URL: https://stea-web.com/ [2606:4700:3035::ac43:9568] Started: Wed Feb 18 09:06:43 2026 Interesting Finding(s): Headers | Interesting Entries: | - referrer-policy: strict-origin-when-cross-origin | - permissions-policy: geolocation=(), camera=(), microphone=(), payment=(), usb=(), interest-cohort=() | - cross-origin-opener-policy: same-origin | - cross-origin-resource-policy: same-site | - Speculation-Rules: "/cdn-cgi/speculation" | - Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=TMkTz3DFYFQYG4kLHkjhLO2rMaZncA%2BTomT9L8C4hu7yhBVViS1LvZSjhF4DCytSq649hKnGxYl8e3Tww%2BhHTworjVSkww%2Blpx%2FzK8XajIvNJf9eAlDXXA%3D%3D"}]} | - Server: cloudflare | - cf-cache-status: DYNAMIC | - Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} | - CF-RAY: 9cff1db8eabf0fb5-LAX | - alt-svc: h3=":443"; ma=86400 | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://stea-web.com/robots.txt | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% WordPress readme found: https://stea-web.com/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% Debug Log found: https://stea-web.com/wp-content/debug.log | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: https://codex.wordpress.org/Debugging_in_WordPress This site has 'Must Use Plugins': https://stea-web.com/wp-content/mu-plugins/ | Found By: Direct Access (Aggressive Detection) | Confidence: 80% | Reference: http://codex.wordpress.org/Must_Use_Plugins WordPress version 6.9.1 identified (Latest, released on 2026-02-03). | Found By: Query Parameter In Upgrade Page (Aggressive Detection) | - https://stea-web.com/wp-includes/css/dashicons.min.css?ver=6.9.1 | - https://stea-web.com/wp-includes/css/buttons.min.css?ver=6.9.1 | - https://stea-web.com/wp-admin/css/forms.min.css?ver=6.9.1 | - https://stea-web.com/wp-admin/css/l10n.min.css?ver=6.9.1 | - https://stea-web.com/wp-admin/css/install.min.css?ver=6.9.1 The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: Auteur anonyme | Found By: Rss Generator (Passive Detection) | Confirmed By: Rss Generator (Aggressive Detection) No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Wed Feb 18 09:07:05 2026 Requests Done: 56 Cached Requests: 9 Data Sent: 16.117 KB Data Received: 2.551 MB Memory used: 165.695 MB Elapsed time: 00:00:21