URL: https://stea-web.com/ [2606:4700:3035::6815:1d96] Started: Mon Dec 8 01:46:37 2025 Interesting Finding(s): Headers | Interesting Entries: | - Speculation-Rules: "/cdn-cgi/speculation" | - Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=tS%2BbZAqNQJgXp8YnXN0vgD1cgXmyDbM04Z7TXeIOuhcrv575sBLz5ljwbja1jt2ESfdZ%2FwZ7k0LmFi7zAAYIbpRNZqTBnUgp6oZtdg%3D%3D"}]} | - Server: cloudflare | - cf-cache-status: DYNAMIC | - Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} | - CF-RAY: 9aab560f0c37c9f5-LAX | - alt-svc: h3=":443"; ma=86400 | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://stea-web.com/robots.txt | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% This site has 'Must Use Plugins': https://stea-web.com/wp-content/mu-plugins/ | Found By: Direct Access (Aggressive Detection) | Confidence: 80% | Reference: http://codex.wordpress.org/Must_Use_Plugins The external WP-Cron seems to be enabled: https://stea-web.com/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.9 identified (Latest, released on 2025-12-02). | Found By: Rss Generator (Passive Detection) | - https://stea-web.com/feed/, https://wordpress.org/?v=6.9 | - https://stea-web.com/comments/feed/, https://wordpress.org/?v=6.9 The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: Vasile BOULAY | Found By: Rss Generator (Passive Detection) | Confirmed By: Rss Generator (Aggressive Detection) steaadmin123 | Found By: Oembed API - Author URL (Aggressive Detection) | - https://stea-web.com/wp-json/oembed/1.0/embed?url=https://stea-web.com/&format=json | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) cathy | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon Dec 8 01:47:06 2025 Requests Done: 58 Cached Requests: 8 Data Sent: 14.83 KB Data Received: 3.991 MB Memory used: 186.461 MB Elapsed time: 00:00:29