billing-rr2.uglyslug.com Open in urlscan Pro
148.66.249.13  Public Scan

Submitted URL: https://billing-rr2.uglyslug.com/
Effective URL: https://billing-rr2.uglyslug.com/r/login
Submission: On October 17 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://billing-rr2.uglyslug.com/r/loginauth

<form method="post" action="https://billing-rr2.uglyslug.com/r/loginauth" class="round">
  <div class="login_fields">
    <div class="field">
      <label for="email">Email Address</label>
      <input type="text" name="username" value="" id="email" tabindex="1" placeholder="enter your email address or username">
    </div>
    <div class="field">
      <label for="password">Password <!-- this shows if you're in sandbox mode (still testing) OR if the portal is enabled -->
        <small><a href="https://billing-rr2.uglyslug.com/r/reset">Forgot Password?</a></small>
      </label>
      <input type="password" name="password" value="" id="password" tabindex="2" placeholder="password" autocomplete="off">
    </div>
  </div> <!-- .login_fields -->
  <input type="hidden" name="csrf_token" value="5a6d557985030ae118501dd2bf0f9a576a975bb9">
  <div class="login_actions">
    <button type="submit" class="btn btn-primary" tabindex="3">Log In</button>
    <br>
    <br>
  </div>
</form>

Text Content

CUSTOMER PORTAL

Email Address
Password Forgot Password?
Log In