Help
RSS
API
Feed
Maltego
Contact
Domain > www.nmcusd.org
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Organization
North Monterey County Unified School District
State
CA
Country
US
NameServer
ns2-ext.monterey.k12.ca.us
Created
2002-01-15 00:28:23
Changed
2018-10-14 07:19:48
Expires
2022-01-15 00:28:23
DNS Resolutions
Date
IP Address
2015-08-22
190.93.244.96
(
ClassC
)
2015-11-28
141.101.114.96
(
ClassC
)
2016-09-14
141.101.115.96
(
ClassC
)
2016-11-06
190.93.247.95
(
ClassC
)
2017-05-16
190.93.245.96
(
ClassC
)
2017-06-30
52.22.126.40
(
ClassC
)
2017-07-02
34.198.99.236
(
ClassC
)
2017-08-31
52.200.145.164
(
ClassC
)
2017-10-14
34.194.19.244
(
ClassC
)
2017-11-04
52.201.127.218
(
ClassC
)
2017-12-03
34.225.231.231
(
ClassC
)
2017-12-18
52.1.147.143
(
ClassC
)
2018-01-21
52.203.71.124
(
ClassC
)
2018-02-07
52.0.102.245
(
ClassC
)
2018-02-08
52.54.212.120
(
ClassC
)
2018-03-10
34.205.59.231
(
ClassC
)
2018-03-10
52.54.148.121
(
ClassC
)
2018-03-10
52.201.117.100
(
ClassC
)
2018-03-10
34.200.64.255
(
ClassC
)
2018-04-08
54.84.22.97
(
ClassC
)
2018-04-08
54.88.247.122
(
ClassC
)
2018-04-30
18.205.178.192
(
ClassC
)
2018-04-30
52.0.91.229
(
ClassC
)
2018-05-23
34.202.119.215
(
ClassC
)
2018-08-23
34.198.50.11
(
ClassC
)
2018-12-22
23.22.230.252
(
ClassC
)
2018-12-22
54.174.12.250
(
ClassC
)
2019-06-22
54.174.137.226
(
ClassC
)
2019-08-02
35.174.254.216
(
ClassC
)
2024-07-26
104.17.163.123
(
ClassC
)
2024-11-18
104.17.166.123
(
ClassC
)
2025-04-06
104.17.162.123
(
ClassC
)
Port 80
HTTP/1.1 302 FoundDate: Fri, 02 Aug 2019 07:40:03 GMTContent-Length: 17633Connection: keep-aliveCache-Control: privateLocation: https://www.nmcusd.org/Server: Microsoft-IIS/8.5Set-Cookie: PSNLjAVScvfF html>head>script typetext/javascript>window.NREUM||(NREUM{});NREUM.info {beacon:bam.nr-data.net,errorBeacon:bam.nr-data.net,licenseKey:e84461d315,applicationID:23252431,transactionName:Z1MEZEtSVkoFBxIKX14ZM0JQHGpWCxA,queueTime:0,applicationTime:110,agent:,atts:}/script>script typetext/javascript>(window.NREUM||(NREUM{})).loader_config{xpid:UQUPUFZACgACUVNWBAA};window.NREUM||(NREUM{}),__nr_requirefunction(t,n,e){function r(e){if(!ne){var one{exports:{}};te0.call(o.exports,function(n){var ote1n;return r(o||n)},o,o.exports)}return ne.exports}if(functiontypeof __nr_require)return __nr_require;for(var o0;oe.length;o++)r(eo);return r}({1:function(t,n,e){function r(t){try{s.console&&console.log(t)}catch(n){}}var o,it(ee),at(18),s{};try{olocalStorage.getItem(__nr_flags).split(,),console&&functiontypeof console.log&&(s.console!0,o.indexOf(dev)!-1&&(s.dev!0),o.indexOf(nr_dev)!-1&&(s.nrDev!0))}catch(c){}s.nrDev&&i.on(internal-error,function(t){r(t.stack)}),s.dev&&i.on(fn-err,function(t,n,e){r(e.stack)}),s.dev&&(r(NR AGENT IN DEVELOPMENT MODE),r(flags: +a(s,function(t,n){return t}).join(, )))},{},2:function(t,n,e){function r(t,n,e,r,s){try{p?p-1:o(s||new UncaughtException(t,n,e),!0)}catch(f){try{i(ierr,f,c.now(),!0)}catch(d){}}returnfunctiontypeof u&&u.apply(this,a(arguments))}function UncaughtException(t,n,e){this.messaget||Uncaught error with no additional information,this.sourceURLn,this.linee}function o(t,n){var en?null:c.now();i(err,t,e)}var it(handle),at(19),st(ee),ct(loader),ft(gos),uwindow.onerror,d!1,lnr@seenError,p0;c.features.err!0,t(1),window.onerrorr;try{throw new Error}catch(h){stackin h&&(t(8),t(7),addEventListenerin window&&t(5),c.xhrWrappable&&t(9),d!0)}s.on(fn-start,function(t,n,e){d&&(p+1)}),s.on(fn-err,function(t,n,e){d&&!el&&(f(e,l,function(){return!0}),this.thrown!0,o(e))}),s.on(fn-end,function(){d&&!this.thrown&&p>0&&(p-1)}),s.on(internal-error,function(t){i(ierr,t,c.now(),!0)})},{},3:function(t,n,e){t(loader).features.ins!0},{},4:function(t,n,e){function r(t){}if(window.performance&&window.performanc
Port 443
HTTP/1.1 302 FoundDate: Fri, 02 Aug 2019 07:40:03 GMTContent-Type: text/html; charsetutf-8Content-Length: 161Connection: keep-aliveCache-Control: privateLocation: /errors/500.aspx?aspxerrorpath/defaul html>head>title>Object moved/title>/head>body>h2>Object moved to a href/errors/500.aspx?aspxerrorpath/default.aspx>here/a>./h2>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]