Analysis Results
https://sanpedrodejujuy.gob.ar/
Analyzed on October 29, 2025, 1:52 a.m. Click "Rescan Website" to get the latest data
Analysis SuccessfulMALWARE DETECTED!
Severity Level: LOW
- Found 1 suspicious pattern(s)
DNS Records
A Records (IPv4 Addresses)
| Domain | IP Address |
|---|---|
sanpedrodejujuy.gob.ar |
147.79.109.240 |
MX Records (Mail Servers)
| Priority | Mail Server |
|---|---|
| 10 | mx2.hostinger.com. |
| 5 | mx1.hostinger.com. |
TXT Records
| Domain | Text Record |
|---|---|
sanpedrodejujuy.gob.ar |
"v=spf1 include:_spf.mail.hostinger.com ~all" |
WWW Subdomain Records
| Subdomain | Type | Value |
|---|---|---|
www.sanpedrodejujuy.gob.ar |
A | 147.79.109.240 |
Services Detected (0 found)
Blocklisting Status
No threats detected by any security scanner
No threats detected
Hosting Information
platform: hostinger
SSL/TLS Security
- Certificate Type: DV (Domain Validated - Basic Security)
- Subject: sanpedrodejujuy.gob.ar
-
Certificate Authority (CA):
R12
Let's Encrypt
US - Valid From: Oct 17 15:30:17 2025 GMT
- Valid Until: Jan 15 15:30:16 2026 GMT
- Serial Number:
069832199F5F3662915E03FD882C01F00E7F
Your SSL certificate expires in 77 days.
Please renew your certificate before Jan 15 15:30:16 2026 GMT to avoid service interruption.
Content Management System
Themes
1
Plugins
11
WordPress Security Analysis
FAILEDXMLRPC.php Security Test FAILED
XMLRPC.php is accessible and vulnerable
HTTP Status: 200
WP-Login.php Security Test FAILED
WP-Login page is accessible without CAPTCHA protection
HTTP Status: 200
User Enumeration Test FAILED
User enumeration is possible via WordPress REST API
Endpoint: https://sanpedrodejujuy.gob.ar/wp-json/wp/v2/users
Status: FAILED
Message: User enumeration possible - 10 users found
HTTP Status: 200
Endpoint: https://sanpedrodejujuy.gob.ar/?rest_route=/wp/v2/users
Status: FAILED
Message: User enumeration possible - 10 users found
HTTP Status: 200
| ID | Name | Slug | Link |
|---|---|---|---|
| 16 | adminbernis | adminbernis |
https://sanpedrodejujuy.gob.ar/author/adminbernis/ |
| 1 | adminmatias | adminmatias |
https://sanpedrodejujuy.gob.ar/author/adminmatias/ |
| 12 | ANA LORENA RÚA | adminlorena |
https://sanpedrodejujuy.gob.ar/author/adminlorena/ |
| 6 | GONZALO DIAZ | admingonzalo |
https://sanpedrodejujuy.gob.ar/author/admingonzalo/ |
| 5 | JUAN PINTO | adminjuan |
https://sanpedrodejujuy.gob.ar/author/adminjuan/ |
| 10 | LEO ANGEL | adminleo |
https://sanpedrodejujuy.gob.ar/author/adminleo/ |
| 15 | MACARENA ORQUERA | orqueramacarena |
https://sanpedrodejujuy.gob.ar/author/orqueramacarena/ |
| 11 | MAXIMILIANO QUINTEROS | adminquinteros |
https://sanpedrodejujuy.gob.ar/author/adminquinteros/ |
| 13 | RAUL RODRIGUEZ | adminraul |
https://sanpedrodejujuy.gob.ar/author/adminraul/ |
| 17 | ROMINA VIVOT | adminromina |
https://sanpedrodejujuy.gob.ar/author/adminromina/ |
Failed Security Tests:
- XMLRPC
- WP-Login
- User Enumeration
Security Headers Analysis
External JavaScripts Detected
Only scripts from different domains are shown| Domain | Script URL | Type |
|---|---|---|
| cdn.jsdelivr.net |
https://cdn.jsdelivr.net/npm/hls.js@latest?ver=2.5
|
External |
| player.vimeo.com |
https://player.vimeo.com/api/player.js?ver=2.5
|
External |
| tracker.metricool.com |
https://tracker.metricool.com/app/resources/be.js
|
Inline Reference |
Malware Analysis Details
Suspicious Patterns Detected
Suspicious innerHTML manipulation
Dynamic HTML content that could be used maliciously
Severity: LOW
Matches Found: 1
Sample Matches:
.innerHTML = "<style>"
Recommendations
- Review and clean suspicious HTML patterns
- Consider using a Web Application Firewall (WAF)
HTTP Headers
HTTP Response Code
200 OK - Request successfulHTTP Protocol Version
Your website is using a modern HTTP protocol version, which provides better performance and security features.
Information Disclosure: Server Version
Header: x-powered-by
Value: PHP/7.4.33
Server Type: PHP
The X-Powered-By header reveals server version information, which can be used by attackers to identify vulnerabilities.Information Disclosure: Server Version
Header: server
Value: LiteSpeed
Server Type: LiteSpeed
The Server header reveals server version information, which can be used by attackers to identify vulnerabilities.Gzip Compression Enabled 👍
Great! This site is using Gzip compression to improve performance and reduce bandwidth usage.
| Header | Value |
|---|---|
date |
Wed, 29 Oct 2025 01:52:52 GMT |
etag |
"21780-1761689747;gz" |
link |
<https://sanpedrodejujuy.gob.ar/wp-json/>; rel="https://api.w.org/", <https://sanpedrodejujuy.gob.ar/wp-json/wp/v2/pages/23638>; rel="alternate"; title="JSON"; type="application/json", <https://sanpedrodejujuy.gob.ar/>; rel=shortlink |
vary |
Accept-Encoding |
panel |
hpanel |
server |
LiteSpeed |
alt-svc |
h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46" |
platform |
hostinger |
content-type |
text/html; charset=UTF-8 |
http_version |
HTTP/2 |
x-powered-by |
PHP/7.4.33 |
content-length |
32432 |
content-encoding |
gzip |
x-litespeed-cache |
hit |
content-security-policy |
upgrade-insecure-requests |
Service Disclaimer
Free Service: This website security analyzer is provided as a free service to help website owners and administrators identify potential security issues and improve their website's security posture.
Donations: We welcome and appreciate donations to help us maintain and improve this service. Your support helps us keep this tool free and continuously enhance its capabilities.
Affiliate Links: We may use affiliate links for various security services, hosting providers, and security tools mentioned throughout this analysis. If you choose to purchase any of these services through our links, we may receive a small commission at no additional cost to you. This helps support the development and maintenance of this free service.
Support Our Service
Help us keep this tool free and improve it further