.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c7c3d3e457c3d3e45f0558771a463b86ae3f04c3727d24e20
Found 30 files trough .DS_Store spidering: /a /admui /asset /asset/cbs /asset/dso /asset/fox /asset/hdk /asset/ivu /asset/kos /asset/mx1 /asset/mx1/logo.png /asset/mx1/mx1-logo-vertical.png /asset/mx1/navbar_logo.png /asset/rbl /asset/sample /asset/ubt /asset/wnr /asset/wuw /c /etc /img0 /img1 /img1/about /img1/email /img1/uploader /main /sample /ui /uibase /uibase.preprod
Severity: low
Fingerprint: 5f32cf5d6962f09c684e525d684e525d6f19e93987801d42afaf67bfb8f05aad
Found 27 files trough .DS_Store spidering: /a /admui /asset /asset/cbs /asset/dso /asset/fox /asset/hdk /asset/ivu /asset/kos /asset/mx1 /asset/mx1/logo.png /asset/mx1/mx1-logo-vertical.png /asset/mx1/navbar_logo.png /asset/rbl /asset/sample /asset/ubt /asset/wnr /asset/wuw /c /etc /img0 /img1 /main /sample /ui /uibase /uibase.preprod
Severity: low
Fingerprint: 5f32cf5d6962f09c0f8dcf020f8dcf02c2d4ae4a7a251f253c3a60c0ce20f8ac
Found 24 files trough .DS_Store spidering: /a /admui /asset /asset/cbs /asset/dso /asset/fox /asset/hdk /asset/ivu /asset/kos /asset/mx1 /asset/rbl /asset/sample /asset/ubt /asset/wnr /asset/wuw /c /etc /img0 /img1 /main /sample /ui /uibase /uibase.preprod
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c3838040e3838040eb92752e1a2746fee664f1f52d8eeb0ca
Found 20 files trough .DS_Store spidering: /bootstrap /bootstrap/css /bootstrap/fonts /bootstrap/js /diagrams /diagrams/orphans /diagrams/summary /dist /dist/css /dist/js /images /plugins /plugins/anchorjs /plugins/datatables /plugins/fastclick /plugins/jQuery /plugins/jQueryUI /plugins/salvattore /plugins/slimScroll /tables
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a0a238d1fb6c628da8bed993b0bd70a752
Found 13 files trough .DS_Store spidering: /bootstrap /bootstrap/css /bootstrap/fonts /bootstrap/js /diagrams /diagrams/orphans /diagrams/summary /dist /dist/css /dist/js /images /plugins /tables
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f87726848d59d8235beaaa456b74e2e27dfa0
Found 11 files trough .DS_Store spidering: /bootstrap /bootstrap/css /bootstrap/fonts /bootstrap/js /diagrams /diagrams/orphans /diagrams/summary /dist /images /plugins /tables
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f87726848d59d8235beaaa456b74e23dd598b
Found 11 files trough .DS_Store spidering: /bootstrap /bootstrap/css /bootstrap/fonts /bootstrap/js /diagrams /dist /dist/css /dist/js /images /plugins /tables
Severity: low
Fingerprint: 5f32cf5d6962f09c3af247253af247257db41cf28bf159e5a628c9d1ecc645bc
Found 9 files trough .DS_Store spidering: /bootstrap /bootstrap/css /bootstrap/fonts /bootstrap/js /diagrams /dist /images /plugins /tables
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d8143ab0e04b95f58a3a1e3af4bc101b98
Found 8 files trough .DS_Store spidering: /css /css/font-awesome /css/font-awesome/css /css/font-awesome/fonts /images /images/portfolio /images/tech /js
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d80574f6b80574f6b80574f6b80574f6b
Found 1 files trough .DS_Store spidering: /pc-favicon.png
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c7cf176427cf17642f37146e3778bd019778bd019778bd019
Found 2 files trough .DS_Store spidering: /jp /jp/images
Severity: low
Fingerprint: 5f32cf5d6962f09c1a5d9b0f1a5d9b0f661bc6c8e21dc4ddc54e2bcfc54e2bcf
Found 3 files trough .DS_Store spidering: /images /jp /jp/images
Severity: low
Fingerprint: 5f32cf5d6962f09c0215adfc0215adfc58bbbf252671a7de3fcbdd246beda2aa
Found 4 files trough .DS_Store spidering: /images /jp /jp/fonts /jp/images
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652260810b4c
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/boxxsack/www.snacklegrand.de fetch = +refs/heads/*:refs/remotes/origin/* [gc] auto = 0 [http "https://github.com/"] extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46Z2hzX0tGRm12QlR4am9jUjh0eGRlYk40RExBUjFwbkhwejF3QmEwbg== [branch "main"] remote = origin merge = refs/heads/main
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a07892f1b10e5eb123efb10fa9d7cd3134
Found 13 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/games/searching/scene1 /images/games/searching/scene2 /images/games/searching/scene3 /images/games/searching/scene4 /images/logo /images/stories /images/stories/story_1
Severity: low
Fingerprint: 5f32cf5d6962f09c9e04c3bc9e04c3bceb8b4c652fdf3cb720403dfd5b8f53f9
Found 22 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/games/searching/scene1 /images/games/searching/scene2 /images/games/searching/scene3 /images/games/searching/scene4 /images/logo /images/stories /images/stories/story_1 /images/stories/story_1/_common /images/stories/story_1/_common/bg_1 /images/stories/story_1/slide_14 /images/stories/story_1/slide_16_2 /images/stories/story_1/slide_20 /images/stories/story_1/slide_22 /images/stories/story_1/slide_22/float /images/stories/story_1/slide_7 /images/stories/story_1/slide_8
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744dc793d666ad2d31967bca20fc3ee3f1ce
Found 12 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/games/searching/scene1 /images/games/searching/scene2 /images/games/searching/scene3 /images/games/searching/scene4 /images/logo /images/stories
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d84268db69795c9bbb7d026fc11f29a83b
Found 8 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/logo /images/stories
Severity: low
Fingerprint: 5f32cf5d6962f09cab28146bab28146beeb5935c64936d0819425f461686372f
Found 21 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/games/searching/scene1 /images/games/searching/scene2 /images/games/searching/scene3 /images/games/searching/scene4 /images/logo /images/stories /images/stories/story_1 /images/stories/story_1/_common /images/stories/story_1/_common/bg_1 /images/stories/story_1/slide_14 /images/stories/story_1/slide_16_2 /images/stories/story_1/slide_20 /images/stories/story_1/slide_22 /images/stories/story_1/slide_7 /images/stories/story_1/slide_8
Severity: low
Fingerprint: 5f32cf5d6962f09c3838040e3838040e7db0bbd71e13bc653fd6dd13cf5c7d1c
Found 20 files trough .DS_Store spidering: /images /images/btn /images/card /images/games /images/games/association_1 /images/games/searching /images/games/searching/scene1 /images/games/searching/scene2 /images/games/searching/scene3 /images/games/searching/scene4 /images/logo /images/stories /images/stories/story_1 /images/stories/story_1/_common /images/stories/story_1/slide_14 /images/stories/story_1/slide_16_2 /images/stories/story_1/slide_20 /images/stories/story_1/slide_22 /images/stories/story_1/slide_7 /images/stories/story_1/slide_8
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814ecb57fc5a0f5f09e473a9b73d88463efc
Found 6 files trough .DS_Store spidering: /landing_css /landing_js /landingcss /landingjs /landingwebp /startup
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d8143ab0e04b95f58a3a1e3af4bc101b98
Found 8 files trough .DS_Store spidering: /css /css/font-awesome /css/font-awesome/css /css/font-awesome/fonts /images /images/portfolio /images/tech /js
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c3c1fc5e93c1fc5e95f270b70905e013591d4ad9685507228
Found 5 files trough .DS_Store spidering: /imgs /imgs/about /imgs/home /imgs/icons /imgs/logos
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d2206f2e42206f2e42206f2e42206f2e4
Found 1 files trough .DS_Store spidering: /imgs
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e2ba98abd16507bf60387519d9c2a5482
Found 6 files trough .DS_Store spidering: /imgs /imgs/about /imgs/home /imgs/icons /imgs/illustrations2 /imgs/logos
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744d92805c7025906843746db11251313b8b
Found 12 files trough .DS_Store spidering: /apple-touch-icon-114x114.png /apple-touch-icon-120x120.png /apple-touch-icon-144x144.png /apple-touch-icon-152x152.png /apple-touch-icon-180x180.png /apple-touch-icon-57x57.png /apple-touch-icon-72x72.png /apple-touch-icon-76x76.png /apple-touch-icon.png /favicon.ico /icon.png /images
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9db7f4c636b7f4c636b7f4c636b7f4c636
Found 1 files trough .DS_Store spidering: /images
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b011144f
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = http://git.2jsncsk2dxks.xyz/pzhan/pzhan-luodiye-guide.git fetch = +refs/heads/*:refs/remotes/origin/*
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d8bc298658bc298658bc298658bc29865
Found 1 files trough .DS_Store spidering: /css
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c7cf176427cf17642babc5aa152f9fe6952f9fe6952f9fe69
Found 2 files trough .DS_Store spidering: /fonts /js
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e0f46b1d
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-style2.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b4f5b14f
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b9c89d21
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://cdn-tv.hnmting.com/group-twp/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e0f46b1d
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-style2.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b4f5b14f
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b9c89d21
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://cdn-tv.hnmting.com/group-twp/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e0f46b1d
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-style2.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b4f5b14f
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://www.yc2common.com/web-page/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522b9c89d21
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://cdn-tv.hnmting.com/group-twp/dyworldweb-auto.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
The server-status page (usually /server-status) allows server administrators to find out how well their server is performing.
This is a HTML page that gives the current server statistics such as the server version, up time,cpu, ram, and information about requests made to the server.
This information can be very useful if the application is sent sensitive information as GET requests. If you monitor this page you might be able to find CSRF tokens, API keys, hidden paths, and other sensitive information being sent to the server.
https://medium.com/@ghostlulzhacks/apache-server-status-a70abed83f5a
Severity: medium
Fingerprint: ee80c6706842d3ef6842d3ef6325bb316325bb3198a96e6b98a96e6b2242fbfd
Apache Status Apache Server Status for funtopvideos.com (via 10.0.1.64) Server Version: Apache/2.4.51 (Amazon) Server MPM: prefork Server Built: Oct 8 2021 19:30:47 Current Time: Thursday, 23-Feb-2023 23:07:58 CET Restart Time: Wednesday, 08-Feb-2023 01:16:47 CET Parent Server Config. Generation: 11 Parent Server MPM Generation: 10 Server uptime: 15 days 21 hours 51 minutes 11 seconds Server load: 3.04 2.81 2.78 Total accesses: 18692020 - Total Traffic: 916.5 GB - Total Duration: 11256841353 CPU Usage: u132.28 s167.21 cu2221660 cs266803 - 181% CPU load 13.6 requests/sec - 0.7 MB/second - 51.4 kB/request - 602.227 ms/request 4 requests currently being processed, 5 idle workers _W_.W.W.W__._................................................... ................................................................ ................................................................ ........ Scoreboard Key: "_" Waiting for Connection, "S" Starting up, "R" Reading Request, "W" Sending Reply, "K" Keepalive (read), "D" DNS Lookup, "C" Closing connection, "L" Logging, "G" Gracefully finishing, "I" Idle cleanup of worker, "." Open slot with no current process SrvPIDAccMCPU SSReqDurConnChildSlotClientProtocolVHostRequest 0-10159020/97/1451324_ 13.77058115439900.010.9374427.89 10.0.0.247http/1.1lws.alb.cloudioo.net:81GET /.DS_Store HTTP/1.1 1-10248480/23/1442494W 2.37008068552950.01.4374331.71 10.0.1.164http/1.1lws.alb.cloudioo.net:81GET /server-status HTTP/1.1 2-1062950/170/1436468_ 21.2002848014907470.011.7373601.56 10.0.0.247http/1.1lws.alb.cloudioo.net:81GET /hot-scenes-432/index.html?clickid=63f7e3bc1c3a1300018d3eba 3-10-0/0/1417336. 0.0013557976660280.00.0072622.10 10.0.0.247http/1.1lws.alb.cloudioo.net:81GET /peach-videos-432/index.html?clickid=63f7e3bc855b9f00019adc 4-10180360/76/1404518W 11.32007838234670.08.7672112.87 10.0.0.94http/1.1secure-landings.api.cloudioo.neGET /redirect-to-opc/20230223230756TR38063f7e3bc4aeaa HTTP/1.1 5-10-0/0/1383305. 0.00807728039860.00.0071048.53 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 6-10300280/242/1360602W 33.65007602248130.018.6569262.81 10.0.0.247http/1.1lws.alb.cloudioo.net:81GET /instatrviz-117/index.html?click_id=7fb55569-b3c6-11ed-9695 7-10-0/0/1331919. 0.002307451069660.00.0068311.36 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 8-10278670/226/1294879W 35.03007244427280.09.3966273.47 10.0.1.164http/1.1lws.alb.cloudioo.net:81GET /auber-videos-432/index.html?clickid=63f7e3bdace2180001801f 9-10144710/114/1229358_ 13.170336938601720.04.9462539.66 10.0.0.247http/1.1lws.alb.cloudioo.net:81GET /favicon.ico HTTP/1.1 10-10214200/54/1138146_ 5.20046423644870.04.2456438.00 10.0.1.164http/1.1lws.alb.cloudioo.net:81GET /ecp/Current/exporttool/microsoft.exchange.ediscovery.expor 11-10-0/0/995319. 0.003905552709620.00.0047407.61 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 12-10214210/51/862962_ 4.370534895667560.01.4140208.90 10.0.1.199http/1.1landings.api.cloudioo.net:80GET /set-design-print?cfg_sessionid=lEhdHsZI5hNJpucLvPo9shyD1iX 13-10-0/0/699860. 0.0018503933537950.00.0032796.27 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 14-10-0/0/495650. 0.00113702865084220.00.0022860.89 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 15-10-0/0/292198. 0.00127401740125650.00.0013488.56 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 16-10-0/0/169074. 0.00103845997887730.00.007825.41 10.0.0.94http/1.1landings.api.cloudioo.net:80POST /dob/notification?cfg_sessionid=20230223225037ES19563f7dfa 17-10-0/0/97101. 0.0047590593776910.00.004551.04 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 18-10-0/0/54569. 0.004708477405277110.00.002510.75 10.0.1.164http/1.1lws.alb.cloudioo.net:81GET /voir-resultat-ios/index.html?w_id=1628136153&a_id=64726037 19-10-0/0/28097. 0.0054470260376860.00.001289.44 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 20-10-0/0/20124. 0.00126630145784130.00.00892.52 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 21-10-0/0/10283. 0.0012709088653280.00.00457.19 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 22-10-0/0/6631. 0.0012704073464480.00.00279.49 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 23-10-0/0/5315. 0.0012710064585340.00.00224.88 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 24-10-0/0/4316. 0.00126970118342120.00.00204.86 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 25-10-0/0/5893. 0.0012702061950840.00.00243.55 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 26-10-0/0/6183. 0.0012699065745620.00.00270.96 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 27-10-0/0/1258. 0.0028917097571070.00.0051.10 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 28-10-0/0/2843. 0.0028938043063370.00.00121.29 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 29-10-0/0/1725. 0.00289180102805170.00.0066.20 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 30-10-0/0/1990. 0.0028904042157550.00.0086.18 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 31-10-0/0/883. 0.0028672094353230.00.0042.69 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 32-10-0/0/1290. 0.0028930032581360.00.0049.11 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 33-10-0/0/494. 0.0028924089315180.00.0019.39 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 34-10-0/0/930. 0.0028783095006390.00.0048.27 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 35-10-0/0/644. 0.0028811089842300.00.0027.65 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 36-10-0/0/2044. 0.0028913034953590.00.0077.74 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 37-10-0/0/346. 0.0028925087400100.00.0010.63 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 38-10-0/0/1849. 0.0028935038157050.00.0073.62 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 39-10-0/0/498. 0.0028916090235760.00.0016.70 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 40-10-0/0/1232. 0.002871033993035700.00.0046.06 10.0.1.164http/1.1lws.alb.cloudioo.net:81GET /musicav4/index.html?w_id=11772503988&a_id=551094566355&p=m 41-10-0/0/1002. 0.0028896019491270.00.0039.02 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 42-10-0/0/1183. 0.0028929023710550.00.0045.89 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 43-10-0/0/734. 0.0028908091899750.00.0023.56 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 44-10-0/0/822. 0.0028934016730770.00.0041.90 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 45-10-0/0/496. 0.0028931087450060.00.0018.57 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 46-10-0/0/152. 0.0028937085267210.00.007.44 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 47-10-0/0/178. 0.0028915086018490.00.005.86 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 48-10-0/0/301. 0.0028919086512370.00.0021.23 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 49-10-0/0/125. 0.0028921084936300.00.002.64 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 50-10-0/0/350. 0.0028933086689010.00.0012.41 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 51-10-0/0/400. 0.0028912086795230.00.0013.59 ::1http/1.1lws.alb.
Severity: medium
Fingerprint: ee80c6706842d3ef6842d3ef6325bb316325bb311f1e3a571f1e3a5763668dea
Apache Status Apache Server Status for funtopvideos.com (via 10.0.1.253) Server Version: Apache/2.4.46 (Amazon) Server MPM: prefork Server Built: Aug 24 2020 18:40:26 Current Time: Wednesday, 28-Dec-2022 07:14:10 CET Restart Time: Wednesday, 31-Aug-2022 12:40:49 CEST Parent Server Config. Generation: 57 Parent Server MPM Generation: 56 Server uptime: 118 days 19 hours 33 minutes 21 seconds Server load: 4.09 4.37 4.29 Total accesses: 129697438 - Total Traffic: 6164.3 GB - Total Duration: 74581700752 CPU Usage: u219.29 s1117.4 cu13957400 cs1778870 - 153% CPU load 12.6 requests/sec - 0.6 MB/second - 49.8 kB/request - 575.044 ms/request 6 requests currently being processed, 5 idle workers W_WWWW___W._.................................................... ................................................................ ................................................................ ........ Scoreboard Key: "_" Waiting for Connection, "S" Starting up, "R" Reading Request, "W" Sending Reply, "K" Keepalive (read), "D" DNS Lookup, "C" Closing connection, "L" Logging, "G" Gracefully finishing, "I" Idle cleanup of worker, "." Open slot with no current process SrvPIDAccMCPU SSReqDurConnChildSlotClientProtocolVHostRequest 0-5693240/158/10223752W 29.180058675876740.012.42508246.75 10.0.1.163http/1.1dob.api.cloudioo.net:80GET /detection-back?detection_session_id=2022122807140870694b48 1-5614490/255/10151315_ 35.29027958202690690.012.26503907.69 10.0.0.129http/1.1lws.alb.cloudioo.net:81GET /shirt-432/index.html?clickid=63abdeae90228f00017bdcff&sub_ 2-56127590/125/10052664W 18.830057697242830.03.54498658.44 10.0.0.129http/1.1lws.alb.cloudioo.net:81GET /apkoyunlarindir2122938764aaa9-381/index.html HTTP/1.1 3-5694520/161/9953687W 25.500057223143060.09.12494992.03 10.0.1.163http/1.1dob.api.cloudioo.net:80POST /vizyon/notification?trans_id=2022122621241141d59b99fb0f67 4-56241680/9/9837173W 3.910056509374370.01.95489371.47 10.0.0.129http/1.1lws.alb.cloudioo.net:81GET /server-status HTTP/1.1 5-56213280/50/9696490W 4.950055603407310.00.79481407.84 10.0.1.67http/1.1lws.alb.cloudioo.net:81GET /index.html?monitoring=1 HTTP/1.1 6-56228290/27/9529723_ 4.90082554745118210.00.71474083.22 10.0.0.226http/1.1dob.api.cloudioo.net:80GET /detection-back?detection_session_id=202212280714088faa0512 7-56204040/57/9325628_ 7.410053489788400.03.52463584.75 10.0.42.216http/1.1dummy.cloudioo.net:80GET /elb_ping HTTP/1.1 8-56182880/78/9034641_ 12.09049051921383340.01.66447268.13 10.0.1.67http/1.1lws.alb.cloudioo.net:81GET /mcgossipf/index.html?w_id=15506179614&a_id=568072394609&p= 9-56107650/153/8662698W 20.350049664115970.03.74426200.28 10.0.0.129http/1.1lws.alb.cloudioo.net:81GET /telescope/requests HTTP/1.1 10-56-0/0/7935483. 0.0025045499298660.00.00381817.13 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 11-56184270/78/6898046_ 10.2707739357667010.02.28318294.97 10.0.0.226http/1.1secure-landings.api.cloudioo.neGET /redirect-to-opc/20221228071406TR63363abdeaeb6ab5 HTTP/1.1 12-56-0/0/5809747. 0.0050033164282890.00.00262168.75 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 13-56-0/0/4493212. 0.00113723425704335250.00.00200551.03 10.0.0.226http/1.1landings.api.cloudioo.net:80GET /session-status?cfg_sessionid=20221228065508FR89063abda3c87 14-56-0/0/3031571. 0.002328017513678300.00.00135664.70 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 15-56-0/0/1872984. 0.002233010955705100.00.0083793.65 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 16-56-0/0/1167245. 0.00247706927138290.00.0052306.22 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 17-56-0/0/739946. 0.002580804420655670.00.0033006.21 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 18-56-0/0/446859. 0.002582502724181200.00.0019735.86 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 19-56-0/0/252968. 0.003135601567427270.00.0011208.95 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 20-56-0/0/143212. 0.00315710912013950.00.006541.80 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 21-56-0/0/83481. 