- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 104.26.14.178, 104.26.15.178, 172.67.74.183, 2606:4700:20::681a:eb2, 2606:4700:20::681a:fb2, 2606:4700:20::ac43:4ab7 + Target IP: 104.26.14.178 + Target Hostname: vip-trk.o18a.com + Target Port: 80 + Start Time: 2026-02-11 21:16:29 (GMT-8) --------------------------------------------------------------------------- + Server: cloudflare + /: Retrieved via header: 1.1 google. + /: Uncommon header 'server-timing' found, with multiple values: (cfCacheStatus;desc="DYNAMIC",cfEdge;dur=4,cfOrigin;dur=52,). + /: An alt-svc header was found which is advertising HTTP/3. The endpoint is: ':443'. Nikto cannot test HTTP/3 over QUIC. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /robots.txt: Server may leak inodes via ETags, header found with file /robots.txt, inode: W/65, size: 64a96b6f8d19a, mtime: gzip. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418 + /robots.txt: contains 3 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt + /: Uncommon header 'proxy-status' found, with contents: Cloudflare-Proxy;error=http_request_error. + OPTIONS: Allowed HTTP Methods: HEAD, GET, POST, OPTIONS . + Scan terminated: 0 error(s) and 8 item(s) reported on remote host + End Time: 2026-02-11 21:17:30 (GMT-8) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested