monitoring.ioi.sh Open in urlscan Pro
217.61.6.161  Public Scan

URL: https://monitoring.ioi.sh/
Submission Tags: phishingrod
Submission: On December 24 via api from DE — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form class="form-signin text-center" method="POST"> <input type="hidden" name="csrf" value="0a3839d8fef78b4140078c8fba248fa15bfd979fdb5326400e295ae8996ceafb">
  <h1 class="h3 mb-3 font-weight-normal">Please sign in</h1>
  <label for="input-username" class="sr-only">Username</label>
  <input type="text" name="user_name" id="input-username" class="form-control" value="" placeholder="Username" required="" autofocus="">
  <label for="input-password" class="sr-only">Password</label>
  <input type="password" id="input-password" name="user_password" class="form-control" placeholder="Password" required="">
  <input type="hidden" name="action" value="login">
  <div class="custom-control custom-checkbox my-1 mr-sm-2">
    <input type="checkbox" name="user_rememberme" value="1" class="custom-control-input" id="input-rememberme">
    <label class="custom-control-label" for="input-rememberme">Remember me</label>
  </div>
  <button class="btn btn-lg btn-primary btn-block" type="submit">Login</button>
  <a class="btn" href="?action=forgot">Forgot password?</a>
</form>

Text Content

SERVER MONITOR

Javascript is disabled! PHP Server Monitor works best with JavaScript enabled!







PLEASE SIGN IN

Username Password
Remember me
Login Forgot password?
Powered by PHP Server Monitorv3.4.1. Back to top