cloudflare
tcp/443
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa38ffa23e7df2122d54649518b021701983acb24b8
GraphQL introspection enabled at /graphql Types: 77 (by kind: ENUM: 12, INPUT_OBJECT: 27, OBJECT: 31, SCALAR: 7) Operations: - Query: Query | fields: getCombinedCounts, getStation, getStationCounts, getStations, stationsExcel - Mutation: Mutation | fields: createCharger, createStation, deleteStation, updateStation, updateStationStatus Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3ee1a082b6fe98a696b9a43ff11b5d1d4ace1ffb4
GraphQL introspection enabled at /graphql Types: 76 (by kind: ENUM: 11, INPUT_OBJECT: 27, OBJECT: 31, SCALAR: 7) Operations: - Query: Query | fields: getCombinedCounts, getStation, getStationCounts, getStations, stationsExcel - Mutation: Mutation | fields: createCharger, createStation, deleteStation, updateStation, updateStationStatus Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa39738099f4e3c162d1e5226a3cbcf2ad0408469c0
GraphQL introspection enabled at /graphql Types: 75 (by kind: ENUM: 10, INPUT_OBJECT: 27, OBJECT: 31, SCALAR: 7) Operations: - Query: Query | fields: getCombinedCounts, getStation, getStationCounts, getStations, stationsExcel - Mutation: Mutation | fields: createCharger, createStation, deleteStation, updateStation, updateStationStatus Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa35cbdef85138b3a471f1462e98c6dcf8654999822
GraphQL introspection enabled at /graphql Types: 74 (by kind: ENUM: 10, INPUT_OBJECT: 27, OBJECT: 30, SCALAR: 7) Operations: - Query: Query | fields: getCombinedCounts, getStation, getStationCounts, getStations, stationsExcel - Mutation: Mutation | fields: createCharger, createStation, deleteStation, updateStation, updateStationStatus Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3901624bcb3e56c807374e0aebc2f1e31688f9a0d
GraphQL introspection enabled at /graphql Types: 70 (by kind: ENUM: 10, INPUT_OBJECT: 25, OBJECT: 28, SCALAR: 7) Operations: - Query: Query | fields: getChargers, getStation, getStationCounts, getStations, stationsExcel - Mutation: Mutation | fields: createCharger, createStation, deleteStation, updateStation, updateStationStatus Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1bf890109bf890109bf890109bf890109bf890109bf890109
Public Swagger UI/API detected at path: /api-docs/swagger.json
Open service 172.67.138.180:443 · hivecharge.click
2026-01-23 08:43
HTTP/1.1 200 OK
Date: Fri, 23 Jan 2026 08:43:03 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Server: cloudflare
last-modified: Fri, 29 Jan 2021 11:47:45 GMT
x-frame-options: SAMEORIGIN
Server-Timing: cfCacheStatus;desc="DYNAMIC"
Server-Timing: cfEdge;dur=171,cfOrigin;dur=35
Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=iOYm6zH890LaykeMYnWee%2FN1ziQ87h8x4CaENnxE%2BOXDRu2OmgpZw9goUckKBzw6iluelbfepSCtUeK6cXljo%2F%2F61TIpnoRFtdKlZgehtqg%3D"}]}
vary: accept-encoding
cf-cache-status: DYNAMIC
CF-RAY: 9c2600532bd09bda-SIN
alt-svc: h3=":443"; ma=86400
Page title: alphaseed
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>alphaseed</title>
<base href="/">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="icon" type="image/x-icon" href="favicon.ico">
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.1/css/bootstrap.min.css">
<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js"></script>
<script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.1/js/bootstrap.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.16.0/umd/popper.min.js"></script>
<!-- <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.1/js/bootstrap.min.js"></script> -->
<link rel="stylesheet" type="text/css" href="https://swimlane.github.io/ngx-datatable/assets/icons.css" />
<link rel="stylesheet" type="text/css"
href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" />
<script>
var global = global || window;
var Buffer = Buffer || [];
var process = process || {
env: {
DEBUG: undefined
},
version: []
};
</script>
</head>
<body>
<app-root></app-root>
<script>
// document.addEventListener('contextmenu', event => event.preventDefault());
</script>
<script src="runtime-es2015.js" type="module"></script><script src="runtime-es5.js" nomodule defer></script><script src="polyfills-es5.js" nomodule defer></script><script src="polyfills-es2015.js" type="module"></script><script src="styles-es2015.js" type="module"></script><script src="styles-es5.js" nomodule defer></script><script src="scripts.js" defer></script><script src="vendor-es2015.js" type="module"></script><script src="vendor-es5.js" nomodule defer></script><script src="main-es2015.js" type="module"></script><script src="main-es5.js" nomodule defer></script><script defer src="https://static.cloudflareinsights.com/beacon.min.js/vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"a5511032ff6543f0b0d644772a70def0","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
</body>
<script src=”http://maps.googleapis.com/maps/api/js?key=API-KEY"> </script>
</html>
Open service 104.21.54.128:443 · dev-api.hivecharge.click
2026-01-23 00:15
HTTP/1.1 404 Not Found
Date: Fri, 23 Jan 2026 00:16:00 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Server: cloudflare
Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=XUj925Z%2Bt2WOk3JOebJaCwDR3is3C2FRbTYQdFyhsQxUgN3TTk6BkW%2Fq1ipOMM5Gj%2By0zBpgagQ%2FVTvJVM1gPTqQP3%2BL9W3gFORYTQPg8ZlzJIoKGWMoog%3D%3D"}]}
cf-cache-status: DYNAMIC
vary: accept-encoding
Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
CF-RAY: 9c2319952d0165c4-FRA
alt-svc: h3=":443"; ma=86400
Page title: 404 Not Found
<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/1.18.0 (Ubuntu)</center>
</body>
</html>