citroya.com Open in urlscan Pro
173.82.240.113  Public Scan

URL: https://citroya.com/directpay/Login/login_user
Submission Tags: advance fee fraud malicious bank Search All
Submission: On August 27 via api from ZA

Form analysis 1 forms found in the DOM

POST https://citroya.com/directpay/Login

<form action="https://citroya.com/directpay/Login" method="post">
  <fieldset>
    <div class="control-group">
      <label class="control-label" for="user_name">Account Id</label>
      <div class="controls">
        <input type="text" name="u_name" class="input-large" id="user_name">
      </div>
    </div>
    <div class="control-group">
      <label class="control-label" for="pass_word">Password</label>
      <div class="controls">
        <input type="password" name="pass" class="keyboard form-control input-large is-keypad" id="number" readonly="readonly">
      </div>
    </div>
  </fieldset>
  <div class="pull-right">
    <input type="submit" id="login_btn" name="login" class="btn btn-warning" value="Login">
  </div>
</form>

Text Content

Preparing Account


LOGIN

HIGHLY RESTRICTED ENVIRONMENT

Select Language ▼
Account Id

Password


© State Bank of India. All rights reserved.
Home


ORIGINAL TEXT


Contribute a better translation

--------------------------------------------------------------------------------



123Close
456Clear
789Back

0