openresty 1.19.3.1
tcp/443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0479ca1ba479ca1ba479ca1ba479ca1ba479ca1ba479ca1ba
Laravel Telescope enabled at https://184.84.250.73
Fingerprint: 3ae8115d762f12d0f9bfa24cf9bfa24cf9bfa24cf9bfa24cf9bfa24cf9bfa24c
Laravel Telescope enabled at https://184.84.250.73/telescope/requests
Open service 184.84.250.73:443
2024-04-24 13:55
HTTP/1.1 502 Bad Gateway Server: openresty/1.19.3.1 Date: Wed, 24 Apr 2024 13:55:12 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: close x-request-id: MTAzLjEwNy44OS4xMDQ6NDQzOjoyMDI0LTA0LTI0IDIxOjU1OjEy Page title: 502 Bad Gateway <html> <head><title>502 Bad Gateway</title></head> <body> <center><h1>502 Bad Gateway</h1></center> <hr><center>openresty/1.19.3.1</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->