WordPress Vulnerability ReportYour WordPress website is potentially vulnerable to attack!
Scan URL: https://hottelecom.net/
Scan Date: (UTC+1)
Risk Factor: 0
ErrorWe have detected an error while scanning your website. The error was:
Please whitelist our scanner IP-address: 18.104.22.168 (scanner.wpsec.com)
Signup for free and view the full report
Is my site really safe?
We have a good indication that your site is safe. This means that currently your data is probably safe. It is essential that you always keep your WordPress up to date. Below we will give you more information about how to improve security and some tips to prevent future vulnerabilities. Disclaimer: Since we used automated software there could be a small chance that your site is vulnerable because we made a false negative. Also, we don't test if the passwords you use are secure so you should do that yourself. In addition, we don't provide a full overview of all vulnerabilities and we don't scan your server for server security.
What did we scan?
WPSec.com uses the advanced scanning technology of WPScan which we combine with our own intelligent scanning algorithms. We scan for known bugs that have been indexed in the WPScan Vulnerability Database, which contains over 14000 reported vulnerabilities. Our scanner tries to identify the plugins you run and will compare their versions against the bug database. In addition, we scan for several well-known mistakes that people make when setting up their WordPress installation. Many thanks to the WPScan Team for maintaining the bug database and providing a perfect vulnerability scanner to the community.
WordPress is out of dateYou are running an outdated WordPress version. Please update to the latest version.
Your are running WordPress version . This version is an outdated version of WordPress. It is best practice to keep your WordPress installation up to date. Therefore, it is essential to update to the newest version of WordPress. Automatically update in the WordPress backend or download the newest WordPress version from the link below.