Scan report for "reptsec.com"

Membership level: Free member
Summary

Found

-

Duration

45sec

Date

2024-06-22

IP

-

Report
Nikto scan (max 60 sec) (nikto -host reptsec.com -maxtime 60)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 191.96.144.133, 2a02:4780:1d:fe2e:c499:9173:b643:4b04
+ Target IP:          191.96.144.133
+ Target Hostname:    reptsec.com
+ Target Port:        80
+ Start Time:         2024-06-22 17:49:57 (GMT-4)
---------------------------------------------------------------------------
+ Server: hcdn
+ /: Uncommon header 'platform' found, with contents: hostinger.
+ /: Uncommon header 'x-hcdn-cache-status' found, with contents: HIT.
+ /: Uncommon header 'x-hcdn-request-id' found, with contents: b9889ef563cc3df0d4f855b679a7c13c-bos-edge2.
+ /: An alt-svc header was found which is advertising HTTP/3. The endpoint is: ':443'. Nikto cannot test HTTP/3 over QUIC. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc
+ Root page / redirects to: https://reptsec.com/
+ /IeGTRz0M.pw: Uncommon header 'x-hcdn-upstream-rt' found, with contents: 0.123.
+ /IeGTRz0M.exe: Uncommon header 'x-turbo-charged-by' found, with contents: LiteSpeed.
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Scan terminated: 20 error(s) and 7 item(s) reported on remote host
+ End Time:           2024-06-22 17:50:42 (GMT-4) (45 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Online Nikto scanner - Online Nikto web server scanner | Product Hunt
Detailed report
Target
reptsec.com
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host reptsec.com -maxtime 60
Scan time
45s
Quick report
Order full scan ($79/one time)
Scan date
22 Jun 2024 17:50
Copy scan report
Download report
Remove scan result
$
Check ports
Use Portscanner Tool