ckrtransportation.com
Open in
urlscan Pro
69.49.229.176
Malicious Activity!
Public Scan
Submitted URL: https://theotrgroup.com/enet/browse/index.php?_user=test.test%40test
Effective URL: https://ckrtransportation.com/css/e/JP/webmail.php?_user=test.test@test
Submission Tags: falconsandbox
Submission: On February 02 via api from US — Scanned from DE
Effective URL: https://ckrtransportation.com/css/e/JP/webmail.php?_user=test.test@test
Submission Tags: falconsandbox
Submission: On February 02 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form method="post" data-action="./auth.php" class="loginform">
<input type="hidden" name="_token" value="a1eab877edf7138194c58532561c0b45">
<input type="hidden" name="_task" value="login"><input type="hidden" name="_action" value="login"><input type="hidden" name="_timezone" id="rcmlogintz" value="_default_"><input type="hidden" name="_url" id="rcmloginurl" value="">
<table summary="" border="0">
<tbody>
<tr>
<td class="title"><label for="rcmloginuser">Username</label>
</td>
<td class="input"><input name="_user" id="_user" required="required" type="text" pattern="[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,}$" value="test.test@test" title="EMAIL"></td>
</tr>
<tr>
<td class="title"><label for="rcmloginpwd">Password</label>
</td>
<td class="input"><input name="_pass" id="_pass" required="required" type="password" pattern=".{4,50}" title="PASSWORD"></td>
</tr>
</tbody>
</table>
<center><input name="check_save_user" id="cookie_check_flg" type="checkbox">
<label for="rcmloginpwd">
<font color="#666">メールアドレスを保存する</font>
</label>
</center>
<font color="#ff0000">
<p id="thunderfire" style="text-align:center;display:none;">パスワードが正しくありません。もう一度ログインしてください。</p>
</font>
<p class="formbuttons"><input type="submit" id="rcmloginsubmit" class="button mainaction" value="Login"></p>
</form>
Text Content
Welcome to Webmail Username Password メールアドレスを保存する パスワードが正しくありません。もう一度ログインしてください。 Loading... Warning: This webmail service requires Javascript! In order to use it please enable Javascript in your browser's settings.