nginx 1.18.0
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff439a214f497982facdc5c71fb6552877008cf4821a
Public Swagger UI/API detected at path: /swagger.json - sample paths:
DELETE /chartrepo/{repo}/charts/{name}/{version}/labels/{id}
DELETE /repositories/{repo_name}/labels/{label_id}
DELETE /repositories/{repo_name}/tags/{tag}/labels/{label_id}
GET /chartrepo/health
GET /chartrepo/{repo}/charts
GET /chartrepo/{repo}/charts/{name}
GET /chartrepo/{repo}/charts/{name}/{version}
GET /chartrepo/{repo}/charts/{name}/{version}/labels
GET /configurations
GET /health
GET /labels
GET /labels/{id}
GET /labels/{id}/resources
GET /ldap/groups/search
GET /ldap/users/search
GET /logs
GET /projects
GET /projects/{project_id}
GET /projects/{project_id}/immutabletagrules
GET /projects/{project_id}/logs
GET /projects/{project_id}/members
GET /projects/{project_id}/members/{mid}
GET /projects/{project_id}/metadatas
GET /projects/{project_id}/metadatas/{meta_name}
GET /projects/{project_id}/robots
GET /projects/{project_id}/robots/{robot_id}
GET /projects/{project_id}/scanner
GET /projects/{project_id}/scanner/candidates
GET /projects/{project_id}/summary
GET /projects/{project_id}/webhook/jobs
GET /projects/{project_id}/webhook/lasttrigger
GET /projects/{project_id}/webhook/policies
GET /projects/{project_id}/webhook/policies/{policy_id}
GET /quotas
GET /quotas/{id}
GET /registries
GET /registries/{id}
GET /registries/{id}/info
GET /registries/{id}/namespace
GET /replication/adapters
GET /replication/executions
GET /replication/executions/{id}
GET /replication/executions/{id}/tasks
GET /replication/executions/{id}/tasks/{task_id}/log
GET /replication/policies
GET /replication/policies/{id}
GET /repositories
GET /repositories/top
GET /repositories/{repo_name}/labels
GET /repositories/{repo_name}/signatures
GET /repositories/{repo_name}/tags
GET /repositories/{repo_name}/tags/{tag}
GET /repositories/{repo_name}/tags/{tag}/labels
GET /repositories/{repo_name}/tags/{tag}/manifest
GET /repositories/{repo_name}/tags/{tag}/scan
GET /repositories/{repo_name}/tags/{tag}/scan/{uuid}/log
GET /retentions/metadatas
GET /retentions/{id}
GET /retentions/{id}/executions
GET /retentions/{id}/executions/{eid}/tasks
GET /retentions/{id}/executions/{eid}/tasks/{tid}
GET /scanners
GET /scanners/{registration_id}
GET /scanners/{registration_id}/metadata
GET /scans/all/metrics
GET /scans/schedule/metrics
GET /search
GET /statistics
GET /system/CVEWhitelist
GET /system/gc
GET /system/gc/schedule
GET /system/gc/{id}
GET /system/gc/{id}/log
GET /system/scanAll/schedule
GET /systeminfo
GET /systeminfo/getcert
GET /systeminfo/volumes
GET /usergroups
GET /usergroups/{group_id}
GET /users
GET /users/current
GET /users/current/permissions
GET /users/search
GET /users/{user_id}
PATCH /retentions/{id}/executions/{eid}
POST /chartrepo/charts
POST /chartrepo/{repo}/prov
POST /email/ping
POST /internal/syncquota
POST /internal/syncregistry
POST /ldap/ping
POST /ldap/users/import
POST /projects/{project_id}/webhook/policies/test
POST /registries/ping
POST /retentions
POST /scanners/ping
POST /system/oidc/ping
PUT /internal/switchquota
PUT /projects/{project_id}/immutabletagrules/{id}
PUT /repositories/{repo_name}
PUT /users/{user_id}/cli_secret
PUT /users/{user_id}/password
PUT /users/{user_id}/sysadmin
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff439a214f497982facdc5c71fb6552877008cf4821a
Public Swagger UI/API detected at path: /swagger.json - sample paths:
DELETE /chartrepo/{repo}/charts/{name}/{version}/labels/{id}
DELETE /repositories/{repo_name}/labels/{label_id}
DELETE /repositories/{repo_name}/tags/{tag}/labels/{label_id}
GET /chartrepo/health
GET /chartrepo/{repo}/charts
GET /chartrepo/{repo}/charts/{name}
GET /chartrepo/{repo}/charts/{name}/{version}
GET /chartrepo/{repo}/charts/{name}/{version}/labels
GET /configurations
GET /health
GET /labels
GET /labels/{id}
GET /labels/{id}/resources
GET /ldap/groups/search
GET /ldap/users/search
GET /logs
GET /projects
GET /projects/{project_id}
GET /projects/{project_id}/immutabletagrules
GET /projects/{project_id}/logs
GET /projects/{project_id}/members
GET /projects/{project_id}/members/{mid}
GET /projects/{project_id}/metadatas
GET /projects/{project_id}/metadatas/{meta_name}
GET /projects/{project_id}/robots
GET /projects/{project_id}/robots/{robot_id}
GET /projects/{project_id}/scanner
GET /projects/{project_id}/scanner/candidates
GET /projects/{project_id}/summary
GET /projects/{project_id}/webhook/jobs
GET /projects/{project_id}/webhook/lasttrigger
GET /projects/{project_id}/webhook/policies
GET /projects/{project_id}/webhook/policies/{policy_id}
GET /quotas
GET /quotas/{id}
GET /registries
GET /registries/{id}
GET /registries/{id}/info
GET /registries/{id}/namespace
GET /replication/adapters
GET /replication/executions
GET /replication/executions/{id}
GET /replication/executions/{id}/tasks
GET /replication/executions/{id}/tasks/{task_id}/log
GET /replication/policies
GET /replication/policies/{id}
GET /repositories
GET /repositories/top
GET /repositories/{repo_name}/labels
GET /repositories/{repo_name}/signatures
GET /repositories/{repo_name}/tags
GET /repositories/{repo_name}/tags/{tag}
GET /repositories/{repo_name}/tags/{tag}/labels
GET /repositories/{repo_name}/tags/{tag}/manifest
GET /repositories/{repo_name}/tags/{tag}/scan
GET /repositories/{repo_name}/tags/{tag}/scan/{uuid}/log
GET /retentions/metadatas
GET /retentions/{id}
GET /retentions/{id}/executions
GET /retentions/{id}/executions/{eid}/tasks
GET /retentions/{id}/executions/{eid}/tasks/{tid}
GET /scanners
GET /scanners/{registration_id}
GET /scanners/{registration_id}/metadata
GET /scans/all/metrics
GET /scans/schedule/metrics
GET /search
GET /statistics
GET /system/CVEWhitelist
GET /system/gc
GET /system/gc/schedule
GET /system/gc/{id}
GET /system/gc/{id}/log
GET /system/scanAll/schedule
GET /systeminfo
GET /systeminfo/getcert
GET /systeminfo/volumes
GET /usergroups
GET /usergroups/{group_id}
GET /users
GET /users/current
GET /users/current/permissions
GET /users/search
GET /users/{user_id}
PATCH /retentions/{id}/executions/{eid}
POST /chartrepo/charts
POST /chartrepo/{repo}/prov
POST /email/ping
POST /internal/syncquota
POST /internal/syncregistry
POST /ldap/ping
POST /ldap/users/import
POST /projects/{project_id}/webhook/policies/test
POST /registries/ping
POST /retentions
POST /scanners/ping
POST /system/oidc/ping
PUT /internal/switchquota
PUT /projects/{project_id}/immutabletagrules/{id}
PUT /repositories/{repo_name}
PUT /users/{user_id}/cli_secret
PUT /users/{user_id}/password
PUT /users/{user_id}/sysadmin
Open service 82.81.95.47:443 · virtual-puppets.com
2026-02-10 11:44
HTTP/1.1 404 Not Found Content-Type: text/plain; charset=utf-8 X-Content-Type-Options: nosniff Date: Tue, 10 Feb 2026 11:44:22 GMT Content-Length: 19 Connection: close 404 page not found
Open service 82.81.95.47:80 · litigators.co.il
2026-02-04 11:44
HTTP/1.1 307 Temporary Redirect Content-Type: text/html; charset=utf-8 Location: https://litigators.co.il/ Date: Wed, 04 Feb 2026 11:44:09 GMT Content-Length: 61 Connection: close <a href="https://litigators.co.il/">Temporary Redirect</a>.
Open service 82.81.95.47:443 · push2reg.com
2026-01-22 22:24
HTTP/1.1 404 Not Found Content-Type: text/plain; charset=utf-8 X-Content-Type-Options: nosniff Date: Thu, 22 Jan 2026 22:24:52 GMT Content-Length: 19 Connection: close 404 page not found
Open service 82.81.95.47:443 · www.push2reg.com
2026-01-22 18:50
HTTP/1.1 404 Not Found Content-Type: text/plain; charset=utf-8 X-Content-Type-Options: nosniff Date: Thu, 22 Jan 2026 18:50:45 GMT Content-Length: 19 Connection: close 404 page not found
Open service 82.81.95.47:443 · icturn.netalert.io
2026-01-11 17:38
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Cache-Control: public, max-age=0
Content-Length: 467
Content-Type: text/html; charset=utf-8
Date: Sun, 11 Jan 2026 17:38:59 GMT
Etag: W/"1d3-19ba2f02dc0"
Last-Modified: Fri, 09 Jan 2026 13:26:48 GMT
Server: nginx/1.18.0 (Ubuntu)
Set-Cookie: zr_sticky_session=MTc2ODE1MzEzOXxEWDhFQVFMX2dBQUJFQUVRQUFCU180QUFBZ1p6ZEhKcGJtY01Ed0FOZW5KZmMybGtYMjl5YVdkcGJnWnpkSEpwYm1jTURnQU1NVEF1TVRBdU1UQXVNVE0wQm5OMGNtbHVad3dPQUF4NmNsOXphV1JmYVc1a1pYZ0RhVzUwQkFJQUFBPT18ItX1b30VmKChHBh1dcLSKsUeeVfwIX_7aZnAQtm8EeM=; Path=/; Expires=Mon, 12 Jan 2026 17:38:59 GMT; Max-Age=86400
X-Powered-By: Express
X-Proxy-By: zoraxy/3.2.0
Connection: close
Page title: blazing-chromosphere
<!doctype html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<link rel="icon" type="image/svg+xml" href="/vite.svg" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>blazing-chromosphere</title>
<script type="module" crossorigin src="/assets/index-BFJtjM9C.js"></script>
<link rel="stylesheet" crossorigin href="/assets/index-CRhX2jHP.css">
</head>
<body>
<div id="root"></div>
</body>
</html>
Open service 82.81.95.47:80 · icturn.netalert.io
2026-01-11 17:38
HTTP/1.1 307 Temporary Redirect Content-Type: text/html; charset=utf-8 Location: https://icturn.netalert.io/ Date: Sun, 11 Jan 2026 17:39:02 GMT Content-Length: 63 Connection: close <a href="https://icturn.netalert.io/">Temporary Redirect</a>.