Scan report for "52.90.171.137"

Membership level: Free member
Summary

Found

4

Duration

1min 1sec

Date

2025-05-04

IP

52.90.171.137

Report
Nikto scan (max 60 sec) (nikto -host 52.90.171.137 -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          52.90.171.137
+ Target Hostname:    52.90.171.137
+ Target Port:        80
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /CN=*.intellipaat.com
                   Altnames: *.intellipaat.com, intellipaat.com
                   Ciphers:  ECDHE-RSA-AES256-GCM-SHA384
                   Issuer:   /C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA
+ Start Time:         2025-05-04 10:10:01 (GMT-7)
---------------------------------------------------------------------------
+ Server: nginx/1.18.0 (Ubuntu)
+ /: Link header found with value: <https://images.bigdataonlinetraining.us/wp-json/>; rel="https://api.w.org/". See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Link
+ /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /MKvfezR7.: Uncommon header 'x-redirect-by' found, with contents: WordPress.
+ Scan terminated: 0 error(s) and 4 item(s) reported on remote host
+ End Time:           2025-05-04 10:11:02 (GMT-7) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
52.90.171.137
Target IP
52.90.171.137
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host 52.90.171.137 -maxtime 60
Duration
Quick report
Scan date
04 May 2025 13:11
Copy scan report
Download report
Remove scan result
$
Check ports
Wordpress site
API - Scan ID