f-squad.com Open in urlscan Pro
202.226.39.180  Public Scan

Submitted URL: http://l.em.disneyemailexpress.com/rts/go2.aspx?h=5094&tp=i-H43-EX-De-7Pd-1n-eZfN-1c-7Oo-SkDsQ&x=em.yotpo.com/ls/click?upn=u001.-2F...
Effective URL: https://f-squad.com/georgetown/g*u/
Submission: On May 14 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST login.php

<form action="login.php" method="post">
  <fieldset class="form-element-wrapper">
    <label for="username">NetID</label>
    <input class="form-element form-field" id="username" name="j_username" value="" autofocus="">
  </fieldset>
  <fieldset class="form-element-wrapper">
    <label for="password">Password</label>
    <input class="form-element form-field" id="password" name="j_password" type="password" value="">
    <span id="password-toggle" class="password-icon toggle-password"></span>
  </fieldset>
  <div class="form-element-wrapper">
    <input class="form-element form-button" type="submit" name="_eventId_proceed" onclick="this.childNodes[0].nodeValue='Logging in, please wait...'" value="Sign in">
  </div>
  <p class="forgot-password">
    <a href="https://password.georgetown.edu">Forgot Password?</a>
  </p>
</form>

Text Content

NetID Password


Forgot Password?