https://unithomasmore.edu.ni/

Analyzed on January 14, 2026, 5:53 p.m. Click "Rescan Website" to get the latest data

Analysis Successful
Network Information
IP Address: 181.78.116.19
IP WHOIS Information:
  • ASN: 52468
  • ASN Description: UFINET PANAMA S.A., PA
  • Country: AR
  • Description: Ufinet Costa Rica, S. A.
  • CIDR: 181.78.112.0/21
Domain Information
DNS Records
Learn about DNS Records
A Records (IPv4 Addresses)
Domain IP Address
unithomasmore.edu.ni 181.78.116.19
MX Records (Mail Servers)
Priority Mail Server
0 unithomasmore-edu-ni.mail.protection.outlook.com.
TXT Records
Domain Text Record
unithomasmore.edu.ni "v=spf1 include:one.zoho.com include:spf.protection.outlook.com ~all"
unithomasmore.edu.ni "google-site-verification=Z8UIFHpBiGrWzzUIMY0E3LbWI_EmYhBmuIG7hjPY71U"
WWW Subdomain Records
Subdomain Type Value
www.unithomasmore.edu.ni A 181.78.116.19
Services Detected (2 found)
Office 365
Office 365

Email hosted on Office 365

Learn More
Google Search Console
Google Search Console

Google Search Console services detected

Learn More
Blocklisting Status
Learn about Blocklisting Status
Overall Status: CLEAN No blocklisting detected
Services Checked: 2
VirusTotal: CLEAN
Domain is clean according to 0 scanners
No threats detected by any security scanner
Google Safe Browsing: CLEAN
Domain is not blocklisted by Google Safe Browsing
No threats detected
Hosting Information
Provider: Unknown (Apache) (low confidence)
Detection Method: Server Header Pattern
Matched Headers:
  • server: apache/2.4.52 (ubuntu)
SSL/TLS Security
Learn about SSL/TLS Security
TLS Version: TLSv1.3
SSL Certificate:
  • Certificate Type: DV (Domain Validated - Basic Security)
  • Subject: *.unithomasmore.edu.ni
  • Certificate Authority (CA): RapidSSL TLS RSA CA G1
    DigiCert Inc
    www.digicert.com
    US
  • Valid From: Dec 11 00:00:00 2025 GMT
  • Valid Until: Jan 11 23:59:59 2027 GMT
  • Serial Number: 0D02FD5AC03CD971C0287F8EB87CD7AC
SSL Certificate Status: Good
Your SSL certificate is valid for 361 more days.
Certificate expires on Jan 11 23:59:59 2027 GMT
WordPress Security Analysis
FAILED
Learn about WordPress Security Analysis
XMLRPC.php Security Test FAILED

XMLRPC.php is accessible and vulnerable

HTTP Status: 200

Recommendation: Protect xmlrpc.php via firewall rules or disable it completely. Consider using security plugins or server-level blocking.
WP-Login.php Security Test FAILED

WP-Login page is accessible without CAPTCHA protection

HTTP Status: 200

Recommendation: Implement CAPTCHA protection on wp-login.php and consider using a firewall to block brute force attacks.
User Enumeration Test FAILED

User enumeration is possible via WordPress REST API

Test Results:

Endpoint: https://unithomasmore.edu.ni/wp-json/wp/v2/users

Status: FAILED

Message: User enumeration possible - 3 users found

HTTP Status: 200

Endpoint: https://unithomasmore.edu.ni/?rest_route=/wp/v2/users

Status: FAILED

Message: User enumeration possible - 3 users found

HTTP Status: 200

Users Found:
Recommendation: Require authentication for WordPress REST API or disable user enumeration. Consider using security plugins or server-level restrictions.
Failed Security Tests:
  • XMLRPC
  • WP-Login
  • User Enumeration
Security Headers Analysis
Need help understanding security headers? View our comprehensive documentation to learn about each header and how to implement them.
Present Security Headers

