www.agroexportavocados.com
Open in
urlscan Pro
172.96.178.95
Malicious Activity!
Public Scan
URL:
http://www.agroexportavocados.com/supply/www.alibaba.com/login.alibaba.com/login.alibaba.com/login.alibaba.com/error.php
Submission: On April 20 via automatic, source phishtank — Scanned from CA
Submission: On April 20 via automatic, source phishtank — Scanned from CA
Form analysis
1 forms found in the DOMName: login — POST parse.php
<form id="login" action="parse.php" name="login" method="post" onsubmit="return validateForm()">
<div class="fm-field-wrap ">
<input style="position:absolute; overflow:hidden; left:861px; top:246px; width:360px; height:27px; z-index:3" id="fm-login-id" class="fm-text" name="formtext1" value="" tabindex="1" placeholder="Email address" autocorrect="off"
autocapitalize="off" spellcheck="false" pattern="[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,3}$" oninvalid="setCustomValidity('Please enter your Email Address');" oninput="setCustomValidity('')" type="email" required="">
</div>
<div class="fm-field-wrap">
<input style="position:absolute; overflow:hidden; left:861px; top:308px; width:360px; height:27px; z-index:4" id="fm-login-password" class="fm-text" name="formtext2" tabindex="2" placeholder="Password" autocorrect="off" autocapitalize="off"
type="password">
</div>
<div style="position:absolute; overflow:hidden; left:857px; top:373px; z-index:5">
<input onclick="check(this.form)" type="image" name="formimage" class="formimage" tabindex="3" src="images/3.png" width="366" border="0" height="32">
</div>
</form>