Vulnerability Scan Result

Target:
Submitted: Dec 03, 2025 from BW bw Public Scan
Scan mode: Passive (non-intrusive)
Summary
high
8
Info
12
Low
4
Medium
1
High
0
Critical
Screenshot
Screenshot could not be taken.
Title: Empowerment Mentor, Speaker and Life Coach Perth WA
Description: Liliana Vanasco life coach in Joondalup supporting women to change their lives in positive ways, developing confidence, happiness, self-worth and self-love.
IP Information
ip_address 101.0.104.186
country AU au
network_name Apnic ASN Block
asn AS55803
Open Ports
21/tcp
ftp Pure-FTPd -
22/tcp
ssh OpenSSH 8
25/tcp
smtp - -
53/tcp
domain PowerDNS Authoritative Server 4.9.5
80/tcp
http Apache httpd -
110/tcp
pop3 Dovecot pop3d -
143/tcp
imap Dovecot imapd -
443/tcp
https Apache httpd -
465/tcp
smtp Exim smtpd 4.98.2
587/tcp
smtp Exim smtpd 4.98.2
993/tcp
imaps - -
995/tcp
pop3s - -
1311/tcp
https - -
2078/tcp
https cPanel httpd -
2080/tcp
https cPanel httpd -
2082/tcp
http - -
2083/tcp
https - -
2086/tcp
http - -
2087/tcp
https - -
Web Technologies
Software / Version Category
Clipboard.js JavaScript libraries
FitVids.JS 1.1 Widgets, Video players
Bootstrap 3.3.5 UI frameworks
jQuery Migrate 3.4.1 JavaScript libraries
parallax.js JavaScript libraries
Google Analytics GA4 Analytics
Apache HTTP Server Web servers
imagesLoaded 3.1.8 JavaScript libraries
Infinite Scroll 2.1 JavaScript libraries
Isotope JavaScript libraries
jQuery 3.7.1 JavaScript libraries
jQuery UI 1.13.3 JavaScript libraries
Lightbox JavaScript libraries
MailChimp Marketing automation, Email
Modernizr JavaScript libraries
MySQL Databases
Open Graph Miscellaneous
Packery 2.0.0 JavaScript libraries, UI frameworks
PHP 7.4.33 Programming languages
Twitter Emoji (Twemoji) Font scripts
Underscore.js 1.13.7 JavaScript libraries
Vimeo Video players
WooCommerce 10.3.4 Ecommerce, WordPress plugins
WordPress CMS, Blogs
Google Tag Manager Tag managers
Lodash 1.13.7 JavaScript libraries
RSS Miscellaneous
Cart Functionality Ecommerce
Yoast SEO 26.2 SEO, WordPress plugins

Web Application Vulnerabilities

Infrastructure Vulnerabilities