billing-rr2.uglyslug.com
Open in
urlscan Pro
148.66.249.13
Public Scan
Submitted URL: https://billing-rr2.uglyslug.com/
Effective URL: https://billing-rr2.uglyslug.com/r/login
Submission: On October 17 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://billing-rr2.uglyslug.com/r/login
Submission: On October 17 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://billing-rr2.uglyslug.com/r/loginauth
<form method="post" action="https://billing-rr2.uglyslug.com/r/loginauth" class="round">
<div class="login_fields">
<div class="field">
<label for="email">Email Address</label>
<input type="text" name="username" value="" id="email" tabindex="1" placeholder="enter your email address or username">
</div>
<div class="field">
<label for="password">Password <!-- this shows if you're in sandbox mode (still testing) OR if the portal is enabled -->
<small><a href="https://billing-rr2.uglyslug.com/r/reset">Forgot Password?</a></small>
</label>
<input type="password" name="password" value="" id="password" tabindex="2" placeholder="password" autocomplete="off">
</div>
</div> <!-- .login_fields -->
<input type="hidden" name="csrf_token" value="5a6d557985030ae118501dd2bf0f9a576a975bb9">
<div class="login_actions">
<button type="submit" class="btn btn-primary" tabindex="3">Log In</button>
<br>
<br>
</div>
</form>
Text Content
CUSTOMER PORTAL Email Address Password Forgot Password? Log In