stcbeservices.com Open in urlscan Pro
173.214.177.136  Public Scan

Submitted URL: http://stcbeservices.com/extranet
Effective URL: https://stcbeservices.com/extranet/login2.php?accesscheck=%2Fextranet%2Findex.php
Submission Tags: advance fee fraud malicious bank Search All
Submission: On November 01 via api from ZA — Scanned from DE

Form analysis 1 forms found in the DOM

Name: form1POST /extranet/login2.php

<form class="login100-form validate-form" id="form1" name="form1" method="POST" action="/extranet/login2.php">
  <span class="login100-form-title p-b-34"><img src="image/logo.png" width="250" height="100" longdesc="login.php"> </span>
  <span class="login100-form-title p-b-34"> Account Login </span>
  <div class="wrap-input100 rs1-wrap-input100 validate-input m-b-20" data-validate="Type user name">
    <input id="username" class="input100" type="text" name="username" placeholder="User name">
    <span class="focus-input100"></span>
  </div>
  <div class="wrap-input100 rs2-wrap-input100 validate-input m-b-20" data-validate="Type password">
    <input class="input100" type="password" name="password" id="password" placeholder="Password">
    <span class="focus-input100"></span>
  </div>
  <div class="container-login100-form-btn">
    <button class="login100-form-btn"> Sign in </button>
  </div>
  <div class="w-full text-center p-t-27 p-b-239">
    <span class="txt1"> Forgot </span>
    <a href="#" class="txt2">
							User name / password?
						</a>
  </div>
  <div class="w-full text-center">
    <a href="new-user.php" class="txt3">
							Sign Up
						</a>
  </div>
</form>

Text Content

Account Login


Sign in
Forgot User name / password?
Sign Up