This is what an attacker sees on their server after victims submit their credentials.
| Site Cloned | Email / Username | Password | Victim IP |
|---|---|---|---|
| No credentials harvested yet — go submit something on the phishing pages. | |||
In a real attack this data is emailed to the attacker in real time or stored in a database.