monzar.myqnapcloud.com
Open in
urlscan Pro
77.247.225.90
Public Scan
Submitted URL: http://monzar.myqnapcloud.com/
Effective URL: http://monzar.myqnapcloud.com/login.html?key=TO3kh88QnfZI04go9so7UVolq0M24r542MfqXRLciG18gefhE2YX8njUsqMF1Ebd
Submission Tags: @phish_report
Submission: On July 28 via api from FI — Scanned from FI
Effective URL: http://monzar.myqnapcloud.com/login.html?key=TO3kh88QnfZI04go9so7UVolq0M24r542MfqXRLciG18gefhE2YX8njUsqMF1Ebd
Submission Tags: @phish_report
Submission: On July 28 via api from FI — Scanned from FI
Form analysis
1 forms found in the DOMName: form1 — GET mlogin.get
<form action="mlogin.get" method="get" name="form1">
<div align="center">
<script language="JavaScript" type="text/javascript" src="md5.js"></script> Account<br>
<input name="account" type="text" id="account" maxlength="36">
<br> Password <br>
<input name="passwd" type="password" id="passwd" maxlength="36">
<br>
<input name="key" type="hidden" id="key" value="TO3kh88QnfZI04go9so7UVolq0M24r542MfqXRLciG18gefhE2YX8njUsqMF1Ebd">
<script language="JavaScript" type="text/javascript">
var idx = location.href.search("key");
document.form1.key.value = location.href.substring(idx + 4);
</script>
<input name="Submit" type="submit" value="Login" onclick="document.form1.passwd.value = hmac_digest(document.form1.key.value, document.form1.passwd.value)">
</div>
</form>
Text Content
Account Password