nginx
tcp/443 tcp/80
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Open service 43.159.99.102:80 · api.kkl1.com
2026-01-23 02:26
HTTP/1.1 404 Not Found Server: nginx Content-Type: text/plain Access-Control-Allow-Credentials: true Access-Control-Allow-Headers: Content-Type,ignoreCancelToken,AccessToken,X-CSRF-Token,Authorization,Token,X-Token,X-User-Id,Current-Language Access-Control-Allow-Methods: POST,GET,OPTIONS,DELETE,PUT Access-Control-Allow-Origin: * Access-Control-Expose-Headers: Content-Length, Access-Control-Allow-Origin, Access-Control-Allow-Headers, Content-Type, New-Token, New-Expires-At Content-Length: 18 Connection: close Date: Fri, 23 Jan 2026 02:26:54 GMT EO-LOG-UUID: 205098216818532767 EO-Cache-Status: MISS 404 page not found
Open service 43.159.98.10:443 · api.kkl1.com
2026-01-23 02:26
HTTP/1.1 404 Not Found Server: nginx Content-Type: text/plain Access-Control-Allow-Credentials: true Access-Control-Allow-Headers: Content-Type,ignoreCancelToken,AccessToken,X-CSRF-Token,Authorization,Token,X-Token,X-User-Id,Current-Language Access-Control-Allow-Methods: POST,GET,OPTIONS,DELETE,PUT Access-Control-Allow-Origin: * Access-Control-Expose-Headers: Content-Length, Access-Control-Allow-Origin, Access-Control-Allow-Headers, Content-Type, New-Token, New-Expires-At Content-Length: 18 Connection: close Date: Fri, 23 Jan 2026 02:26:51 GMT EO-LOG-UUID: 12035252118861106084 EO-Cache-Status: MISS 404 page not found