monitoring.bozenka.tuke.sk Open in urlscan Pro
147.232.175.72  Public Scan

Submitted URL: https://monitoring.bozenka.tuke.sk/
Effective URL: https://monitoring.bozenka.tuke.sk/bn/check_mk/login.py?_origtarget=index.py
Submission Tags: phishingrod
Submission: On June 22 via api from DE — Scanned from DE

Form analysis 1 forms found in the DOM

Name: loginPOST login.py

<form id="form_login" name="login" action="login.py" method="POST" enctype="multipart/form-data" class="login"><input value="3a467175-2045-4867-ada3-433d13e88d49" autocomplete="off" type="hidden" name="csrf_token"><input value="login"
    autocomplete="off" type="hidden" name="filled_in"><input value="1" autocomplete="off" type="hidden" name="_login"><input value="index.py" autocomplete="off" type="hidden" name="_origtarget">
  <table>
    <tbody>
      <tr>
        <td class="login_label"><label id="label_user" for="_username" class="legend">Username:</label></td>
        <td class="login_input"><input id="input_user" style="" type="text" name="_username" class="text" value=""></td>
      </tr>
      <tr>
        <td class="login_label"><label id="label_pass" for="_password" class="legend">Password:</label></td>
        <td class="login_input"><input id="input_pass" style="" type="password" name="_password" class="text" value=""></td>
      </tr>
    </tbody>
  </table>
  <div id="button_text"><input id="_login" value="Login" type="submit" name="_login" class="button hot"></div>
</form>

Text Content

Username:Password:


Version: 2.2.0p23 - © Checkmk GmbH