Scan report for "netflix.com"

Membership level: Free member
Summary

Found

19

Duration

1min 1sec

Date

2025-06-03

IP

44.242.13.161

Report
Nikto scan (max 60 sec) (nikto -host netflix.com -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Multiple IPs found: 44.242.13.161, 52.38.7.83, 44.240.158.19, 2600:1f14:62a:de84:880a:88cc:a16:5423, 2600:1f14:62a:de83:c61a:d6e:18b0:65f7, 2600:1f14:62a:de85:d7:e7a1:8f7d:f6f5
+ Target IP:          44.242.13.161
+ Target Hostname:    netflix.com
+ Target Port:        80
+ Start Time:         2025-06-03 08:11:44 (GMT-7)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ /: Retrieved via header: 1.1 i-04f5e45dd3721fb4c (us-west-2).
+ /: Uncommon header 'x-netflix.nfstatus' found, with contents: 1_21.
+ /: Uncommon header 'x-netflix.proxy.execution-time' found, with contents: 1.
+ /: Uncommon header 'x-netflix-headerandcookie.profileguid.match' found, with contents: NA.
+ /: Uncommon header 'x-netflix-headerandmsl.profileguid.match' found, with contents: NA.
+ /: Uncommon header 'x-originating-url' found, with contents: http://netflix.com/.
+ /: Uncommon header 'x-netflix-cookieandmsl.profileguid.match' found, with contents: NA.
+ /: Cookie nfvdid created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ Root page / redirects to: https://netflix.com/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /clientaccesspolicy.xml contains 16 lines which should be manually viewed for improper domains or wildcards. See: https://www.acunetix.com/vulnerabilities/web/insecure-clientaccesspolicy-xml-file/
+ /crossdomain.xml contains 1 line which include the following domains: *.netflix.com . See: http://jeremiahgrossman.blogspot.com/2008/05/crossdomainxml-invites-cross-site.html
+ /dump.tar: Uncommon header 'x-b3-traceid' found, with contents: 683f10b9378c1cff3733c072d7ea16a5.
+ /dump.tar: Uncommon header 'x-netflix.request.toplevel.uuid' found, with contents: 5eeb0596-c3d7-41c0-8867-455f325696f3-377359169.
+ /dump.tar: Uncommon header 'x-request-id' found, with contents: ea7deeec-a568-43b3-bb25-6fbac8f4076a.
+ /dump.tar: Uncommon header 'x-netflix.execution-time' found, with contents: 1.
+ /dump.tar: Uncommon header 'x-envoy-decorator-operation' found, with contents: lo_svc.
+ /dump.tar: Uncommon header 'x-envoy-upstream-service-time' found, with contents: 0.
+ OPTIONS: Allowed HTTP Methods: GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS, SCRIPT .
+ HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.
+ HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.
+ Scan terminated: 1 error(s) and 19 item(s) reported on remote host
+ End Time:           2025-06-03 08:12:45 (GMT-7) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
netflix.com
Target IP
44.242.13.161
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host netflix.com -maxtime 60
Duration
Quick report
Scan date
03 Jun 2025 11:12
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID