4 function| Strong function| Quint function| Power3 function| Quart function| Power2 function| Cubic function| Power1 function| Quad function| Power0 function| Linear function| TweenLite function| TweenPlugin object| _gsQueue function| BackOut function| BackIn function| BackInOut object| Back function| SlowMo function| SteppedEase function| RoughEase function| BounceOut function| BounceIn function| BounceInOut object| Bounce function| CircOut function| CircIn function| CircInOut object| Circ function| ElasticOut function| ElasticIn function| ElasticInOut object| Elastic function| ExpoOut function| ExpoIn function| ExpoInOut object| Expo function| SineOut function| SineIn function| SineInOut object| Sine object| EaseLookup function| CSSPlugin function| BezierPlugin function| TimelineLite object| StyleFix object| PrefixFree object| captionator function| handleBeforeUnload object| views function| GetPlayer function| SVGPathSeg function| SVGPathSegClosePath function| SVGPathSegMovetoAbs function| SVGPathSegMovetoRel function| SVGPathSegLinetoAbs function| SVGPathSegLinetoRel function| SVGPathSegCurvetoCubicAbs function| SVGPathSegCurvetoCubicRel function| SVGPathSegCurvetoQuadraticAbs function| SVGPathSegCurvetoQuadraticRel function| SVGPathSegArcAbs function| SVGPathSegArcRel function| SVGPathSegLinetoHorizontalAbs function| SVGPathSegLinetoHorizontalRel function| SVGPathSegLinetoVerticalAbs function| SVGPathSegLinetoVerticalRel function| SVGPathSegCurvetoCubicSmoothAbs function| SVGPathSegCurvetoCubicSmoothRel function| SVGPathSegCurvetoQuadraticSmoothAbs function| SVGPathSegCurvetoQuadraticSmoothRel function| SVGPathSegList2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
healthalliance.hr.update.lang-en.us/ | Name: XSRF-TOKEN Value: pD84sUeths7LoGkL3D3up7VJgEQ4ZA8K8a3OmHLjXC-BZjIRRXvs_hnPcMnX31hCQca2G85r7KtUPH06_zWvbg |
|
healthalliance.hr.update.lang-en.us/ | Name: _session_id Value: bc87711c5aa0afcd486e426f45238219 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
healthalliance.hr.update.lang-en.us
metrics.articulate.com
training.phriendlyphishing.com
108.138.128.109
13.35.93.47
18.164.116.13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