www.eesaad.com
Open in
urlscan Pro
173.201.179.231
Malicious Activity!
Public Scan
Effective URL: https://www.eesaad.com/
Submission: On February 21 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on April 26th 2023. Valid for: a year.
This is the only time www.eesaad.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 173.201.179.231 173.201.179.231 | 398101 (GO-DADDY-...) (GO-DADDY-COM-LLC) | |
9 | 1 |
ASN398101 (GO-DADDY-COM-LLC, US)
PTR: ip-173-201-179-231.ip.secureserver.net
www.eesaad.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
eesaad.com
1 redirects
www.eesaad.com |
158 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.eesaad.com |
1 redirects
www.eesaad.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
eesaad.com Go Daddy Secure Certificate Authority - G2 |
2023-04-26 - 2024-04-26 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.eesaad.com/
Frame ID: 7BC52FE6137107B6D8B4870CF23A08B7
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Bank of America | Online Banking | Log In | User IDPage URL History Show full URLs
-
http://www.eesaad.com/
HTTP 301
https://www.eesaad.com/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.eesaad.com/
HTTP 301
https://www.eesaad.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.eesaad.com/ Redirect Chain
|
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vipa_jaw.css
www.eesaad.com/img/ |
311 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
balgo.png
www.eesaad.com/img/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mo_lama.png
www.eesaad.com/img/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fsd-secure-esp-sprite.png
www.eesaad.com/img/ |
473 B 550 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
help-qm-fsd.png
www.eesaad.com/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sign-in-sprite.png
www.eesaad.com/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gfootb-static-sprite.png
www.eesaad.com/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gfoot-home-icon.png
www.eesaad.com/img/ |
144 B 220 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.eesaad.com
173.201.179.231
2a1b1589e316d02ab75481e7aa88c9975afd2e87f17982fb6d38b6ebe2425a4c
30652cee5990b3b76f6cbf6f26362be9254dd62b4c6e6003c1127d1484573787
430cd3d34c511cd4c48596ea798c0bdbfdd971e90bc4b21449feabef4eeaa858
6bb1d4b1b719488b9812d1fb67b41b03857eec8f4e0a4d46a8066574037d817a
8c37fb372596058d87dd9208541c49b020d0e840e4f3a5baa27d39be2dc70b01
a8bc6337547a246ef75d1ae66d7ec8a0ed6171c1ba49804a403124e27c8e8452
c5b1714f77f7e114abcad4a6ac2174f9ddb6593caec900aed03c6d8248a49f09
ca3205c6a4eecfd67ad990b62b10e19f601230a2a5b2791676089e82836763f4
e1ac56ae25629e508f729b799d563d71920902a4cb26cf3bb602beb3e368775e