Scan report for "pepeunchained.com"

Membership level: Free member
Summary

Found

7

Duration

1min 1sec

Date

2025-01-27

IP

3.166.96.9

Report
Nikto scan (max 60 sec) (nikto -host pepeunchained.com -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Multiple IPs found: 3.166.96.9, 3.166.96.49, 3.166.96.40, 3.166.96.96, 2600:9000:2798:7c00:1:de6e:9040:93a1, 2600:9000:2798:f800:1:de6e:9040:93a1, 2600:9000:2798:f600:1:de6e:9040:93a1, 2600:9000:2798:4a00:1:de6e:9040:93a1, 2600:9000:2798:a800:1:de6e:9040:93a1, 2600:9000:2798:e00:1:de6e:9040:93a1, 2600:9000:2798:7e00:1:de6e:9040:93a1, 2600:9000:2798:f000:1:de6e:9040:93a1
+ Target IP:          3.166.96.9
+ Target Hostname:    pepeunchained.com
+ Target Port:        80
+ Start Time:         2025-01-27 04:20:31 (GMT-8)
---------------------------------------------------------------------------
+ Server: CloudFront
+ /: Retrieved via header: 1.1 f3499225c76b034ea321eda40a8d4ce6.cloudfront.net (CloudFront).
+ Root page / redirects to: https://pepeunchained.com/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ : Server banner changed from 'CloudFront' to 'AmazonS3'.
+ /nikto-test-tkoHvpvG.html: Uncommon header 'x-amz-server-side-encryption' found, with contents: AES256.
+ /nikto-test-tkoHvpvG.html: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /: Web Server returns a valid response with junk HTTP methods which may cause false positives.
+ /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
+ /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call.
+ Scan terminated: 0 error(s) and 7 item(s) reported on remote host
+ End Time:           2025-01-27 04:21:32 (GMT-8) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
pepeunchained.com
Target IP
3.166.96.9
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host pepeunchained.com -maxtime 60
Duration
Quick report
Scan date
27 Jan 2025 07:21
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID