Scan report for "www.papilune.com"

Membership level: Free member
Summary

Found

4

Duration

1min 1sec

Date

2026-05-14

IP

18.208.88.157

Report
Nikto SSL scan (max 60 sec) (nikto -host www.papilune.com -ssl -maxtime 60)
- Nikto v2.6.0
---------------------------------------------------------------------------
+ Target IP:          18.208.88.157
+ Target Hostname:    www.papilune.com
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:           Subject:  /CN=papilune.com
                      CN:       papilune.com
                      SAN:      *.papilune.com, papilune.com
                      Ciphers:  TLS_AES_128_GCM_SHA256
                      Issuer:   /C=US/O=Let's Encrypt/CN=E7
+ Platform:           Unknown
+ Start Time:         2026-05-14 06:46:23 (GMT-4)
---------------------------------------------------------------------------
+ Server: Netlify
+ Multiple IPs found: 18.208.88.157, 98.84.224.111, 2600:1f18:16e:df01::259, 2600:1f18:16e:df01::258
+ [999100] /: Uncommon header(s) 'cache-status' found, with contents: "Netlify Edge"; hit.
+ No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped.
+ [999984] /: Server may leak inodes via ETags, header found with file /, inode: ed446b2bdde8f960bc3ffd7f513b5a6e, size: ssl, mtime: df. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ [999966] /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ [999992] /: Server is using a wildcard certificate: *.papilune.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Scan terminated: 0 errors and 4 items reported on the remote host
+ End Time:           2026-05-14 06:47:24 (GMT-4) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
www.papilune.com
Target IP
18.208.88.157
Scan method
Nikto SSL scan (max 60 sec)
Run command
nikto -host www.papilune.com -ssl -maxtime 60
Duration
Quick report
Scan date
14 May 2026 06:47
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID