Help
RSS
API
Feed
Maltego
Contact
Domain > sdcoes.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-11-23
20.118.138.128
(
ClassC
)
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Date: Sun, 24 Sep 2023 10:27:07 GMTServer: Microsoft-IIS/10.0Cache-Control: no-cache, no-storePragma: no-cacheSet-Cookie: .AspNetCore.Antiforgery.cd !doctype html>html langen>head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta namedescription contentAccelerate your organizations cyberawareness education program with Red Herring, full-featured phishing simulation software. Red Herring is a system that sends simulated phishing emails and tracks the actions taken by the targeted users. It was developed by the San Diego County Office of Education in order to promote cybersecurity awareness amongst their users. It also enabled the County Office to identify users who were in need of additional cybersecurity awareness training on ways to identify phishing messages.> meta nameauthor contentSan Diego County Office of Education> title>SDCOE - Red Herring/title> link relicon href/favicon.png> !-- Bootstrap core CSS --> link hrefhttps://cdn.sdcoe.net/bootstrap/v4.3.1/css/bootstrap.css relstylesheet> link hrefhttps://cdn.sdcoe.net/fonts/Font-Awesome/css/all.min.css?cdv501 typetext/css relstylesheet /> link href/css/floating-labels.css typetext/css relstylesheet /> link href/css/index.css typetext/css relstylesheet /> !-- Google tag (gtag.js) --> script async srchttps://www.googletagmanager.com/gtag/js?idG-3YVYP6HKL0>/script> script> window.dataLayer window.dataLayer || ; function gtag() { dataLayer.push(arguments); } gtag(js, new Date()); gtag(config, G-3YVYP6HKL0); /script>script typetext/javascript>!function(T,l,y){var ST.location,kscript,DinstrumentationKey,Cingestionendpoint,IdisableExceptionTracking,Eai.device.,btoLowerCase,wcrossOrigin,NPOST,eappInsightsSDK,ty.name||appInsights;(y.name||Te)&&(Tet);var nTt||function(d){var g!1,f!1,m{initialize:!0,queue:,sv:5,version:2,config:d};function v(e,t){var n{},aBrowser;return nE+idab(),nE+typea,nai.operation.nameS&&S.pathname||_unknown_,nai.internal.sdkVersionjavascript:snippet_+(m.sv||m.version),{time:function(){var enew Date;function t(e){var t+e;return 1t.length&&(t0+t),t}return e.getUTCFullYear()+-+t(1+e.getUT
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]