URL: https://app.nucleofit.com.br/ [2606:4700:3034::ac43:cc1d]
Started: Sat Oct 4 00:45:41 2025
Interesting Finding(s):
Headers
| Interesting Entries:
| - Speculation-Rules: "/cdn-cgi/speculation"
| - Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=pvmCHGVpqPSA4aVAauKMGm6CYaIbKGG95gjpYo1n4QWTHdfpg3zmBp84vKtRNDH6Wv1S7B5oGbER%2BiX9AzMlvPZ7t0rGai7ggpKvzctb6vPD5oQbuY%2BXyyOcAfAqciA3"}]}
| - Server: cloudflare
| - cf-cache-status: DYNAMIC
| - Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
| - CF-RAY: 98930f92bc54af67-LAX
| - alt-svc: h3=":443"; ma=86400
| Found By: Headers (Passive Detection)
| Confidence: 100%
This site seems to be a multisite
| Found By: Direct Access (Aggressive Detection)
| Confidence: 100%
| Reference: http://codex.wordpress.org/Glossary#Multisite
The external WP-Cron seems to be enabled: https://app.nucleofit.com.br/wp-cron.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 60%
| References:
| - https://www.iplocation.net/defend-wordpress-from-ddos
| - https://github.com/wpscanteam/wpscan/issues/1299
Fingerprinting the version -: |===================== No WPScan API Token given, as a result vulnerability data has not been output.
You can get a free API token with 25 daily requests by registering at https://wpscan.com/register
Finished: Sat Oct 4 00:46:35 2025
Requests Done: 687
Cached Requests: 6
Data Sent: 199.365 KB
Data Received: 1.057 MB
Memory used: 162.711 MB
Elapsed time: 00:00:54
Scan Aborted: Max Scan Duration Reached
Color Scheme
Target
app.nucleofit.com.br
Scan method
Enumerate Wordpress Users
Run command
wpscan --url https://app.nucleofit.com.br/ --enumerate u --random-user-agent --force --max-scan-duration 60