URL: http://bxss.me/t/fit.txt.jpg/ [2600:1f14:da0:f001:14c9:2f95:b0e2:3e3c] Started: Sat Mar 29 00:32:21 2025 Interesting Finding(s): Headers | Interesting Entry: Server: nginx | Found By: Headers (Passive Detection) | Confidence: 100% This site seems to be a multisite | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: http://codex.wordpress.org/Glossary#Multisite The external WP-Cron seems to be enabled: http://bxss.me/t/fit.txt.jpg/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 Fingerprinting the version -: |================================================| The WordPress version could not be detected. The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |================================== No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Sat Mar 29 00:33:18 2025 Requests Done: 1476 Cached Requests: 10 Data Sent: 430.701 KB Data Received: 411.956 KB Memory used: 110.504 MB Elapsed time: 00:00:57 Scan Aborted: Max Scan Duration Reached