monitoring.pixelpoint.at Open in urlscan Pro
178.255.158.68  Public Scan

Submitted URL: https://monitoring.pixelpoint.at/
Effective URL: https://monitoring.pixelpoint.at/mysite/check_mk/login.py?_origtarget=index.py
Submission Tags: phishingrod
Submission: On September 23 via api from DE — Scanned from AT

Form analysis 1 forms found in the DOM

Name: loginPOST login.py

<form id="form_login" name="login" action="login.py" method="POST" enctype="multipart/form-data" class="login"><input value="ffb4605b-e6e2-40ae-b9a3-b9cdb698af34" autocomplete="off" type="hidden" name="csrf_token"><input value="login"
    autocomplete="off" type="hidden" name="filled_in"><input value="1" autocomplete="off" type="hidden" name="_login"><input value="index.py" autocomplete="off" type="hidden" name="_origtarget">
  <div id="saml_button"><input id="_saml2_login_button" value="Login with Azure" onclick="location.href=&quot;saml_sso.py?RelayState=azure%2Cindex.py&quot;" type="button" name="_saml2_login_button" class="button buttonlink hot"></div>
  <h2 class="login_separator"><span>or</span></h2>
  <table>
    <tbody>
      <tr>
        <td class="login_label"><label id="label_user" for="_username" class="legend">Username:</label></td>
        <td class="login_input"><input id="input_user" style="" type="text" name="_username" class="text" value=""></td>
      </tr>
      <tr>
        <td class="login_label"><label id="label_pass" for="_password" class="legend">Password:</label></td>
        <td class="login_input"><input id="input_pass" style="" type="password" name="_password" class="text" value=""></td>
      </tr>
    </tbody>
  </table>
  <div id="button_text"><input id="_login" value="Login" type="submit" name="_login" class="button"></div>
</form>

Text Content

OR

Username:Password:


Website - Ticket System - © Checkmk GmbH