No security headers detected

Missing Security Headers
Strict-Transport-Security
X-Content-Type-Options
X-Frame-Options
X-XSS-Protection
Referrer-Policy
Content-Security-Policy
Permissions-Policy
Cross-Origin-Embedder-Policy
Cross-Origin-Opener-Policy
Cross-Origin-Resource-Policy
Malware Analysis Details
Suspicious Patterns Detected
Suspicious setTimeout with redirect

Delayed redirect that could be malicious

Severity: MEDIUM

Matches Found: 1

Sample Matches:
setTimeout(hide_message, 3000); } } function hide_message() { document.getElementById("wpcp-error-message").className = "msgmsg-box-wpcp warning-wpcp hideme"; } </script> <style> @media print { body * {display: none !important;} body:after { content: "No puedes contenido de la web por motivos de seguridad, Gracias"; } } </style> <style type="text/css"> #wpcp-error-message { direction: ltr; text-align: center; transition: opacity 900ms ease 0s; z-index: 99999999; } .hideme { opacity:0; visibility: hidden; } .showme { opacity:1; visibility: visible; } .msgmsg-box-wpcp { border:1px solid #f5aca6; border-radius: 10px; color: #555; font-family: Tahoma; font-size: 11px; margin: 10px; padding: 10px 36px; position: fixed; width: 255px; top: 50%; left: 50%; margin-top: -10px; margin-left: -130px; -webkit-box-shadow: 0px 0px 34px 2px rgba(242,191,191,1); -moz-box-shadow: 0px 0px 34px 2px rgba(242,191,191,1); box-shadow: 0px 0px 34px 2px rgba(242,191,191,1); } .msgmsg-box-wpcp span { font-weight:bold; text-transform:uppercase; } .warning-wpcp { background:#ffecec url('https://unithomasmore.edu.ni/wp-content/plugins/wp-content-copy-protector/images/warning.png') no-repeat 10px 50%; } </style> <div data-elementor-type="popup" data-elementor-id="3300" class="elementor elementor-3300 elementor-location
Recommendations
  • Review and clean suspicious HTML patterns
  • Consider using a Web Application Firewall (WAF)
HTTP Headers
Learn about HTTP Headers
HTTP Response Code
200 OK - Request successful
HTTP Protocol Version
Your website is using HTTP/1.1

Recommendation: Consider upgrading to HTTP/2 or HTTP/3 for better performance. You can:

  • Enable HTTP/2 on your web server
  • Use Cloudflare or similar CDN services that support HTTP/2 and HTTP/3
  • Configure your hosting provider's settings to enable HTTP/2

Information Disclosure: Server Version

Header: server
Value: Apache/2.4.52 (Ubuntu)

Server Type: Apache

The Server header reveals server version information, which can be used by attackers to identify vulnerabilities.
Gzip Compression Enabled 👍

Great! This site is using Gzip compression to improve performance and reduce bandwidth usage.

Header Value
date Wed, 14 Jan 2026 17:53:42 GMT
link <https://unithomasmore.edu.ni/wp-json/>; rel="https://api.w.org/", <https://unithomasmore.edu.ni/wp-json/wp/v2/pages/532>; rel="alternate"; title="JSON"; type="application/json", <https://unithomasmore.edu.ni/>; rel=shortlink
vary Accept-Encoding
server Apache/2.4.52 (Ubuntu)
connection Keep-Alive
keep-alive timeout=5, max=100
content-type text/html; charset=UTF-8
http_version HTTP/1.1
content-length 30851
content-encoding gzip
Service Disclaimer

Free Service: This website security analyzer is provided as a free service to help website owners and administrators identify potential security issues and improve their website's security posture.

Donations: We welcome and appreciate donations to help us maintain and improve this service. Your support helps us keep this tool free and continuously enhance its capabilities.

Affiliate Links: We may use affiliate links for various security services, hosting providers, and security tools mentioned throughout this analysis. If you choose to purchase any of these services through our links, we may receive a small commission at no additional cost to you. This helps support the development and maintenance of this free service.

Support Our Service

Help us keep this tool free and improve it further

Please wait, running the scan...
This may take a few moments