openresty 1.19.3.1
tcp/443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0b04aa3f2b04aa3f2b04aa3f2b04aa3f2b04aa3f2b04aa3f2
Laravel Telescope enabled at https://23.58.132.73
Open service 23.58.132.73:443
2024-06-15 21:57
HTTP/1.1 502 Bad Gateway Server: openresty/1.19.3.1 Date: Sat, 15 Jun 2024 21:57:16 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: close x-request-id: MTAzLjEwNy44OS4xMDQ6NDQzOjoyMDI0LTA2LTE2IDA1OjU3OjE2 Page title: 502 Bad Gateway <html> <head><title>502 Bad Gateway</title></head> <body> <center><h1>502 Bad Gateway</h1></center> <hr><center>openresty/1.19.3.1</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->