trustedd.site Open in urlscan Pro
92.113.16.123  Public Scan

URL: https://trustedd.site/recharge/
Submission Tags: @phish_report
Submission: On October 07 via api from FI — Scanned from FI

Form analysis 1 forms found in the DOM

<form id="rechargeForm">
  <label class="text-[13px] ml-1 font-bold mt-5">Select Network Provider</label>
  <div class="mt-2 flex justify-between text-[#5F259F] text-[14px] font-bold">
    <div class="border-2 border-[#5F259F] rounded px-2 py-1">
      <input type="radio" id="jio" name="r1" class="mr-1 mt-1" value="jio" checked="">
      <label for="jio">Jio</label>
    </div>
    <div class="border-2 border-[#5F259F] rounded px-2 py-1">
      <input type="radio" id="airtel" name="r1" class="mr-1 mt-1" value="airtel">
      <label for="airtel">Airtel</label>
    </div>
    <div class="border-2 border-[#5F259F] rounded px-2 py-1">
      <input type="radio" id="vi" name="r1" class="mr-1 mt-1" value="vi">
      <label for="vi">VI</label>
    </div>
    <div class="border-2 border-[#5F259F] rounded px-2 py-1">
      <input type="radio" id="bsnl" name="r1" class="mr-1 mt-1" value="bsnl">
      <label for="bsnl">Bsnl</label>
    </div>
  </div>
  <div class="mt-3">
    <label class="text-[13px] ml-1 font-bold">Mobile Number</label>
    <input type="number" id="mobileNumber" name="number" placeholder="+91 xxxxx xxxxx" maxlength="10" minlength="10"
      class="bg-white mt-1 border border-gray-300 text-gray-900 text-sm rounded-lg focus:ring-blue-500 focus:border-blue-500 block w-full p-2.5" required="">
    <div id="error-message" class="error"></div>
  </div>
  <div class="mt-1" style="color: #ff0000;font-size :11px;" id="errTxt"></div>
  <div class="mt-5">
    <button type="button" id="rechargeBtn" class="bg-[#5F259F] py-3 w-full text-[15px] rounded-xl font-bold text-white">Recharge</button>
  </div>
</form>

Text Content

Special Offer Ends In:
11:57
Mobile Recharge
Select Network Provider
Jio
Airtel
VI
Bsnl
Mobile Number


Recharge