Scan report for "iplocate.social"

Membership level: Free member
Summary

Found

6

Duration

1min 1sec

Date

2025-05-04

IP

104.21.4.25

Report
Nikto scan (max 60 sec) (nikto -host iplocate.social -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Multiple IPs found: 104.21.4.25, 172.67.131.146, 2606:4700:3037::6815:419, 2606:4700:3033::ac43:8392
+ Target IP:          104.21.4.25
+ Target Hostname:    iplocate.social
+ Target Port:        80
+ Start Time:         2025-05-04 06:46:19 (GMT-7)
---------------------------------------------------------------------------
+ Server: cloudflare
+ /: Retrieved x-powered-by header: PHP/8.0.30.
+ /: Uncommon header 'server-timing' found, with contents: cfL4;desc="?proto=TCP&rtt=916&min_rtt=820&rtt_var=213&sent=24&recv=11&lost=0&retrans=0&sent_bytes=24760&recv_bytes=582&delivery_rate=15569892&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0".
+ /: An alt-svc header was found which is advertising HTTP/3. The endpoint is: ':443'. Nikto cannot test HTTP/3 over QUIC. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /iplocate.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html
+ /: Web Server returns a valid response with junk HTTP methods which may cause false positives.
+ Scan terminated: 0 error(s) and 6 item(s) reported on remote host
+ End Time:           2025-05-04 06:47:20 (GMT-7) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
iplocate.social
Target IP
104.21.4.25
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host iplocate.social -maxtime 60
Duration
Quick report
Scan date
04 May 2025 09:47
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID