santander.zeus.vision Open in urlscan Pro
213.32.58.161  Public Scan

Submitted URL: http://santander.zeus.vision/
Effective URL: https://santander.zeus.vision/login
Submission Tags: phishing
Submission: On April 13 via api from ES — Scanned from FR

Form analysis 1 forms found in the DOM

POST https://santander.zeus.vision/login

<form method="POST" class="w-full pt-4" action="https://santander.zeus.vision/login">
  <input type="hidden" name="_token" value="WSr3nZoEdVgqSnl0XqrysMNPC36Wnz6wIdBCvBl5">
  <div class="flex flex-column align-middle mb-4">
    <div class="w-1/3">
      <label for="email" class="text-font-gray">E-Mail Address</label>
    </div>
    <div class="w-2/3">
      <input id="email" type="email" class="bg-box-aux w-full rounded text-font p-2" name="email" value="" required="" autocomplete="email" autofocus="">
    </div>
  </div>
  <div class="flex flex-column align-middle mb-4">
    <div class="w-1/3">
      <label for="password" class="text-font-gray">Password</label>
    </div>
    <div class="w-2/3">
      <input id="password" type="password" class="bg-box-aux w-full rounded text-font p-2 mb-2" name="password" required="" autocomplete="current-password">
    </div>
  </div>
  <div class="flex mb-4">
    <button type="submit" class="bg-box-aux rounded text-font px-10 py-2 float-right"> Login </button>
  </div>
</form>

Text Content

Login
E-Mail Address

Password

Login