Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 3.166.96.9, 3.166.96.49, 3.166.96.40, 3.166.96.96, 2600:9000:2798:7c00:1:de6e:9040:93a1, 2600:9000:2798:f800:1:de6e:9040:93a1, 2600:9000:2798:f600:1:de6e:9040:93a1, 2600:9000:2798:4a00:1:de6e:9040:93a1, 2600:9000:2798:a800:1:de6e:9040:93a1, 2600:9000:2798:e00:1:de6e:9040:93a1, 2600:9000:2798:7e00:1:de6e:9040:93a1, 2600:9000:2798:f000:1:de6e:9040:93a1 + Target IP: 3.166.96.9 + Target Hostname: pepeunchained.com + Target Port: 80 + Start Time: 2025-01-27 04:20:31 (GMT-8) --------------------------------------------------------------------------- + Server: CloudFront + /: Retrieved via header: 1.1 f3499225c76b034ea321eda40a8d4ce6.cloudfront.net (CloudFront). + Root page / redirects to: https://pepeunchained.com/ + No CGI Directories found (use '-C all' to force check all possible dirs) + : Server banner changed from 'CloudFront' to 'AmazonS3'. + /nikto-test-tkoHvpvG.html: Uncommon header 'x-amz-server-side-encryption' found, with contents: AES256. + /nikto-test-tkoHvpvG.html: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /: Web Server returns a valid response with junk HTTP methods which may cause false positives. + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call. + /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call. + Scan terminated: 0 error(s) and 7 item(s) reported on remote host + End Time: 2025-01-27 04:21:32 (GMT-8) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested