URL: http://bxss.me/t/fit.txt/ [2600:1f14:da0:f001:14c9:2f95:b0e2:3e3c] Started: Fri Mar 28 22:52:19 2025 Interesting Finding(s): Headers | Interesting Entry: Server: nginx | Found By: Headers (Passive Detection) | Confidence: 100% This site seems to be a multisite | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | Reference: http://codex.wordpress.org/Glossary#Multisite The external WP-Cron seems to be enabled: http://bxss.me/t/fit.txt/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 Fingerprinting the version -: |================================================| The WordPress version could not be detected. The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No Users Found. No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Fri Mar 28 22:53:26 2025 Requests Done: 1483 Cached Requests: 10 Data Sent: 347.115 KB Data Received: 414.03 KB Memory used: 110.586 MB Elapsed time: 00:01:06