Files
proxmox/backups/npmplus/backup-20260206_171308/api/proxy_hosts.json
defiQUG fbda1b4beb
Some checks failed
Deploy to Phoenix / deploy (push) Has been cancelled
docs: Ledger Live integration, contract deploy learnings, NEXT_STEPS updates
- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands
- CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround
- CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check
- NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere
- MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates
- LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference

Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-12 15:46:57 -08:00

793 lines
35 KiB
JSON

[
{
"id": 22,
"created_on": "2026-01-18 22:19:18",
"modified_on": "2026-01-29 22:52:50",
"owner_user_id": 1,
"domain_names": [
"cross-all.defi-oracle.io"
],
"forward_host": "192.168.11.211",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 134,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 13,
"created_on": "2026-01-16 14:41:02",
"modified_on": "2026-02-06 15:15:04",
"owner_user_id": 1,
"domain_names": [
"dbis-admin.d-bis.org"
],
"forward_host": "192.168.11.130",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 46,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 15,
"created_on": "2026-01-16 14:41:04",
"modified_on": "2026-02-06 15:15:06",
"owner_user_id": 1,
"domain_names": [
"dbis-api-2.d-bis.org"
],
"forward_host": "192.168.11.156",
"forward_port": 3000,
"access_list_id": 0,
"certificate_id": 47,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 14,
"created_on": "2026-01-16 14:41:03",
"modified_on": "2026-02-06 15:15:05",
"owner_user_id": 1,
"domain_names": [
"dbis-api.d-bis.org"
],
"forward_host": "192.168.11.155",
"forward_port": 3000,
"access_list_id": 0,
"certificate_id": 48,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 8,
"created_on": "2026-01-16 14:40:58",
"modified_on": "2026-02-06 19:14:11",
"owner_user_id": 1,
"domain_names": [
"explorer.d-bis.org"
],
"forward_host": "192.168.11.140",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 145,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\r\nadd_header X-Content-Type-Options \"nosniff\" always;\r\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\r\nadd_header X-XSS-Protection \"1; mode=block\" always;\r\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\r\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\r\n\r\n# Ensure proper DOCTYPE (if backend doesn't provide it)\r\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "# Cloudflare API token\r\n#dns_cloudflare_api_token=65d8f07ebb3f0454fdc4e854b6ada13fba0f0\r\n# OR Cloudflare API credentials\r\ndns_cloudflare_email=pandoramannli@gmail.com\r\ndns_cloudflare_api_key=65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 30,
"created_on": "2026-01-31 00:13:09",
"modified_on": "2026-02-06 19:09:43",
"owner_user_id": 1,
"domain_names": [
"explorer.defi-oracle.io"
],
"forward_host": "192.168.11.140",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 144,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"letsencrypt_agree": false,
"dns_challenge": false,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 17,
"created_on": "2026-01-16 14:41:05",
"modified_on": "2026-02-06 15:15:09",
"owner_user_id": 1,
"domain_names": [
"mim4u.org"
],
"forward_host": "192.168.11.37",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 50,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\r\nadd_header X-Content-Type-Options \"nosniff\" always;\r\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\r\nadd_header X-XSS-Protection \"1; mode=block\" always;\r\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\r\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\r\n\r\n# Ensure proper DOCTYPE (if backend doesn't provide it)\r\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"letsencrypt_agree": false,
"dns_challenge": false,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 5,
"created_on": "2026-01-16 14:40:55",
"modified_on": "2026-01-16 17:01:49",
"owner_user_id": 1,
"domain_names": [
"phoenix.sankofa.nexus"
],
"forward_host": "192.168.11.50",
"forward_port": 4000,
"access_list_id": 0,
"certificate_id": 51,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 11,
"created_on": "2026-01-16 14:41:00",
"modified_on": "2026-02-06 15:14:53",
"owner_user_id": 1,
"domain_names": [
"rpc-http-prv.d-bis.org"
],
"forward_host": "192.168.11.211",
"forward_port": 8545,
"access_list_id": 0,
"certificate_id": 52,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 9,
"created_on": "2026-01-16 14:40:59",
"modified_on": "2026-02-06 15:14:50",
"owner_user_id": 1,
"domain_names": [
"rpc-http-pub.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8545,
"access_list_id": 0,
"certificate_id": 53,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 12,
"created_on": "2026-01-16 14:41:01",
"modified_on": "2026-02-06 15:14:54",
"owner_user_id": 1,
"domain_names": [
"rpc-ws-prv.d-bis.org"
],
"forward_host": "192.168.11.211",
"forward_port": 8546,
"access_list_id": 0,
"certificate_id": 54,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 10,
"created_on": "2026-01-16 14:40:59",
"modified_on": "2026-02-06 15:14:52",
"owner_user_id": 1,
"domain_names": [
"rpc-ws-pub.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8546,
"access_list_id": 0,
"certificate_id": 55,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 26,
"created_on": "2026-01-29 16:35:10",
"modified_on": "2026-02-06 15:14:59",
"owner_user_id": 1,
"domain_names": [
"rpc.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8545,
"access_list_id": 0,
"certificate_id": 141,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "# Cloudflare API token\r\ndns_cloudflare_email = pandoramannli@gmail.com\r\ndns_cloudflare_api_key = 65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 24,
"created_on": "2026-01-29 15:38:44",
"modified_on": "2026-02-06 15:14:57",
"owner_user_id": 1,
"domain_names": [
"rpc.defi-oracle.io"
],
