Scan report for "www.msn.com"

Membership level: Free member
Summary

Found

24

Duration

1min 22sec

Date

2025-02-28

IP

204.79.197.203

Report
Nikto scan (max 60 sec) (nikto -host www.msn.com -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          204.79.197.203
+ Target Hostname:    www.msn.com
+ Target Port:        80
+ Start Time:         2025-02-28 12:42:29 (GMT-8)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ /: Uncommon header 'x-msedge-ref' found, with contents: Ref A: 42D1150D89CD42B99576BA8CEF101D42 Ref B: LAXEDGE1816 Ref C: 2025-02-28T20:42:29Z.
+ Root page / redirects to: https://www.msn.com/
+ /Pbelcaht.aspx: Uncommon header 'x-ceto-origin-forwardonerror' found, with contents: https://staticview.msn.com.
+ /Pbelcaht.aspx: Cookie  created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /Pbelcaht.aspx: Cookie sptmarket created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /Pbelcaht.aspx: Cookie MUID created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /robots.txt: IP address found in the 'akamai-server-ip' header. The IP is "23.221.51.24". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed
+ /robots.txt: IP address found in the 'akamai-request-bc' header. The IP is "23.221.51.24". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed
+ /robots.txt: Uncommon header 'x-ms-lease-status' found, with contents: unlocked.
+ /robots.txt: Uncommon header 'server-timing' found, with contents: clientrtt; dur=27, clienttt; dur=0, origin; dur=0, cdntime; dur=0, wpo;dur=0,1s;dur=0.
+ /robots.txt: Uncommon header 'x-ms-request-id' found, with contents: 205fd0f8-b01e-0085-61cc-8996a0000000.
+ /robots.txt: Uncommon header 'x-ms-version' found, with contents: 2009-09-19.
+ /robots.txt: Uncommon header 'x-ms-blob-type' found, with contents: BlockBlob.
+ /robots.txt: Uncommon header 'akamai-grn' found, with contents: 0.1833dd17.1740775353.88615d0c.
+ /robots.txt: Uncommon header 'akamai-server-ip' found, with contents: 23.221.51.24.
+ /robots.txt: Uncommon header 'akamai-cache-status' found, with contents: Hit from child.
+ /robots.txt: Uncommon header 'akamai-request-id' found, with contents: 88615d0c.
+ /robots.txt: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /robots.txt: contains 36 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /%3f.jsp:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /%3f.jsp: Uncommon header 'x-ceto-ref' found, with contents: 67c21fc79b444fa1b388f4dda0fd85d0|AFD:39A882299F6643A6B311C36BAD793C09|2025-02-28T20:42:47.079Z.
+ /%3f.jsp: Uncommon header 'x-fabric-cluster' found, with contents: pmeprodwus.
+ /config/: Uncommon header 'x-ccc' found, with contents: US.
+ /config/: Uncommon header 'x-azure-externalerror' found, with contents: 0x830c100a, WinHTTP could not parse the origin response.
+ /config/: Uncommon header 'x-cid' found, with contents: 7.
+ Scan terminated: 2 error(s) and 24 item(s) reported on remote host
+ End Time:           2025-02-28 12:43:51 (GMT-8) (82 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
www.msn.com
Target IP
204.79.197.203
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host www.msn.com -maxtime 60
Duration
Quick report
Scan date
28 Feb 2025 15:43
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID