monitoring.owo.company Open in urlscan Pro
90.146.124.223  Public Scan

Submitted URL: https://monitoring.owo.company/
Effective URL: https://monitoring.owo.company/homelab/check_mk/login.py?_origtarget=index.py
Submission Tags: phishingrod
Submission: On June 13 via api from DE — Scanned from AT

Form analysis 1 forms found in the DOM

Name: loginPOST login.py

<form id="form_login" name="login" action="login.py" method="POST" enctype="multipart/form-data" class="login"><input value="90a21260-9151-47da-a471-dd7579425351" autocomplete="off" type="hidden" name="csrf_token"><input value="login"
    autocomplete="off" type="hidden" name="filled_in"><input value="1" autocomplete="off" type="hidden" name="_login"><input value="index.py" autocomplete="off" type="hidden" name="_origtarget">
  <table>
    <tbody>
      <tr>
        <td class="login_label"><label id="label_user" for="_username" class="legend">Username:</label></td>
        <td class="login_input"><input id="input_user" style="" type="text" name="_username" class="text" value=""></td>
      </tr>
      <tr>
        <td class="login_label"><label id="label_pass" for="_password" class="legend">Password:</label></td>
        <td class="login_input"><input id="input_pass" style="" type="password" name="_password" class="text" value=""></td>
      </tr>
    </tbody>
  </table>
  <div id="button_text"><input id="_login" value="Login" type="submit" name="_login" class="button hot"></div>
</form>

Text Content

Username:Password:


Version: 2.2.0p21 - © Checkmk GmbH