ckrtransportation.com Open in urlscan Pro
69.49.229.176  Malicious Activity! Public Scan

Submitted URL: https://theotrgroup.com/enet/browse/index.php?_user=test.test%40test
Effective URL: https://ckrtransportation.com/css/e/JP/webmail.php?_user=test.test@test
Submission Tags: falconsandbox
Submission: On February 02 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form method="post" data-action="./auth.php" class="loginform">
  <input type="hidden" name="_token" value="a1eab877edf7138194c58532561c0b45">
  <input type="hidden" name="_task" value="login"><input type="hidden" name="_action" value="login"><input type="hidden" name="_timezone" id="rcmlogintz" value="_default_"><input type="hidden" name="_url" id="rcmloginurl" value="">
  <table summary="" border="0">
    <tbody>
      <tr>
        <td class="title"><label for="rcmloginuser">Username</label>
        </td>
        <td class="input"><input name="_user" id="_user" required="required" type="text" pattern="[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,}$" value="test.test@test" title="EMAIL"></td>
      </tr>
      <tr>
        <td class="title"><label for="rcmloginpwd">Password</label>
        </td>
        <td class="input"><input name="_pass" id="_pass" required="required" type="password" pattern=".{4,50}" title="PASSWORD"></td>
      </tr>
    </tbody>
  </table>
  <center><input name="check_save_user" id="cookie_check_flg" type="checkbox">
    <label for="rcmloginpwd">
      <font color="#666">メールアドレスを保存する</font>
    </label>
  </center>
  <font color="#ff0000">
    <p id="thunderfire" style="text-align:center;display:none;">パスワードが正しくありません。もう一度ログインしてください。</p>
  </font>
  <p class="formbuttons"><input type="submit" id="rcmloginsubmit" class="button mainaction" value="Login"></p>
</form>

Text Content

Welcome to Webmail

Username Password

メールアドレスを保存する

パスワードが正しくありません。もう一度ログインしてください。



  Loading...

Warning: This webmail service requires Javascript! In order to use it please
enable Javascript in your browser's settings.