Help
RSS
API
Feed
Maltego
Contact
Domain > bcctraining.vaevk.org
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-01-18
143.204.29.93
(
ClassC
)
2025-08-01
204.246.191.119
(
ClassC
)
Port 80
HTTP/1.1 302 FoundContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Fri, 01 Aug 2025 01:53:43 GMTServer: ApacheCache-Control: no-cacheVary: OriginX-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; modeblockX-Request-Id: 6ac37d9d-4e96-4632-9df8-262d92ea3b81X-Download-Options: noopenX-Runtime: 0.015483X-Frame-Options: sameoriginX-Content-Type-Options: nosniffContent-Security-Policy: default-src https:; connect-src self https:; font-src data: *; img-src data: *; script-src self unsafe-inline unsafe-eval https:; style-src self unsafe-inline https:; report-uri /csp_report?report_onlytrueX-Powered-By: Phusion Passenger(R) 6.0.27Set-Cookie: XSRF-TOKENT8Ein9tE376jHInGY1LeMd4fzjv9ic3wRmBpZfLBYn22Uc0VEc5C7hEVWYbTpJ8t7WVGUM6VjtH7iTxLu3f8jw; path/; SameSiteLax; HttpOnlySet-Cookie: _session_id8a9d944c3cde3c9653ba155d82adb2ba; path/; HttpOnly; SameSiteLaxLocation: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.htmlStatus: 302 FoundVia: 1.1 05369a6effd223b3d51d346f1271512e.cloudfront.net (CloudFront)X-Cache: Miss from cloudfrontX-Amz-Cf-Pop: HIO50-C2X-Amz-Cf-Id: Z8a46pAttzrKApIJLX8y6RcLyOOBoagYLmteBtQbs0v58nguYhEMMA html>body>You are being a hrefhttps://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html>redirected/a>./body>/html>
Port 443
HTTP/1.1 302 FoundContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Fri, 01 Aug 2025 01:53:44 GMTServer: ApacheCache-Control: no-cacheVary: OriginStrict-Transport-Security: max-age0X-Permitted-Cross-Domain-Policies: noneX-XSS-Protection: 1; modeblockX-Request-Id: 8dbaa711-610d-4b8c-b70b-5dc5e1f68fb5X-Download-Options: noopenX-Runtime: 0.016834X-Frame-Options: sameoriginX-Content-Type-Options: nosniffContent-Security-Policy: default-src https:; connect-src self https:; font-src data: *; img-src data: *; script-src self unsafe-inline unsafe-eval https:; style-src self unsafe-inline https:; report-uri /csp_report?report_onlytrueX-Powered-By: Phusion Passenger(R) 6.0.27Set-Cookie: XSRF-TOKENv8b5MjhniBQnameihiSORnTndNyALO_RcQijtIVYwO5MfVjFQ7kdOxqBGqY5xwkqRtSNyFDrLxBQwyAcCDCTgQ; path/; SameSiteLax; secure; HttpOnlySet-Cookie: _session_id8872a6e910832a1eef2e80faee6acc1b; path/; HttpOnly; secure; SameSiteLaxLocation: https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.htmlStatus: 302 FoundVia: 1.1 1bfde73e7d02732154f58c7e03609d08.cloudfront.net (CloudFront)X-Cache: Miss from cloudfrontX-Amz-Cf-Pop: HIO50-C2X-Amz-Cf-Id: 4yK_LXP5XnspFN7JAL2dHVtnMvhdFvRuZqRcTKzXn8KkDg6wiglegA html>body>You are being a hrefhttps://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html>redirected/a>./body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]