openresty 1.19.3.1
tcp/443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d08a5f57cf8a5f57cf8a5f57cf8a5f57cf8a5f57cf8a5f57cf
Laravel Telescope enabled at https://96.7.58.73
Open service 96.7.58.73:443
2024-09-10 14:44
HTTP/1.1 502 Bad Gateway Server: openresty/1.19.3.1 Date: Tue, 10 Sep 2024 14:45:09 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: close x-request-id: MTAzLjEwNy44OS4xMDQ6NDQzOjoyMDI0LTA5LTEwIDIyOjQ1OjA5 Page title: 502 Bad Gateway <html> <head><title>502 Bad Gateway</title></head> <body> <center><h1>502 Bad Gateway</h1></center> <hr><center>openresty/1.19.3.1</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->