Analyze Your Site

  1. Vulnerability Scanner
  2. Identify servers and software
  3. Detect XSS vulnerabilities
Visibility:
Scan method:
[scan_method]
Some firewalls blocks Nikto. For get true positive results add nikto.online IP addresses (172.96.166.66-172.96.166.70 or CIDR 172.96.166.64/29) to the whitelist

Recent scan history

Site address Scan method Site IP Duration Size Reported
www.amazon.com Nikto scan (max 60 sec) 108.138.129.109 61s 2.33 KB 10 item(s)
admission.psu.ac.th Nikto scan (max 60 sec) 202.29.147.193 61s 1.45 KB 5 item(s)
cybereye.io Nikto scan (max 60 sec) 31.43.160.6 61s 1.44 KB 5 item(s)
tomhayes.org.uk Nikto scan (max 60 sec) 141.193.213.21 61s 2.5 KB 14 item(s)
nucleus.niituniversity.in Nikto scan (max 60 sec) 20.219.206.11 61s 1.48 KB 5 item(s)
www.photoacompanhantes.com Nikto scan (max 60 sec) 104.16.128.154 99s 2.08 KB 8 item(s)
www.amazon.com Nikto scan (max 60 sec) 23.56.210.140 32s 2.63 KB 10 item(s)
cirrusresearch.com Nikto scan (max 60 sec) 104.17.15.101 94s 2.11 KB 9 item(s)
staging.flockpoint.net Nikto scan (max 60 sec) 172.67.211.131 81s 2.23 KB 9 item(s)
glsc.gov.gy Nikto scan (max 60 sec) 192.124.249.127 90s 1.07 KB 4 item(s)

All the Features

Discover a comprehensive platform designed for ultimate flexibility and security. Packed with premium features, this solution empowers your team to tackle vulnerabilities efficiently while enhancing customer communication.

Accessible on Any Device

Dedicated Customer Support

Domain subversion detect

Protocol check

Sensitive file check

Sensitive info check

Misconfig detect

Test page scan

CSRF token check

SSL cert validation

Server obfuscation

HTTP methods test

Banner grab

No Installation Required

Effortless Scalability

Intuitive Dashboard

Seamless API Integrations

Redirect handling

XSS detect

Response handle

Error detect

Error log check

Robots.txt parse

HTTP options scan

Insecure HTTP headers

Config check

Vulnerability scan

Outdated server check

Risky file detection

Information Disclosure

Server software scan

SSL check

Web server ID

Server version ID

Framework check

Language path scan

CVE monitor

Temp file detect

Backup file check

Default file check

Directory traversal check

Full scan coverage

SSL/TLS check

Cookies check

Nikto Online

Why nikto.online?

With Nikto Online Scanner, you can swiftly assess the security of your web servers. 

Web-Based Operation

Perform all tasks directly from the web interface. No need for complex setups or installations. Simply access our platform online and conduct security checks conveniently from any device with internet access.

Intuitive Interface

Run Nikto security scanner tool without needing to know any commands. Our user-friendly interface allows you to initiate scans effortlessly, even without extensive technical knowledge.

Latest Updates

Stay ahead of emerging threats by checking security with the latest updates. Our platform ensures that you are equipped with the most up-to-date vulnerability signatures and detection techniques, enhancing the effectiveness of your security assessments.

Useful Links

  • Online SQL injection tool (sqlmap.online)
  • Online Port scanner (portscanner.online)
  • Simulate DDoS Attack Online (ddosattack.online)
  • Online Wordpress Security Scanner (wpscan.online)

Latest Cybersecurity News & Insights

Explore recent news, in-depth articles, and expert analysis on vulnerability scanning, penetration testing, and emerging attacks.

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

The hackers targeted LayerZero’s DVN, compromising certain RPCs and DDoSing others to ...

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new ...

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

A critical security vulnerability has been disclosed in SGLang that, if successfully ...

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context ...

Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be ...

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi ...

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are exploiting three recently disclosed security flaws ...

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Other noteworthy stories that might have slipped under the radar: ShinyHunters targets ...