Scan report for "flatjeep.com"

Membership level: Free member
Summary

Found

11

Duration

1min 1sec

Date

2026-04-08

IP

172.240.108.68

Report
Nikto scan (max 60 sec) (nikto -host flatjeep.com -maxtime 60)
- Nikto v2.6.0
---------------------------------------------------------------------------
+ Your Nikto installation is out of date.
+ Target IP:          172.240.108.68
+ Target Hostname:    flatjeep.com
+ Target Port:        80
+ Platform:           Unknown
+ Start Time:         2026-04-08 05:05:38 (GMT-4)
---------------------------------------------------------------------------
+ Server: nginx/1.21.6
+ Multiple IPs found: 172.240.108.68, 172.240.127.242, 172.240.108.84, 172.240.127.243, 172.240.108.76, 172.240.127.244, 172.240.127.234, 172.240.253.132
+ [999100] /: Uncommon header(s) 'x-request-id' found, with contents: c45cc181b49e9a8599875bd8d7b0faf2.
+ No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped.
+ [013587] /: Suggested security header missing: referrer-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
+ [013587] /: Suggested security header missing: permissions-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy
+ [013587] /: Suggested security header missing: content-security-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
+ [013587] /: Suggested security header missing: x-content-type-options. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
+ [999100] /actuator: Uncommon header(s) 'x-envoy-upstream-service-time' found, with contents: 1.
+ [999986] /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: Retrieved access-control-allow-origin header: *.
+ [000244] /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved. See: https://www.exploit-db.com/exploits/22513
+ [000684] /modules/My_eGallery/public/displayCategory.php: My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection. displayCategory.php calls imageFunctions.php without checking URL/location arguments. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6795
+ [001258] /level/16/level/16/exec//show/configuration: CISCO HTTP service allows remote execution of commands. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537
+ [003614] /at/: This might be interesting: potential country code (Austria).
+ Scan terminated: 0 errors and 11 items reported on the remote host
+ End Time:           2026-04-08 05:06:39 (GMT-4) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested


      *********************************************************************
      Portions of the server's headers (c45cc181b49e9a8599875bd8d7b0faf2) are not in
      the Nikto 2.6.0 database or are newer than the known string. Would you like
      to submit this information (*no server specific data*) to CIRT.net
      for a Nikto update (or you may email to sullo@cirt.net) (y/n)?
Detailed report
Target
flatjeep.com
Target IP
172.240.108.68
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host flatjeep.com -maxtime 60
Duration
Quick report
Scan date
08 Apr 2026 05:06
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID