URL: https://japan-royalhoney.com/ [162.0.215.247] Started: Mon Dec 8 01:03:39 2025 Interesting Finding(s): Headers | Interesting Entries: | - x-powered-by: PHP/8.4.14 | - server: LiteSpeed | - x-turbo-charged-by: LiteSpeed | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://japan-royalhoney.com/robots.txt | Interesting Entries: | - /wp-admin/ | - /wp-admin/admin-ajax.php | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% XML-RPC seems to be enabled: https://japan-royalhoney.com/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/ | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/ WordPress readme found: https://japan-royalhoney.com/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% The external WP-Cron seems to be enabled: https://japan-royalhoney.com/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.9 identified (Latest, released on 2025-12-02). | Found By: Rss Generator (Aggressive Detection) | - https://japan-royalhoney.com/feed/, https://wordpress.org/?v=6.9 | - https://japan-royalhoney.com/comments/feed/, https://wordpress.org/?v=6.9 WordPress theme in use: royalhone | Location: https://japan-royalhoney.com/wp-content/themes/royalhone/ | Style URL: https://japan-royalhoney.com/wp-content/themes/royalhone/style.css | | Found By: Urls In Homepage (Passive Detection) | Confirmed By: Urls In 404 Page (Passive Detection) | | The version could not be determined. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: japan_rh | Found By: Wp Json Api (Aggressive Detection) | - https://japan-royalhoney.com/wp-json/wp/v2/users/?per_page=100&page=1 | Confirmed By: | Oembed API - Author URL (Aggressive Detection) | - https://japan-royalhoney.com/wp-json/oembed/1.0/embed?url=https://japan-royalhoney.com/&format=json | Rss Generator (Aggressive Detection) vnfreelance | Found By: Wp Json Api (Aggressive Detection) | - https://japan-royalhoney.com/wp-json/wp/v2/users/?per_page=100&page=1 No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon Dec 8 01:03:53 2025 Requests Done: 63 Cached Requests: 8 Data Sent: 28.582 KB Data Received: 1.524 MB Memory used: 188.469 MB Elapsed time: 00:00:14