user2.gut.cmu.team Open in urlscan Pro
49.49.14.81  Public Scan

Submitted URL: https://user2.gut.cmu.team/
Effective URL: https://user2.gut.cmu.team/login?next=%2Flab
Submission: On August 11 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST /login?next=%2Flab

<form action="/login?next=%2Flab" method="post" class="navbar-form pull-left">
  <input type="hidden" name="_xsrf" value="2|c8845af3|99c79e3f7616c05820c2cdd91ad77576|1660183085">
  <label for="password_input"><strong>Password:</strong></label>
  <input type="password" name="password" id="password_input" class="form-control">
  <button type="submit" class="btn btn-default" id="login_submit">Log in</button>
</form>

Text Content

Jupyter Server requires JavaScript.
Please enable it to proceed.

Password: Log in