nginx
tcp/443 tcp/80
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6ba1b2fa06
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /device/data
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /turn/credentials
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6b2857e481
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6bf1fabde6
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /turn/credentials
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6b2857e481
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6bf1fabde6
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /turn/credentials
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6b2857e481
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60b2ea5f828fc0503d0d9f7319866afd6b2857e481
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths:
GET /account/profile
GET /auth/register
GET /auth/rotate-secret
GET /customlobby
GET /device
GET /experiences
GET /experiences/{experienceId}/invitation
GET /headsetcenters
GET /langs
GET /lobby/get-version
GET /lobbycore
GET /servicecore
GET /setup/download/{id}
GET /setup/get-last-version
GET /videoplayer
GET /videoplayer/get-download-url
GET /videoplayer/get-last-version
PATCH /experiences/{experienceId}/installed
PATCH /experiences/{experienceId}/removed
POST /auth/login
POST /auth/refresh
POST /experiences/session/{experienceId}/{experienceType}/started
POST /experiences/session/{sessionId}/stopped
POST /experiences/{experienceId}/notations
POST /experiences/{experienceId}/notations/{notationId}/screenshot
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60bbf16caa188b5e2c6cf374eeaac1bc803ce86fa4
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /account/get-experience GET /account/get-session GET /chapter GET /dev/changelog/get-latest GET /dev/version GET /end GET /initialize GET /manage/close GET /manage/retry GET /manage/start GET /reporting/check POST /account/generate-access-token POST /account/save-experience POST /action POST /dev/changelog/set POST /manage/update POST /reporting/send POST /reporting/upload-screenshot POST /save
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60bbf16caa188b5e2c6cf374eeaac1bc803ce86fa4
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /account/get-experience GET /account/get-session GET /chapter GET /dev/changelog/get-latest GET /dev/version GET /end GET /initialize GET /manage/close GET /manage/retry GET /manage/start GET /reporting/check POST /account/generate-access-token POST /account/save-experience POST /action POST /dev/changelog/set POST /manage/update POST /reporting/send POST /reporting/upload-screenshot POST /save
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60bbf16caa188b5e2c6cf374eeaac1bc803ce86fa4
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /account/get-experience GET /account/get-session GET /chapter GET /dev/changelog/get-latest GET /dev/version GET /end GET /initialize GET /manage/close GET /manage/retry GET /manage/start GET /reporting/check POST /account/generate-access-token POST /account/save-experience POST /action POST /dev/changelog/set POST /manage/update POST /reporting/send POST /reporting/upload-screenshot POST /save
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d60bbf16caa188b5e2c6cf374eeaac1bc803ce86fa4
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /account/get-experience GET /account/get-session GET /chapter GET /dev/changelog/get-latest GET /dev/version GET /end GET /initialize GET /manage/close GET /manage/retry GET /manage/start GET /reporting/check POST /account/generate-access-token POST /account/save-experience POST /action POST /dev/changelog/set POST /manage/update POST /reporting/send POST /reporting/upload-screenshot POST /save
Open service 85.208.144.202:443 · sdk.vrcxp.com
2026-01-10 00:13
HTTP/1.1 301 Moved Permanently Server: nginx Date: Sat, 10 Jan 2026 00:13:19 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.vrcxp.com
2026-01-09 23:07
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 23:07:46 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-standalone.vrcxp.com
2026-01-09 20:05
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 20:05:16 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-standalone.vrcxp.com
2026-01-09 20:03
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 20:03:34 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · sdk.inversive.fr
2026-01-09 15:26
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 15:26:41 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-sdk.vrcxp.com
2026-01-09 08:17
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 08:17:52 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-sdk.vrcxp.com
2026-01-09 03:54
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 09 Jan 2026 03:54:04 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.inversive.fr
2026-01-08 23:47
HTTP/1.1 301 Moved Permanently Server: nginx Date: Thu, 08 Jan 2026 23:47:18 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · vrcxp.com
2026-01-03 23:26
HTTP/1.1 301 Moved Permanently Server: nginx Date: Sat, 03 Jan 2026 23:26:03 GMT Content-Type: text/html Content-Length: 178 Connection: close Location: https://platform.inversive.fr/ Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body bgcolor="white"> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 85.208.144.202:80 · vrcxp.com
2026-01-03 23:26
HTTP/1.1 301 Moved Permanently Server: nginx Date: Sat, 03 Jan 2026 23:26:03 GMT Content-Type: text/html Content-Length: 178 Connection: close Location: https://vrcxp.com/ X-Clacks-Overhead: GNU Terry Pratchett Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body bgcolor="white"> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 85.208.144.202:443 · sdk.vrcxp.com
2026-01-02 20:08
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 20:08:45 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-standalone.vrcxp.com
2026-01-02 18:24
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 18:24:53 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-standalone.vrcxp.com
2026-01-02 18:21
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 18:21:07 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · sdk.inversive.fr
2026-01-02 17:21
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 17:21:17 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.vrcxp.com
2026-01-02 13:11
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 13:11:03 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-sdk.vrcxp.com
2026-01-02 12:04
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 12:04:22 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-sdk.vrcxp.com
2026-01-02 09:09
HTTP/1.1 301 Moved Permanently Server: nginx Date: Fri, 02 Jan 2026 09:10:00 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.inversive.fr
2026-01-01 21:55
HTTP/1.1 301 Moved Permanently Server: nginx Date: Thu, 01 Jan 2026 21:55:11 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · sdk.vrcxp.com
2025-12-23 08:29
HTTP/1.1 301 Moved Permanently Server: nginx Date: Tue, 23 Dec 2025 08:29:29 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-sdk.vrcxp.com
2025-12-23 04:00
HTTP/1.1 301 Moved Permanently Server: nginx Date: Tue, 23 Dec 2025 04:00:44 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-standalone.vrcxp.com
2025-12-23 00:08
HTTP/1.1 301 Moved Permanently Server: nginx Date: Tue, 23 Dec 2025 00:08:33 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · staging-standalone.vrcxp.com
2025-12-22 23:58
HTTP/1.1 301 Moved Permanently Server: nginx Date: Mon, 22 Dec 2025 23:58:49 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · dev-sdk.vrcxp.com
2025-12-22 19:48
HTTP/1.1 301 Moved Permanently Server: nginx Date: Mon, 22 Dec 2025 19:48:50 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.inversive.fr
2025-12-22 14:07
HTTP/1.1 301 Moved Permanently Server: nginx Date: Mon, 22 Dec 2025 14:07:24 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett
Open service 85.208.144.202:443 · standalone.vrcxp.com
2025-12-22 13:30
HTTP/1.1 301 Moved Permanently Server: nginx Date: Mon, 22 Dec 2025 13:30:38 GMT Content-Length: 0 Connection: close Location: index.html Strict-Transport-Security: max-age=63072000; includeSubDomains X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Referrer-Policy: same-origin X-Clacks-Overhead: GNU Terry Pratchett