Vulnerability Scan Result

Target:
Submitted: May 06, 2026 from LV lv Public Scan
Scan mode: Passive (non-intrusive)
Summary
medium
11
Info
5
Low
2
Medium
0
High
0
Critical
Screenshot
http://dearheartsigns.com/
Title: Dear Heart Signs | Custom Signs & Personalized Gifts
Description: Laser cut signage for special events, weddings, and home decor. Custom name signs, cake toppers, wooden signage, and more. Based in Orange County, California.
IP Information
ip_address 23.227.38.74
country CA ca
network_name Cloudflare, Inc.
asn AS13335
Open Ports
80/tcp
http Cloudflare http proxy -
443/tcp
https Cloudflare http proxy -
2082/tcp
http Cloudflare http proxy -
2083/tcp
https nginx -
2086/tcp
http Cloudflare http proxy -
2087/tcp
https nginx -
8080/tcp
http Cloudflare http proxy -
8443/tcp
https Cloudflare http proxy -
Web Technologies
Software / Version Category
Globo Form Builder Shopify apps, Form builders
Instafeed Shopify apps
Order Deadline Shopify apps
PerfectApps Swift Shopify apps, Performance
Amazon Web Services PaaS
cdnjs CDN
Google Hosted Libraries CDN
Facebook Pixel Analytics
Flickity JavaScript libraries
LazySizes JavaScript libraries, Performance
core-js 3.37.0 JavaScript libraries
Google Analytics GA4 Analytics
HTTP/3 Miscellaneous
jQuery 3.7.1 JavaScript libraries
Judge.me Reviews
AOS JavaScript libraries
MySQL Databases
Open Graph Miscellaneous
Google Pay Payment processors
PayPal Payment processors
PhotoSwipe Photo galleries, JavaScript libraries
PHP Programming languages
Product Personalizer Shopify apps, Personalisation
Pusher Live chat
Shop Pay Payment processors
Shopify Ecommerce
DoubleClick Floodlight Advertising
Uploadcare 3.23.2 CDN
Priority Hints Performance
WordPress CMS, Blogs
American Express Payment processors
Apple Pay Payment processors
Cloudflare CDN
Google Tag Manager Tag managers
Klaviyo Marketing automation
Klaviyo Reviews Reviews
Mastercard Payment processors
Show Recent Orders Ecommerce
HSTS Security
Visa Payment processors
Cart Functionality Ecommerce
Zepto JavaScript libraries

Web Application Vulnerabilities

Infrastructure Vulnerabilities