Found
Duration
Date
IP
- Nikto
---------------------------------------------------------------------------
+ Multiple IPs found: 44.242.60.85, 44.237.234.25, 44.234.232.238, 2600:1f14:62a:de85:d7:e7a1:8f7d:f6f5, 2600:1f14:62a:de84:880a:88cc:a16:5423, 2600:1f14:62a:de83:c61a:d6e:18b0:65f7
+ Target IP: 44.242.60.85
+ Target Hostname: netflix.com
+ Target Port: 80
+ Start Time: 2025-12-07 16:17:17 (GMT-8)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ /: Retrieved via header: 1.1 i-0354751b34d8d552a (us-west-2).
+ /: Uncommon header 'x-netflix-cookieandmsl.profileguid.match' found, with contents: NA.
+ /: Uncommon header 'x-netflix-headerandmsl.profileguid.match' found, with contents: NA.
+ /: Uncommon header 'x-netflix.nfstatus' found, with contents: 1_21.
+ /: Uncommon header 'x-netflix.proxy.execution-time' found, with contents: 1.
+ /: Uncommon header 'x-netflix-headerandcookie.profileguid.match' found, with contents: NA.
+ /: Uncommon header 'x-originating-url' found, with contents: http://netflix.com/.
+ /: Cookie nfvdid created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ Root page / redirects to: https://netflix.com/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /clientaccesspolicy.xml contains 16 lines which should be manually viewed for improper domains or wildcards. See: https://www.acunetix.com/vulnerabilities/web/insecure-clientaccesspolicy-xml-file/
+ /crossdomain.xml contains 1 line which include the following domains: *.netflix.com . See: http://jeremiahgrossman.blogspot.com/2008/05/crossdomainxml-invites-cross-site.html
+ /dump.tar: Uncommon header 'x-envoy-decorator-operation' found, with contents: lo_svc_http.
+ /dump.tar: Uncommon header 'x-netflix.execution-time' found, with contents: 0.
+ /dump.tar: Uncommon header 'x-netflix.request.toplevel.uuid' found, with contents: a9eb9398-86b1-4a8f-8dc2-bfa6ec8a3df2-212887983.
+ /dump.tar: Uncommon header 'x-b3-traceid' found, with contents: 6936191699936900def925bdf9e0b533.
+ /dump.tar: Uncommon header 'x-envoy-upstream-service-time' found, with contents: 0.
+ /dump.tar: Uncommon header 'x-request-id' found, with contents: 42c735f8-8748-4095-ba22-f2d7c3188c07.
+ OPTIONS: Allowed HTTP Methods: GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS, SCRIPT .
+ HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.
+ HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.
+ Scan terminated: 1 error(s) and 19 item(s) reported on remote host
+ End Time: 2025-12-07 16:18:18 (GMT-8) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested