Vulnerability Scan Result

Submitted: May 04, 2026 from TO to Public Scan
Scan mode: Passive (non-intrusive)
Summary
low
11
Info
4
Low
0
Medium
0
High
0
Critical
Screenshot
https://info.dukane.com/hs/preferences-center/en/direct?data=W2nXS-N30h-GyW2CWH9m45DwK0W2CGNmL2RxH5PW36F7rP41Zn_mW1BLxjM4kMbFmW49kfRW3z993_W3brLWN2zQSsCW3P2xnw4cC3PQW3XKCrQ2Pxt2lW2RxK5Q3_J10HW1XfvGs4fDRYmW3JZYq42zJB4PW2zxWG649TlP2W3T1Hgt3_-RZBW2vLk3L3VYVblW3gtSWJ2WsVPXW2YLgFf2TQ4JJW1_62FZ3JFXMhW3BTNCG1LBFthW34qFYb4rzmglW2HGfx93Fd54wW2HJQW41VktXYW3V-cL11BNYMNW4r93QX2RLZ61W4hCW0x41GvbxW24TWnh3SHC34W2PxvsS4rGqcCW23p2Hx1Bm5nZW4cP2nH2CtkGQW4mKFkH1LywL9W1LvcPc2xSk9ZW3_-0JT2r5D3nW3SK8NJ3_R2NYW2-cDLl3d7hKfW1Y_Y1H3R7MQ9W1Qy7qx32HFRBW2p0nvx2r90WwW3NN6pm2TjrmQW2YCBv02RDc1RW3jr7604hJsKtW329x673NR2lfW2B13zW1Z4zk5W3XLtBf3_Bzj5W3XK9KK251bbqW43BC--1SbDWRW1_t-x63d0CPSW2CNbdW4mm3qzW2TyKxP2r0h5rW2-q2vg3fYKlSW1LHCdc1QxFRGW2-mzZM1_4P3zW3LZjBH3_ZZr_W3XF37P3bjCH2W3R6Stf1SsKJXW3H5df449kJgwW3dkHTW2FBmDKW4mm3wt36k18RW3_RStd2TpT8HW1Nlvj73R4pZ70&utm_source=hs_automation&utm_medium=email&utm_content=416383451&_hsenc=p2ANqtz-87PP4q0LeXDxWVbGDFpr4pPSd-eKvHrgUoC_YPXqDK04CjymNWQePv4lGid0ZFi4NFCOIHHgYuA_XGj0uUK9Sc23Iy1w&_hsmi=416383451
Title: Subscription preferences
Description:
IP Information
ip_address 199.60.103.30
country US us
network_name Cloudflare, Inc.
asn AS209242
ip_address 199.60.103.226
country US us
network_name Cloudflare, Inc.
asn AS209242
Open Ports
80/tcp
http Cloudflare http proxy -
443/tcp
https Cloudflare http proxy -
2082/tcp
http Cloudflare http proxy -
2083/tcp
https nginx -
2086/tcp
http Cloudflare http proxy -
2087/tcp
https nginx -
8080/tcp
http Cloudflare http proxy -
8443/tcp
https Cloudflare http proxy -
Web Technologies
Software / Version Category
core-js 3.0.1 JavaScript libraries
Goober JavaScript libraries
HTTP/3 Miscellaneous
Open Graph Miscellaneous
PHP Programming languages
Cloudflare CDN
Cloudflare Bot Management Security
HubSpot Marketing automation
HubSpot CMS Hub CMS
HubSpot Analytics Analytics
Joomla CMS
HSTS Security

Web Application Vulnerabilities

Infrastructure Vulnerabilities