Scan report for "sandbox-api.fireblocks.io"

Membership level: Free member
Nikto no limit SSL scan (nikto -host sandbox-api.fireblocks.io -ssl)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 172.65.90.23, 172.65.90.22, 172.65.90.20, 172.65.90.21, 2606:4700:78::90:0:142, 2606:4700:78::90:0:140, 2606:4700:78::90:0:143, 2606:4700:78::90:0:141
+ Target IP:          172.65.90.23
+ Target Hostname:    sandbox-api.fireblocks.io
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /CN=*.fireblocks.io
                   Altnames: *.fireblocks.io, fireblocks.io
                   Ciphers:  TLS_AES_256_GCM_SHA384
                   Issuer:   /C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certs.godaddy.com/repository//CN=Go Daddy Secure Certificate Authority - G2
+ Start Time:         2024-04-20 03:23:34 (GMT-4)
---------------------------------------------------------------------------
+ Server: cloudflare
+ /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Scan terminated: 20 error(s) and 1 item(s) reported on remote host
+ End Time:           2024-04-20 03:24:26 (GMT-4) (52 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
Target
sandbox-api.fireblocks.io
Scan method
Nikto no limit SSL scan
Run command
nikto -host sandbox-api.fireblocks.io -ssl
Scan time
52s
Scan date
20 Apr 2024 03:24
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Nikto. For get true positive results add nikto.online IP addresses (172.96.166.66-172.96.166.70 or CIDR 172.96.166.64/29) to the whitelist
[scan_method]
Visibility:
Scan method: