Help
RSS
API
Feed
Maltego
Contact
Domain > handyhandouts.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-25
72.3.137.3
(
ClassC
)
Port 80
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/html; charsetutf-8Server: Microsoft-IIS/8.5X-AspNet-Version: 4.0.30319X-Powered-By: ASP.NETDate: Sun, 13 Aug 2023 23:16:59 GMTContent-Length: 16 !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml >head>title> Handy Handouts - FREE educational handouts for teachers and parents/title>link relstylesheet href/styles/global_font.css typetext/css mediaall />link relstylesheet href/styles/global_body.css typetext/css mediaall />link relstylesheet href/styles/global_print.css typetext/css mediaprint />link relstylesheet href/styles/global_screen.css typetext/css mediascreen />meta idMetaKeywords namekeywords contenteducational materials, handouts, autism, articulation, auditory processing, vocabulary, therapy, learning disabilities, grammar assessment, oral motor, apraxia, phonology, reading comprehension, iep, early intervention dyslexia />meta idMetaDescription namedescription contentSuper Duper� Publications Handy Handouts� are free, online educational handouts on a variety of special needs and educational topics. /> !-- Google Tag Manager --> script>(function(w,d,s,l,i){wlwl||;wl.push({gtm.start: new Date().getTime(),event:gtm.js});var fd.getElementsByTagName(s)0, jd.createElement(s),dll!dataLayer?&l+l:;j.asynctrue;j.src https://www.googletagmanager.com/gtm.js?id+i+dl;f.parentNode.insertBefore(j,f); })(window,document,script,dataLayer,GTM-M826FD4);/script> !-- End Google Tag Manager -->/head>body leftmargin0 rightmargin0 topmargin0 bottommargin0> !-- Google Tag Manager (noscript) --> noscript>iframe srchttps://www.googletagmanager.com/ns.html?idGTM-M826FD4 height0 width0 styledisplay:none;visibility:hidden>/iframe>/noscript> !-- End Google Tag Manager (noscript) --> form methodpost action./ idForm1>input typehidden name__VIEWSTATE id__VIEWSTATE value/wEPDwUJODA5NjM4NzU0D2QWAmYPZBYCAgMPZBYEAgEPZBYCZg8WAh4EaHJlZmQWAmYPFgIeA3NyYwUlL2ltYWdlcy9sYXlvdXQvcm90YXRpb24vcm90YXRpb240LnBuZ2QCAw9kFgICAQ9kFgJmDxYCHgtfIUl0ZW1Db3VudAIDFgYCAQ9kFgJmDxUFCTcvMjQvMjAyMwM2ODA3Tm8tUHJlcCtUaGVyYXB5K0FjdGl2aXR5JTNhK0hlbGxvK1N1bW1lciE
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]