grosscom.com
Open in
urlscan Pro
192.254.70.212
Malicious Activity!
Public Scan
Submission: On April 03 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 31st 2024. Valid for: 3 months.
This is the only time grosscom.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 192.254.70.212 192.254.70.212 | 31863 (DACEN-2) (DACEN-2) | |
3 | 104.21.234.231 104.21.234.231 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 139.71.113.91 139.71.113.91 | 6307 (AMERICAN-...) (AMERICAN-EXPRESS) | |
3 | 23.37.49.89 23.37.49.89 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 104.102.52.74 104.102.52.74 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
10 | 6 |
ASN6307 (AMERICAN-EXPRESS, US)
PTR: cdaas11.americanexpress.com
cdaas.americanexpress.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-37-49-89.deploy.static.akamaitechnologies.com
www.aexp-static.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-102-52-74.deploy.static.akamaitechnologies.com
www.americanexpress.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
aexp-static.com
www.aexp-static.com — Cisco Umbrella Rank: 13074 |
108 KB |
3 |
githack.com
rawcdn.githack.com — Cisco Umbrella Rank: 74547 |
140 KB |
2 |
americanexpress.com
cdaas.americanexpress.com — Cisco Umbrella Rank: 31329 www.americanexpress.com — Cisco Umbrella Rank: 14397 |
13 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 234 |
27 KB |
1 |
grosscom.com
grosscom.com |
3 KB |
10 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.aexp-static.com |
rawcdn.githack.com
|
3 | rawcdn.githack.com |
grosscom.com
|
1 | www.americanexpress.com | |
1 | cdaas.americanexpress.com |
rawcdn.githack.com
|
1 | cdnjs.cloudflare.com |
grosscom.com
|
1 | grosscom.com | |
10 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
grosscom.com R3 |
2024-03-31 - 2024-06-29 |
3 months | crt.sh |
githack.com GTS CA 1P5 |
2024-03-01 - 2024-05-30 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
cdaas.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-10-11 - 2024-10-09 |
a year | crt.sh |
m.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2024-03-06 - 2025-03-06 |
a year | crt.sh |
www.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-08-03 - 2024-08-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://grosscom.com/default/
Frame ID: 8435BAF49296B1478657264DB3E8D8C4
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
American Express |Detected technologies
Amex Express Checkout (Payment processors) ExpandDetected patterns
- aexp-static\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
grosscom.com/default/ |
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
oce-min.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
285 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
oce-fonts.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
207 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
oce-font.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
104 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amex-desktop-logo.png
cdaas.americanexpress.com/myca/oce/latest/content/images/common/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0fababca-4914-46dd-9b0f-efbd51f67ae8-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3be50273-0b2e-4aef-ae68-882eacd611f9-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dls-icons.woff
www.aexp-static.com/cdaas/one/statics/axp-dls/5.10.1/package/dist/iconfont/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.americanexpress.com/ |
1 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onpagereveal function| $ function| jQuery function| _0x19d3 function| _0x295cb5 function| _0x55de0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdaas.americanexpress.com
cdnjs.cloudflare.com
grosscom.com
rawcdn.githack.com
www.aexp-static.com
www.americanexpress.com
104.102.52.74
104.17.25.14
104.21.234.231
139.71.113.91
192.254.70.212
23.37.49.89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