URL: https://soalut.web.id/ [84.247.150.26] Started: Sat Dec 13 07:05:39 2025 Interesting Finding(s): Headers | Interesting Entries: | - Server: nginx | - Referrer-Policy: same-origin | - alt-svc: h3=":443"; ma=86400 | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://soalut.web.id/robots.txt | Interesting Entries: | - /wp-content/uploads/wc-logs/ | - /wp-content/uploads/woocommerce_transient_files/ | - /wp-content/uploads/woocommerce_uploads/ | - /wp-admin/ | - /wp-admin/admin-ajax.php | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% XML-RPC seems to be enabled: https://soalut.web.id/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/ | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/ WordPress readme found: https://soalut.web.id/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% This site has 'Must Use Plugins': https://soalut.web.id/wp-content/mu-plugins/ | Found By: Direct Access (Aggressive Detection) | Confidence: 80% | Reference: http://codex.wordpress.org/Must_Use_Plugins The external WP-Cron seems to be enabled: https://soalut.web.id/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.9 identified (Latest, released on 2025-12-02). | Found By: Rss Generator (Passive Detection) | - https://soalut.web.id/feed/, https://wordpress.org/?v=6.9 | - https://soalut.web.id/comments/feed/, https://wordpress.org/?v=6.9 The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: anyageraldine | Found By: Wp Json Api (Aggressive Detection) | - https://soalut.web.id/wp-json/wp/v2/users/?per_page=100&page=1 | Confirmed By: | Oembed API - Author URL (Aggressive Detection) | - https://soalut.web.id/wp-json/oembed/1.0/embed?url=https://soalut.web.id/&format=json | Author Sitemap (Aggressive Detection) | - https://soalut.web.id/wp-sitemap-users-1.xml | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection) No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Sat Dec 13 07:05:58 2025 Requests Done: 49 Cached Requests: 9 Data Sent: 15.651 KB Data Received: 2.659 MB Memory used: 140.305 MB Elapsed time: 00:00:18