Vulnerability Scan Result

Submitted: May 11, 2026 from DZ dz Public Scan
Scan mode: Passive (non-intrusive)
Summary
low
9
Info
8
Low
0
Medium
0
High
0
Critical
Screenshot
Screenshot could not be taken.
Title: Alexander-Technik Offenburg
Description: You can't do something that you don't know, if you keep on doing what you do know F. M. Alexander Warum Alexander-Technik? Die Alexander-Technik ist eine pädago
IP Information
ip_address 104.21.14.149
country -
network_name Cloudflare, Inc.
asn AS13335
ip_address 172.67.159.180
country -
network_name Cloudflare, Inc.
asn AS13335
Open Ports
80/tcp
http Cloudflare http proxy -
443/tcp
https cloudflare -
2082/tcp
http Cloudflare http proxy -
2083/tcp
https nginx -
2086/tcp
http Cloudflare http proxy -
2087/tcp
https nginx -
8080/tcp
http Cloudflare http proxy -
8443/tcp
https-alt cloudflare -
Web Technologies
Software / Version Category
Microsoft Clarity Analytics
Clipboard.js JavaScript libraries
Complianz 7.5.6.1 A/B Testing, Cookie compliance, WordPress plugins
Elementor 4.0.2 Page builders, WordPress plugins
Essential Addons for Elementor WordPress plugins
Font Awesome Font scripts
Google Font API Font scripts
Gutenberg WordPress plugins, Editors
Elementor Header & Footer Builder WordPress plugins
jQuery Migrate 3.4.1 JavaScript libraries
core-js 3.46.0 JavaScript libraries
HTTP/3 Miscellaneous
jQuery 3.7.1 JavaScript libraries
jQuery UI 1.13.3 JavaScript libraries
MySQL Databases
Open Graph Miscellaneous
Onsen UI Mobile frameworks
PHP Programming languages
Site Kit 1.176.0 Analytics, WordPress plugins
Stripe 3 Payment processors
Swiper JavaScript libraries
Vue.js JavaScript frameworks
Priority Hints Performance
WordPress 6.9.4 CMS, Blogs
WordPress Block Editor Page builders
WP Rocket 3.20.3 Caching, WordPress plugins
Astra 4.12.4 WordPress themes
Slim SEO WordPress plugins
Spectra 2.19.26 WordPress plugins
BitPay Payment processors
Cloudflare CDN
reCAPTCHA Security
Lodash 1.13.7 JavaScript libraries
RSS Miscellaneous

Web Application Vulnerabilities

Infrastructure Vulnerabilities