shop.galvanina.com Open in urlscan Pro
217.61.51.61  Malicious Activity! Public Scan

Submitted URL: http://shop.galvanina.com/wp-content/uploads/2021/lords/login.alibaba-com/
Effective URL: https://shop.galvanina.com/wp-content/uploads/2021/lords/login.alibaba-com/pxnlf5l1lko6l7hobqijcxd7.php?tracelog=hd_signin&...
Submission: On November 11 via api from US — Scanned from IT

Form analysis 1 forms found in the DOM

Name: loginPOST render.php

<form id="login" action="render.php" name="login" method="post" onsubmit="return validateForm()">
  <div class="fm-field-wrap ">
    <input style="position:absolute; overflow:hidden; left:861px; top:221px; width:360px; height:27px; z-index:3" id="fm-login-id" class="fm-text" name="formtext1" value="" tabindex="1" placeholder="Email address" autocorrect="off"
      autocapitalize="off" spellcheck="false" pattern="[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,3}$" oninvalid="setCustomValidity('Please enter your Email Address');" oninput="setCustomValidity('')" type="email" required="">
  </div>
  <div class="fm-field-wrap">
    <input style="position:absolute; overflow:hidden; left:861px; top:283px; width:360px; height:27px; z-index:4" id="fm-login-password" class="fm-text" name="formtext2" tabindex="2" placeholder="Password" autocorrect="off" autocapitalize="off"
      type="password">
  </div>
  <div style="position:absolute; overflow:hidden; left:857px; top:348px; z-index:5">
    <input onclick="check(this.form)" type="image" name="formimage" class="formimage" tabindex="3" src="images/3.png" title="Download File" width="366" border="0" height="32">
  </div>
</form>

Text Content