Scan report for "fxpgunz.com"

Membership level: Free member
Summary

Found

-

Duration

1min 1sec

Date

2024-05-28

IP

-

Report
Nikto scan (max 60 sec) (nikto -host fxpgunz.com -maxtime 60)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 104.26.12.77, 104.26.13.77, 172.67.68.3, 2606:4700:20::ac43:4403, 2606:4700:20::681a:c4d, 2606:4700:20::681a:d4d
+ Target IP:          104.26.12.77
+ Target Hostname:    fxpgunz.com
+ Target Port:        80
+ Start Time:         2024-05-28 14:47:31 (GMT-4)
---------------------------------------------------------------------------
+ Server: cloudflare
+ /: Uncommon header 'critical-ch' found, with contents: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA.
+ /: Uncommon header 'accept-ch' found, with contents: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA.
+ /: Uncommon header 'cf-chl-out' found, with contents: CqTraA7Tj7/WhY2Vsqg1BmcobHgj32wiXYHIhLsWr0+x6PA8OJ6vfJMAEtzmdrZxAcgyQekQqYAy7hY99vQ5fRpZ1l08hHsGtGMBZTUxMnU=$mqUv17tyaVDcfupMLvBnRg==.
+ /: Uncommon header 'x-content-options' found, with contents: nosniff.
+ /: Uncommon header 'origin-agent-cluster' found, with contents: ?1.
+ /: Uncommon header 'cf-mitigated' found, with contents: challenge.
+ All CGI directories 'found', use '-C none' to test none
+ /favicon.ico: Retrieved x-powered-by header: Express.
+ /favicon.ico: Retrieved access-control-allow-origin header: *.
+ /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Scan terminated: 0 error(s) and 9 item(s) reported on remote host
+ End Time:           2024-05-28 14:48:32 (GMT-4) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Online Nikto scanner - Online Nikto web server scanner | Product Hunt
Detailed report
Target
fxpgunz.com
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host fxpgunz.com -maxtime 60
Scan time
61s
Quick report
Order full scan ($79/one time)
Scan date
28 May 2024 14:48
Copy scan report
Download report
Remove scan result
$
Total scans
About 3 times
Check ports
Use Portscanner Tool