Scan report for "airtel.co.ug"

Membership level: Free member
Summary

Found

28

Duration

1min 1sec

Date

2025-01-10

IP

45.60.78.92

Report
Nikto SSL scan (max 60 sec) (nikto -host airtel.co.ug -ssl -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Multiple IPs found: 45.60.78.92, 45.60.81.92
+ Target IP:          45.60.78.92
+ Target Hostname:    airtel.co.ug
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /CN=imperva.com
                   Altnames: *.airteltv.live, *.nbo.airtelkenya.com, *.airtel.africa, airtelmoney.tz, *.airtelmoney.mw, *.mw.airtel.com, *.td.airtel.com, *.tz.airtel.com, *.ug.airtel.com, airtelkenya.com, *.africa.airtel.com, *.airtel.td, airtel.mg, airtelmoney.mg, *.rw.airtel.com, airtelmoney.com, airtelafricafoundation.com, *.smartcashpsb.ng, airtel.co.rw, *.zm.airtel.com, airtelmoney.ug, *.airtel.cd, airtel.africa, *.mg.airtel.com, airtel.mw, *.airtel.co.ug, airtelmoney.mw, *.airtel.cg, airtel.co.zm, *.airtel.ga, *.ga.airtel.com, *.ng.airtel.com, *.sdp-se-consent.airtel.ng, *.airtelmoney.tz, www.airtelmoney.com, *.airtel.co.tz, *.airtelafricafoundation.com, *.airtelmoney.ug, *.airtel.sc, *.main.airtel.africa, *.airteltv.airtelstream.net, airtel.ne, *.abu.airtel.com.ng, *.airtelkenya.com, *.test.airtel.co.rw, *.airtelmoney.mg, *.airtelmoney.cg, *.airtelchad.com, *.airtel.co.zm, smartcashpsb.ng, *.airtelmoney.cd, *.ne.airtel.com, airtelmoney.sc, airtel.co.ug, *.airtel.ng, airtelmoney.rw, *.airtel.ne, airtel.sc, *.kit.airtel.co.zm, *.airtelmoney.td, airtel.ga, airtelmoney.ga, *.airtel.mw, *.enterprisesolutions.airtel.co.ug, *.lag.airtel.com.ng, airtel.co.tz, *.airtelafricafoundation.org, *.cg.airtel.com, *.orig.airtel.co.zm, airtel.cd, *.sc.airtel.com, imperva.com, *.ke.airtel.com, airtelmoney.co.zm, airtel.cg, *.lus.airtel.co.zm, airtelmoney.td, *.smartcash.airtel.ng, *.airtel.com.ng, *.airtel.mg, *.cd.airtel.com, airtelmoney.cd, airtel.td, *.airtelmoney.rw, airtelmoney.cg, *.airtel.co.rw, *.airtel.ug, *.airtelmoney.co.zm, *.airtelmoney.sc, *.airtelmoney.ga, airtelafricafoundation.org, airtel.com.ng
                   Ciphers:  TLS_AES_128_GCM_SHA256
                   Issuer:   /C=BE/O=GlobalSign nv-sa/CN=GlobalSign Atlas R3 DV TLS CA 2024 Q4
+ Start Time:         2025-01-10 01:11:53 (GMT-8)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ /: Uncommon header 'x-iinfo' found, with contents: 10-253809402-0 NNNN RT(1736500313258 5) q(0 -1 -1 -1) r(0 -1) B15(14,0,0) U18.
+ /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
+ /: Cookie visid_incap_2999096 created without the secure flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /: Cookie incap_ses_1449_2999096 created without the secure flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /: Cookie incap_ses_1449_2999096 created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /1PDnwRqu.save: Cookie incap_ses_172_2999096 created without the secure flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /1PDnwRqu.save: Cookie incap_ses_172_2999096 created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /1PDnwRqu.TXT:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /1PDnwRqu.TXT: Incapsula WAF is in use. See: https://www.sumasoft.com/incapsula-cloud-based-web-application-firewall-waf/
+ /1PDnwRqu.TXT: Cookie nlbi_2999096 created without the secure flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ All CGI directories 'found', use '-C none' to test none
+ /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Server is using a wildcard certificate: *.airteltv.live. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.nbo.airtelkenya.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.airtel.africa. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.airtelmoney.mw. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.mw.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.td.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.tz.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.ug.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.africa.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.airtel.td. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.rw.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.smartcashpsb.ng. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.zm.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.airtel.cd. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.mg.airtel.com. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ Server is using a wildcard certificate: *.airtel.co.ug. See: https://en.wikipedia.org/wiki/Wildcard_certificate
+ OPTIONS: Allowed HTTP Methods: HEAD, GET, POST, OPTIONS .
+ Scan terminated: 0 error(s) and 28 item(s) reported on remote host
+ End Time:           2025-01-10 01:12:54 (GMT-8) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
airtel.co.ug
Target IP
45.60.78.92
Scan method
Nikto SSL scan (max 60 sec)
Run command
nikto -host airtel.co.ug -ssl -maxtime 60
Duration
Quick report
Scan date
10 Jan 2025 04:12
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID