openresty
tcp/443
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9f0be3b35a0be3b35a0be3b35a0be3b35a
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.14 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1926e27d0926e27d0926e27d0926e27d0926e27d0926e27d0
Public Swagger UI/API detected at path: /webjars/swagger-ui/index.html
Open service 107.175.235.207:22
2026-01-26 15:20
Open service 107.175.235.207:443 ยท pdf.riddle.codes
2026-01-22 19:19
HTTP/1.1 400 Bad Request Server: openresty Date: Thu, 22 Jan 2026 19:19:20 GMT Content-Type: text/html Content-Length: 252 Connection: close Page title: 400 The plain HTTP request was sent to HTTPS port <html> <head><title>400 The plain HTTP request was sent to HTTPS port</title></head> <body> <center><h1>400 Bad Request</h1></center> <center>The plain HTTP request was sent to HTTPS port</center> <hr><center>openresty</center> </body> </html>
Open service 107.175.235.207:22
2026-01-22 14:57