Scan report for "superlandiaa.com"
Nikto scan (max 60 sec) (nikto -host superlandiaa.com -maxtime 60)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 45.87.42.74, 2606:4700:3031::6815:4ba3, 2606:4700:3036::ac43:b2bd
+ Target IP: 45.87.42.74
+ Target Hostname: superlandiaa.com
+ Target Port: 80
+ Start Time: 2024-09-18 19:51:10 (GMT-4)
---------------------------------------------------------------------------
+ Server: cloudflare++ /: Uncommon header 'x-turbo-charged-by' found, with+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /: Server may leak inodes via ETags, header found with file /, inode: 2f, size: 66b9d6d1, mtime: 16258802e4548b61;;;. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ /: The X+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ : Server banner changed from 'cloudflare' to 'LiteSpeed'.
+ /: Server may leak inodes via ETags, header found with file /, inode: 2f, size: 66b9d6d1, mtime: 16258802e4548b61;+ Scan terminated: 20 error(s) and 2 item(s) reported on remote host
+ End Time: 2024-09-18 19:52:07 (GMT-4) (57 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Scan terminated: 20 error(s) and 5 item(s) reported on remote host
+ End Time: 2024-09-18 19:52:07 (GMT-4) (57 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
-
Target
superlandiaa.com
-
Scan method
Nikto scan (max 60 sec)
-
Run command
nikto -host superlandiaa.com -maxtime 60
-
Scan time
-
Quick report
-
Scan date
18 Sep 2024 19:52
-
Copy scan report
-
Download report
-
Remove scan result
We use cookies to ensure you get the best experience on our website.
Cookie policy