Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Target IP: 185.215.4.10 + Target Hostname: www.barnaultransmash.ru + Target Port: 80 + Start Time: 2025-06-08 10:32:59 (GMT-7) --------------------------------------------------------------------------- + Server: ddos-guard + /: Server may leak inodes via ETags, header found with file /, inode: W/1e38a, size: 63368738a3ea7, mtime: gzip. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418 + /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options + /: Uncommon header 'x-tilda-server' found, with contents: 27. + /: Uncommon header 'x-tilda-imprint' found, with contents: a45ae625-8abd-4248-86fc-8125e962814b. + /: Uncommon header 'x-ws-id' found, with contents: 13. + /: Uncommon header 'x-host' found, with contents: www.barnaultransmash.ru. + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /: Cookie __ddg8_ created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Cookie __ddg10_ created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Cookie __ddg9_ created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: IP address found in the '__ddg9_' cookie. The IP is "208.76.253.234". + Scan terminated: 0 error(s) and 11 item(s) reported on remote host + End Time: 2025-06-08 10:34:00 (GMT-7) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested