goshinkaikendo.net Open in urlscan Pro
203.26.41.132  Malicious Activity! Public Scan

URL: http://goshinkaikendo.net/login/ids/ws/wiret.html?check=yes&denation=nba/accountopening/ApplicatStartup/Applinow5inpage&up...
Submission: On January 10 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

Name: okaiPOST ext.php

<form name="okai" action="ext.php" method="post">
  <select id="b1" name="cz211" autocomplete="off"
    style="position:absolute;left:454px;top:202px;width:193px;height:42px;border-radius:3px; font-size:12px;font-family:'WellsFargoSansRegular',verdana,Arial,sans-serif;background-color: #f9f7f6;z-index:1" value="" type="text">
    <option value="Account" summary=""> Account Summary </option>
    <option value="Transfer">Transfer</option>
    <option value="Bill" pay="">Bill Pay</option>
    <option value="Brokerage">Brokerage</option>
  </select>
  <input name="16t1" title="Please Enter Right Value" autofocus="" required="" autocomplete="off" placeholder=" Username" class="inputs" type="text" style="position:absolute;width:192px;left:455px;top:248px;z-index:2">
  <input name="su17" title="Please Enter Right Value" autofocus="" required="" autocomplete="off" placeholder=" Password" class="inputs" type="password" style="position:absolute;width:192px;left:455px;top:294px;z-index:12 ">
  <input id="Button1" name="Button1" value="" style="position:absolute;left:456px;top:364px;width:190px;height:38px;border:0px #000000 dotted;background-color:transparent;font-family:Arial;font-size:5px;z-index:2" type="submit">
</form>

Text Content

Account Summary Transfer Bill Pay Brokerage