URL: https://webtaid.com/login.php/ [2a02:4780:2b:1816:0:a4b:3fb6:8] Started: Mon Mar 31 17:12:21 2025 Interesting Finding(s): Headers | Interesting Entries: | - x-powered-by: PHP/8.2.27 | - server: LiteSpeed | - platform: hostinger | - panel: hpanel | - content-security-policy: upgrade-insecure-requests | - alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46" | Found By: Headers (Passive Detection) | Confidence: 100% This site seems to be a multisite | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: http://codex.wordpress.org/Glossary#Multisite The external WP-Cron seems to be enabled: https://webtaid.com/login.php/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 Fingerprinting the version -: |================================================| The WordPress version could not be detected. The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No Users Found. No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon Mar 31 17:14:05 2025 Requests Done: 1483 Cached Requests: 10 Data Sent: 497.692 KB Data Received: 5.111 MB Memory used: 180.352 MB Elapsed time: 00:01:44