client.girls.fantasia24.ch Open in urlscan Pro
5.2.65.107  Public Scan

URL: https://client.girls.fantasia24.ch/
Submission: On August 31 via automatic, source certstream-suspicious

Form analysis 1 forms found in the DOM

POST /

<form action="/" style="margin-top: 30px" id="ClientIndexForm" method="post" accept-charset="utf-8">
  <div style="display:none;"><input type="hidden" name="_method" value="POST"></div>
  <div class="user-pass">
    <input name="data[Client][username]" id="username" placeholder="Benutzername" class="full" maxlength="255" type="text" required="required"><input name="data[Client][password]" id="password" placeholder="Passwort" class="full" type="password"
      required="required">
  </div>
  <p class="clearfix">
    <!--<span class="fl" style="line-height: 23px;">
                    <label class="choice" for="remember">
                        <input type="checkbox" id="remember" class="" value="1" name="remember"/>
                        Keep me logged in
                    </label>
                </span>-->
    <button type="submit" class="fr">Login</button>
  </p>
</form>

Text Content

EROSMANAGER LOGIN

Login

To Top