Scan report for "www.alliancepain.com"

Membership level: Free member
Summary

Found

8

Duration

1min 1sec

Date

2025-03-20

IP

198.185.159.144

Report
Nikto scan (max 60 sec) (nikto -host www.alliancepain.com -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Multiple IPs found: 198.185.159.144, 198.49.23.144, 198.49.23.145, 198.185.159.145
+ Target IP:          198.185.159.144
+ Target Hostname:    www.alliancepain.com
+ Target Port:        80
+ Start Time:         2025-03-20 12:59:56 (GMT-7)
---------------------------------------------------------------------------
+ Server: Squarespace
+ /: Server may leak inodes via ETags, header found with file /, inode: W/0fe92428ecc4e6d99ec3bbefb6101786, size: , mtime: gzip. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ /: Uncommon header 'x-contextid' found, with contents: eO3oQHPE/YoLfEQGF.
+ /: Cookie crumb created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /CVd0WUxc.cgi: Uncommon header 'x-sqsp-edge' found, with contents: true.
+ /robots.txt: Entry '/search/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /robots.txt: contains 28 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /universal/default-favicon.ico: Retrieved access-control-allow-origin header: *.
+ /universal/default-favicon.ico: Uncommon header 'surrogate-key' found, with contents: universal.
+ Scan terminated: 0 error(s) and 8 item(s) reported on remote host
+ End Time:           2025-03-20 13:00:57 (GMT-7) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
www.alliancepain.com
Target IP
198.185.159.144
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host www.alliancepain.com -maxtime 60
Duration
Quick report
Scan date
20 Mar 2025 16:00
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID