openresty 1.19.3.1
tcp/443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ba8de5f0ba8de5f0ba8de5f0ba8de5f0ba8de5f0ba8de5f0
Laravel Telescope enabled at https://23.209.118.73
Open service 23.209.118.73:443
2024-06-14 06:20
HTTP/1.1 502 Bad Gateway Server: openresty/1.19.3.1 Date: Fri, 14 Jun 2024 06:20:33 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: close x-request-id: MTAzLjEwNy44OS4xMDQ6NDQzOjoyMDI0LTA2LTE0IDE0OjIwOjMz Page title: 502 Bad Gateway <html> <head><title>502 Bad Gateway</title></head> <body> <center><h1>502 Bad Gateway</h1></center> <hr><center>openresty/1.19.3.1</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->