Vulnerability Scan Result

Target:
Submitted: Apr 30, 2026 from IT it Public Scan
Scan mode: Passive (non-intrusive)
Summary
medium
11
Info
6
Low
5
Medium
0
High
0
Critical
Screenshot
http://theemperorslane.com/
Title: Artisan Selections – Lavish Collectibles | The Emperor’s Lane
Description: Artisan Selections – Lavish Collectibles | The Emperor’s Lane - The Emperor’s Lane offers beautiful made-to-order products and carefully-curated, artisan-crafted décor, furniture and collectibles from around the globe.
IP Information
ip_address 23.227.38.74
country CA ca
network_name Cloudflare, Inc.
asn AS13335
Open Ports
80/tcp
http Cloudflare http proxy -
443/tcp
https Cloudflare http proxy -
2082/tcp
http Cloudflare http proxy -
2083/tcp
https nginx -
2086/tcp
http Cloudflare http proxy -
2087/tcp
https nginx -
8080/tcp
http Cloudflare http proxy -
8443/tcp
https Cloudflare http proxy -
Web Technologies
Software / Version Category
Microsoft Advertising Advertising
Amazon Web Services PaaS
Amazon S3 CDN
Bunny CDN
Facebook Pixel 2.9.310 Analytics
Bootstrap \1 UI frameworks
LazySizes JavaScript libraries, Performance
core-js 3.37.0 JavaScript libraries
Glide.js JavaScript libraries
Google Analytics UA Analytics
HTTP/3 Miscellaneous
Instafeed.js JavaScript libraries
Ionicons Font scripts
jQuery 1.12.0 JavaScript libraries
jQuery UI 1.11.4 JavaScript libraries
LoyaltyLion 2023-11 Loyalty & rewards
Modernizr 2.8.3 JavaScript libraries
MySQL Databases
Open Graph Miscellaneous
OWL Carousel JavaScript libraries
PayPal Payment processors
PHP Programming languages
Piwik PRO Core Analytics
Popper Miscellaneous
Pusher Live chat
Reputon Reviews, Shopify apps
SchemaPlus Shopify apps
Shop Pay Payment processors
Shopify Ecommerce
DoubleClick Floodlight Advertising
Priority Hints Performance
WordPress CMS, Blogs
Apple Pay Payment processors
Cloudflare CDN
reCAPTCHA Security
Google Tag Manager Tag managers
Klaviyo Marketing automation
Klaviyo Reviews Reviews
HSTS Security
Cart Functionality Ecommerce

Web Application Vulnerabilities

Infrastructure Vulnerabilities