invoiceplane01.learnit.study Open in urlscan Pro
5.134.7.34  Public Scan

Submitted URL: http://invoiceplane01.learnit.study/
Effective URL: https://invoiceplane01.learnit.study/index.php/sessions/login
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On March 31 via api from IT — Scanned from IT

Form analysis 1 forms found in the DOM

POST https://invoiceplane01.learnit.study/index.php/sessions/login

<form method="post" action="https://invoiceplane01.learnit.study/index.php/sessions/login">
  <input type="hidden" name="_ip_csrf" value="61d0dafc69ff100c5936edbfe5d9158b">
  <div class="form-group">
    <label for="email" class="control-label">E-mail</label>
    <input type="email" name="email" id="email" class="form-control" placeholder="E-mail" required="" autofocus="">
  </div>
  <div class="form-group">
    <label for="password" class="control-label">Wachtwoord</label>
    <input type="password" name="password" id="password" class="form-control" placeholder="Wachtwoord" required="">
  </div>
  <input type="hidden" name="btn_login" value="true">
  <button type="submit" class="btn btn-primary">
    <i class="fa fa-unlock fa-margin"></i> Inloggen </button>
  <a href="https://invoiceplane01.learnit.study/index.php/sessions/passwordreset" class="btn btn-default">
                Ik ben mijn wachtwoord vergeten            </a>
</form>

Text Content

Schakel Javascript in om InvoicePlane te gebruiken

E-mail
Wachtwoord
Inloggen Ik ben mijn wachtwoord vergeten