URL: http://laprintaniere.digitapp.info/ [2001:41d0:301::29] Effective URL: https://laprintaniere.digitapp.info/auth Started: Fri Aug 8 07:36:38 2025 Interesting Finding(s): Headers | Interesting Entries: | - Server: OVHcloud | - X-Powered-By: PHP/7.4 | - Referrer-Policy: no-referrer | - Content-Security-Policy: default-src 'self' https://stackpath.bootstrapcdn.com https://cdnjs.cloudflare.com https://cdn.jsdelivr.net https://fonts.googleapis.com https://fonts.gstatic.com https://code.jquery.com; style-src 'self' 'unsafe-inline' https://stackpath.bootstrapcdn.com https://cdnjs.cloudflare.com https://fonts.googleapis.com; script-src 'self' 'unsafe-inline' https://cdnjs.cloudflare.com https://stackpath.bootstrapcdn.com https://code.jquery.com; font-src 'self' https://fonts.gstatic.com https://cdnjs.cloudflare.com | Found By: Headers (Passive Detection) | Confidence: 100% This site seems to be a multisite | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: http://codex.wordpress.org/Glossary#Multisite The external WP-Cron seems to be enabled: http://laprintaniere.digitapp.info/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 Fingerprinting the version -: |================================================| The WordPress version could not be detected. The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No Users Found. No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Fri Aug 8 07:37:32 2025 Requests Done: 787 Cached Requests: 8 Data Sent: 252.485 KB Data Received: 825.363 KB Memory used: 107.961 MB Elapsed time: 00:00:54