teekadventures.com
Open in
urlscan Pro
50.87.248.119
Malicious Activity!
Public Scan
Submission: On March 20 via automatic, source openphish
Summary
This is the only time teekadventures.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 50.87.248.119 50.87.248.119 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
10 | 104.18.9.148 104.18.9.148 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
21 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box1119.bluehost.com
teekadventures.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bankofamerica.com
prepaid.bankofamerica.com |
118 KB |
5 |
teekadventures.com
teekadventures.com |
34 KB |
21 | 2 |
Domain | Requested by | |
---|---|---|
10 | prepaid.bankofamerica.com |
teekadventures.com
prepaid.bankofamerica.com |
5 | teekadventures.com |
teekadventures.com
|
21 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
prepaid.bankofamerica.com |
www.bankofamerica.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
prepaid.bankofamerica.com Entrust Certification Authority - L1M |
2020-11-23 - 2021-11-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/eddcard/Verify/
Frame ID: 5329D567215D700252FD35C1663036C6
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
ZURB Foundation (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+foundation[^>"]+css/i
- html /<div [^>]*class="[^"]*(?:small|medium|large)-\d{1,2} columns/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google Tag Manager (Tag Managers) Expand
Detected patterns
- html /googletagmanager\.com\/ns\.html[^>]+><\/iframe>/i
- html /<!-- (?:End )?Google Tag Manager -->/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Bank Of America, N. A.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/eddcard/Verify/ |
15 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
prepaid.bankofamerica.com/bundles/foundation/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
prepaid.bankofamerica.com/bundles/ |
290 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery
prepaid.bankofamerica.com/bundles/ |
103 KB 37 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preventEarlyClickCss
prepaid.bankofamerica.com/bundles/ |
45 B 175 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preventEarlyClick
prepaid.bankofamerica.com/bundles/ |
271 B 243 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foundation
prepaid.bankofamerica.com/bundles/ |
96 KB 24 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr
prepaid.bankofamerica.com/bundles/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Visa
prepaid.bankofamerica.com/bundles/ |
17 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dps
prepaid.bankofamerica.com/bundles/Visa/ |
9 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site.css
teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/content/PRC384/CP384-T03-019/_Styles/ |
66 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/content/PRC384/CP384-T03-019/_Images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EmailLogo.png
teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/content/PRC384/_images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
print
prepaid.bankofamerica.com/bundles/css/ |
2 KB 598 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gtm5445.html
teekadventures.com/omo/prepaid.bankofamerica.com/prepaid.bankofamerica.com/prepaid.bankofamerica.com/www.googletagmanager.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.woff
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Connections.woff
prepaid.bankofamerica.com/content/PRC384/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Bold-webfont.woff
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Connections.ttf
prepaid.bankofamerica.com/content/PRC384/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.ttf
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Bold-webfont.ttf
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Regular-webfont.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/content/PRC384/_Fonts/Connections.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Bold-webfont.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/content/PRC384/_Fonts/Connections.ttf
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Regular-webfont.ttf
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Bold-webfont.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)98 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated object| CultureInfoSettings function| $ function| jQuery function| Globalize function| preventSubmit object| respond object| Foundation object| html5 object| Modernizr function| ChangeCulture function| initializeNavigationButtons function| setFormUrl function| showValidationSummary function| hideValidationSummary function| removeSuccessMessage function| removeWarningMessage function| setModalWindow function| startTrackingAccessToken function| startTrackingSession function| setAccessTokenTimer function| setSessionTimer function| renewAccessToken function| showSessionModal function| clearTimers function| showActionAndMsg function| showInitial function| showExtended function| closeExtended function| showExpired function| showExtensionError function| expireSession function| expireSessionAtServer function| extendSession function| blinkTitle function| stopBlinkingTitle function| visaModalCaller function| setModalHeight function| handleDecrease function| decreaseTop function| squeezScrollArea function| squeezModal function| handleIncrease function| expandModal function| expandScrollArea function| increaseTop function| setReveal function| bindCloseModalEvents function| setModalFocus function| externalLinkModalForm function| formatString object| isMobile function| scrollToFormTop boolean| windowFocused number| sessionTimeout undefined| timerIntervalId undefined| blinkIntervalId undefined| accessTokenTimer string| title object| sessionModal object| sessionAction string| sessionActionInitialText undefined| sessionActionInitialOnclick object| sessionCancel string| sessionCancelInitialText undefined| sessionCancelInitialOnclick object| sessionHeading object| sessionClock object| sessionMsg boolean| clickSessionCancel boolean| debugging undefined| sessionTimeoutTimer object| visaModal undefined| prevHeight undefined| initialScrollAreaHeight undefined| initialModalHeight undefined| window_height undefined| modal_height undefined| scrollAreaHeight number| minScrollAreaHeight number| maxScrollAreaHeight undefined| room undefined| scrollArea number| bottomMargin boolean| decreasing undefined| modal number| currentTop number| minTop number| maxTop function| GlobalAlert function| resizeHeader function| Fingerprint object| dataLayer boolean| requestIsRunning0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
prepaid.bankofamerica.com
teekadventures.com
prepaid.bankofamerica.com
104.18.9.148
50.87.248.119
15d47b23edd4de73c5ea59efb2c4abdff492e59e55cc551cee9e779a66d31645
3873678b4e73df0cbd0f4bb486596be833cb30507d3acb8e70424227d37661b7
3d094b29f25da23b88d0ee3e1dd9f02256f0ef8774446c26d2ade147d3f6ab6a
42a0994f945e96989c7b09cd6d4c08fced929ce73f63396a83b3f071720c3c49
48647dd88d430041f63e7f7674cd0576e0f2f84ed9310cdbf0cf8073e30d01e3
8332e9865442439990cc3f27b3e8a38c9b3bd5f548af382ae4fea0968181b4ff
8cdb11e45e5feb9caf122ce4ef454511465310d3d81f09fe29b34e9948677a8c
9125b08d73099fe6cc8ec181f39edc63439b48442010ec2635791578f9e3b4ed
9e83216908224ffbc39992a5e60f93ca21b8e2240ba28025ba679c4b70f7112d
ad62eb85667532488d032273c196c7ea1c10e0897223c4b66cd38b8c5e5215a4
bd5a980b909c066eaf41d0c88c8520859b9eadea5170fe318836f304f6c6c335
cf5b381a36797698b3b4a23090a14ebd63b4d2478f31be04d0bcbfd53d421b87
db86fe978fad3c304c1c8b6ab1f65f409c16137076caec52fdfba3a18fbeebdb
e384da2b74e0a93bfb683dca1c793fff75d2d71fdaaa3303f607bf1ffac32590