fake-client-staging-release.odoo-host.de
Open in
urlscan Pro
195.201.236.103
Public Scan
Submitted URL: https://fake-client-staging-release.odoo-host.de/
Effective URL: https://fake-client-staging-release.odoo-host.de/web/login
Submission: On July 23 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://fake-client-staging-release.odoo-host.de/web/login
Submission: On July 23 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST /web/login
<form class="oe_login_form" role="form" method="post" onsubmit="this.action = '/web/login' + location.hash" action="/web/login">
<input type="hidden" name="csrf_token" value="64d40a56fa762acaa85603dafb7470f9f83e8c19o1721663848">
<div class="form-group field-login">
<label for="login">Email</label>
<input type="text" placeholder="Email" name="login" id="login" required="required" autofocus="autofocus" autocapitalize="off" class="form-control ">
</div>
<div class="form-group field-password">
<label for="password">Password</label>
<input type="password" placeholder="Password" name="password" id="password" required="required" autocomplete="current-password" maxlength="4096" class="form-control ">
</div>
<div class="clearfix oe_login_buttons text-center mb-1 pt-3">
<button type="submit" class="btn btn-primary btn-block">Log in</button>
<div class="o_login_auth"></div>
</div>
<input type="hidden" name="redirect">
</form>
Text Content
Email Password Log in Manage Databases Powered by Odoo