openresty 1.19.3.1
tcp/443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06163fa886163fa886163fa886163fa886163fa886163fa88
Laravel Telescope enabled at https://23.54.66.73
Open service 23.54.66.73:443
2024-09-09 17:52
HTTP/1.1 502 Bad Gateway Server: openresty/1.19.3.1 Date: Mon, 09 Sep 2024 17:52:42 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: close x-request-id: MTAzLjEwNy44OS4xMDQ6NDQzOjoyMDI0LTA5LTEwIDAxOjUyOjQy Page title: 502 Bad Gateway <html> <head><title>502 Bad Gateway</title></head> <body> <center><h1>502 Bad Gateway</h1></center> <hr><center>openresty/1.19.3.1</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->