persist-efile.hud.gov
Open in
urlscan Pro
64.132.40.128
Public Scan
Submitted URL: https://persist-efile.hud.gov/etk-hud-persist-prod/
Effective URL: https://persist-efile.hud.gov/etk-hud-persist-prod/login.request.do
Submission: On December 22 via manual from US — Scanned from DE
Effective URL: https://persist-efile.hud.gov/etk-hud-persist-prod/login.request.do
Submission: On December 22 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMName: signonForm — POST /etk-hud-persist-prod/login.submit.do
<form name="signonForm" method="post" action="/etk-hud-persist-prod/login.submit.do">
<div><input type="hidden" name="org.apache.struts.taglib.html.TOKEN" value="124ddcb8cbdc839730a02ed97214a2f8"></div><input type="hidden" name="service" value="">
<p>
<label for="username" accesskey="u">
<span>Username</span>
<input type="text" name="username" id="username" placeholder="Username" size="20" maxlength="255" aria-label="Please enter your username">
</label>
<label for="password" accesskey="p">
<span>Password</span>
<input type="password" name="password" id="password" size="20" maxlength="255" placeholder="Password" aria-label="Please enter your password">
</label>
</p>
<p>
<input type="submit" id="submit" aria-describedby="policy security-notice" value="Sign On" class="button">
</p>
</form>
Text Content
By signing on to this system you are agreeing to follow the stated security policy. Username Password SECURITY POLICY This computer system and all related equipment, networks, and network devices contains data belonging to the U.S. Government, and is provided for use by authorized personnel only. To facilitate protection against unauthorized access, and to verify operational security, this computer may be monitored for all lawful purposes, including ensuring that its use is authorized. During monitoring, system usage may be examined, recorded, and subject to audit. All activities and information, including personal information, associated with the use of this system may be monitored and recorded. Use of this computer system, authorized or unauthorized, constitutes consent to monitoring and recording. Misuse or unauthorized use is strictly prohibited and may subject you to criminal prosecution. Evidence of misuse collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system implies understanding of these terms and conditions. Authority: U.S. Federal Criminal Code (18 USC 1030 Fraud and Related Activity with Computers), Privacy Act of 1974, and HUD Information Technology Security Policy 2400.25.