URL: https://justway.pro/wp-login.php/ [31.31.197.4] Started: Mon Dec 16 06:08:36 2024 Interesting Finding(s): Headers | Interesting Entries: | - Server: nginx | - X-Powered-By: PHP/8.2.20 | Found By: Headers (Passive Detection) | Confidence: 100% WordPress readme found: https://justway.pro/wp-login.php/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% This site seems to be a multisite | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: http://codex.wordpress.org/Glossary#Multisite The external WP-Cron seems to be enabled: https://justway.pro/wp-login.php/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 Fingerprinting the version -: |================================================| The WordPress version could not be detected. The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No Users Found. No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon Dec 16 06:12:29 2024 Requests Done: 1475 Cached Requests: 10 Data Sent: 542.658 KB Data Received: 5.632 MB Memory used: 146.168 MB Elapsed time: 00:03:52