www.vodafonerely.com Open in urlscan Pro
52.50.47.19  Public Scan

URL: https://www.vodafonerely.com/
Submission: On October 08 via automatic, source certstream-suspicious — Scanned from GB

Form analysis 1 forms found in the DOM

POST /Account/Login

<form action="/Account/Login" class="login-form" method="post" novalidate="novalidate"><input id="ClientIPAddress" name="ClientIPAddress" type="hidden" value="">
  <div class="form-group">
    <label class=" login-label" for="Email">Email</label>
    <input class="form-control  " data-val="true" data-val-email="The Email field is not a valid e-mail address." data-val-required="Email is required" id="Email" name="Email" type="text" value="">
    <span class="field-validation-valid login-label" data-valmsg-for="Email" data-valmsg-replace="true"></span>
  </div>
  <div class="form-group">
    <label class=" login-label" for="Password">Password</label>
    <input class="form-control" data-val="true" data-val-required="Password is required" id="Password" name="Password" type="password">
    <span class="field-validation-valid login-label" data-valmsg-for="Password" data-valmsg-replace="true"></span>
  </div>
  <div class="form-group">
    <input type="submit" value="Log in" class="pull-right login-btn">
  </div>
  <div class="form-group text-left">
    <a href="#" onclick="FnForgotPassword()"><u>Forgot password ?</u></a>
  </div>
  <input name="__RequestVerificationToken" type="hidden" value="NNHeWjK4cn7oYO20xyRwOsMse9g7jkyPUzLa2bmK19tA0osciJs42r7WcSiBD80075ELmXcwNWVmbhP38ID2bxP6ej50SkCGD_EZNHEoS6Y1"><input id="UTCOffset" name="UTCOffset" type="hidden" value="">
</form>

Text Content

VODAFONE RELY

S15 Revenue Library

Email
Password

Forgot password ?

This system is for the use of authorised users only in accordance with Vodafone
security policies and procedures. Individuals using this system without
authorisation or in excess of their authority are subject to sanctioning
procedures by Vodafone authorities and/or law enforcement officials.
Vodafone will not be responsible for any misuse or personal use of any kind, in
its information systems, and reserves the right for monitoring systems usage to
control abusive situations or security policy violations.