0.00313940542920930.00.003607.04 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 22-56-0/0/51506. 0.00372170346124690.00.002371.26 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 23-56-0/0/39136. 0.00394370263424680.00.001760.40 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 24-56-0/0/33489. 0.00393130230475160.00.001597.95 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 25-56-0/0/26090. 0.00394400181325790.00.001164.22 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 26-56-0/0/25037. 0.00392251139173324230.00.001189.45 10.0.0.226http/1.1landings.api.cloudioo.net:80GET /session-status?cfg_sessionid=20221227202021TR52263ab457598 27-56-0/0/17135. 0.00393630125846230.00.00770.89 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 28-56-0/0/8962. 0.0039442072418330.00.00379.34 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 29-56-0/0/7986. 0.0045520064702900.00.00321.60 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 30-56-0/0/6588. 0.0045493056747330.00.00271.79 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 31-56-0/0/5261. 0.0068734041694320.00.00202.39 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 32-56-0/0/6326. 0.0068671048638910.00.00284.19 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 33-56-0/0/4830. 0.0068720038831140.00.00201.29 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 34-56-0/0/4573. 0.0068719038960040.00.00193.94 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 35-56-0/0/3867. 0.0068707032967930.00.00155.34 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 36-56-0/0/5243. 0.0068714039911060.00.00203.79 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 37-56-0/0/2991. 0.0068697027625690.00.00124.26 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 38-56-0/0/4091. 0.0068747035786120.00.00190.05 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 39-56-0/0/4709. 0.0068700036280830.00.00209.47 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 40-56-0/0/5300. 0.0068695040702930.00.00240.52 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 41-56-0/0/5724. 0.0068692043554240.00.00252.98 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 42-56-0/0/4443. 0.0068490135992820.00.00201.45 10.0.0.226http/1.1landings.api.cloudioo.net:80GET /services/sdic/init_ts/MTY3MjEzOTU1NzEzNg==?callback=jQuery 43-56-0/0/3066. 0.0068699025939950.00.00118.04 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 44-56-0/0/3349. 0.0068705028052780.00.00171.25 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 45-56-0/0/2617. 0.006848023924932090.00.00114.36 10.0.1.163http/1.1dob.api.cloudioo.net:80GET /detection-back?detection_session_id=20221227121247dff37731 46-56-0/0/1727. 0.0068688019830550.00.0062.28 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 47-56-0/0/2520. 0.0068704023839190.00.00114.37 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 48-56-0/0/3124. 0.0068701025906530.00.00132.44 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 49-56-0/0/2601. 0.0068497024483190.00.00114.89 ::1http/1.1lws.alb.cloudioo.net:81OPTIONS * HTTP/1.0 50-56-0/0/1468. 0.0068742016773770.00.0072.02 ::1http/1.1lws.alb.cloudioo.net:81OPTIO
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cdafa5447dafa5447c106d19911f985ec281ff2be4f216b68
Found 18 files trough .DS_Store spidering: /403 /404 /about /canada.php /doctors /elders /emergency /employers /families /favicon.ico /gyms /index.html /military /other /patients /schools /sports /static
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522cc83ee96
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:xombo/xombo.com.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
cliquesurtoi-app.akufen-server.ca 6 totaraschema.zoola.io 5 d.pro5210.com 3 www.omne.com 3 d.pro5211.com 3 d.pro5212.com 3 watch.screener.idvu.us 3 www.striveweekly.com 3 xombo.jp 2 funtopvideos.com 2 interactive.guru 2 www.faisal.cx 1 mamamiafresno.com 1 hlsujdm.com 1 59t2kc084tu.xyz 1 kingofmacedoniaus2.vip 1 www.snacklegrand.de 1 apply.qfinancial.ie 1 faisal.cx 1