"forward_host": "192.168.11.221",
"forward_port": 8545,
"access_list_id": 0,
"certificate_id": 56,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"letsencrypt_agree": false,
"dns_challenge": false,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 21,
"created_on": "2026-01-16 14:41:09",
"modified_on": "2026-02-06 15:14:55",
"owner_user_id": 1,
"domain_names": [
"rpc.public-0138.defi-oracle.io"
],
"forward_host": "192.168.11.240",
"forward_port": 443,
"access_list_id": 0,
"certificate_id": 56,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": true,
"forward_scheme": "https",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 27,
"created_on": "2026-01-29 16:35:11",
"modified_on": "2026-02-06 15:15:00",
"owner_user_id": 1,
"domain_names": [
"rpc2.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8545,
"access_list_id": 0,
"certificate_id": 137,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "dns_cloudflare_email = pandoramannli@gmail.com\r\ndns_cloudflare_api_key = 65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 3,
"created_on": "2026-01-16 14:40:54",
"modified_on": "2026-01-16 17:01:32",
"owner_user_id": 1,
"domain_names": [
"sankofa.nexus"
],
"forward_host": "192.168.11.51",
"forward_port": 3000,
"access_list_id": 0,
"certificate_id": 57,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "add_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 16,
"created_on": "2026-01-16 14:41:04",
"modified_on": "2026-02-06 15:15:07",
"owner_user_id": 1,
"domain_names": [
"secure.d-bis.org"
],
"forward_host": "192.168.11.130",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 58,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 19,
"created_on": "2026-01-16 14:41:07",
"modified_on": "2026-02-06 15:15:10",
"owner_user_id": 1,
"domain_names": [
"secure.mim4u.org"
],
"forward_host": "192.168.11.37",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 59,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\r\nadd_header X-Content-Type-Options \"nosniff\" always;\r\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\r\nadd_header X-XSS-Protection \"1; mode=block\" always;\r\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\r\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\r\n\r\n# Ensure proper DOCTYPE (if backend doesn't provide it)\r\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"letsencrypt_agree": false,
"dns_challenge": false,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 7,
"created_on": "2026-01-16 14:40:57",
"modified_on": "2026-01-16 17:02:09",
"owner_user_id": 1,
"domain_names": [
"the-order.sankofa.nexus"
],
"forward_host": "192.168.11.36",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 60,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 20,
"created_on": "2026-01-16 14:41:08",
"modified_on": "2026-02-06 15:15:11",
"owner_user_id": 1,
"domain_names": [
"training.mim4u.org"
],
"forward_host": "192.168.11.37",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 61,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": true,
"advanced_config": "# Security Headers\r\nadd_header X-Content-Type-Options \"nosniff\" always;\r\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\r\nadd_header X-XSS-Protection \"1; mode=block\" always;\r\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\r\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\r\n\r\n# Ensure proper DOCTYPE (if backend doesn't provide it)\r\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"letsencrypt_agree": false,
"dns_challenge": false,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 28,
"created_on": "2026-01-29 16:35:12",
"modified_on": "2026-02-06 15:15:01",
"owner_user_id": 1,
"domain_names": [
"ws.rpc.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8546,
"access_list_id": 0,
"certificate_id": 138,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "dns_cloudflare_email = pandoramannli@gmail.com\r\ndns_cloudflare_api_key = 65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 29,
"created_on": "2026-01-29 16:35:12",
"modified_on": "2026-02-06 15:15:02",
"owner_user_id": 1,
"domain_names": [
"ws.rpc2.d-bis.org"
],
"forward_host": "192.168.11.221",
"forward_port": 8546,
"access_list_id": 0,
"certificate_id": 139,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "dns_cloudflare_email = pandoramannli@gmail.com\r\ndns_cloudflare_api_key = 65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 25,
"created_on": "2026-01-29 15:38:45",
"modified_on": "2026-02-06 15:14:58",
"owner_user_id": 1,
"domain_names": [
"wss.defi-oracle.io"
],
"forward_host": "192.168.11.221",
"forward_port": 8546,
"access_list_id": 0,
"certificate_id": 140,
"ssl_forced": false,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "",
"meta": {
"dns_challenge": true,
"dns_provider": "cloudflare",
"dns_provider_credentials": "dns_cloudflare_email = pandoramannli@gmail.com\r\ndns_cloudflare_api_key = 65d8f07ebb3f0454fdc4e854b6ada13fba0f0",
"letsencrypt_agree": true,
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": true,
"http2_support": false,
"forward_scheme": "http",
"enabled": true,
"locations": [],
"hsts_enabled": false,
"hsts_subdomains": false
},
{
"id": 18,
"created_on": "2026-01-16 14:41:06",
"modified_on": "2026-01-16 17:02:14",
"owner_user_id": 1,
"domain_names": [
"www.mim4u.org"
],
"forward_host": "192.168.11.36",
"forward_port": 80,
"access_list_id": 0,
"certificate_id": 62,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 6,
"created_on": "2026-01-16 14:40:56",
"modified_on": "2026-01-16 17:02:17",
"owner_user_id": 1,
"domain_names": [
"www.phoenix.sankofa.nexus"
],
"forward_host": "192.168.11.50",
"forward_port": 4000,
"access_list_id": 0,
"certificate_id": 63,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
},
{
"id": 4,
"created_on": "2026-01-16 14:40:55",
"modified_on": "2026-01-16 17:02:19",
"owner_user_id": 1,
"domain_names": [
"www.sankofa.nexus"
],
"forward_host": "192.168.11.51",
"forward_port": 3000,
"access_list_id": 0,
"certificate_id": 64,
"ssl_forced": true,
"caching_enabled": false,
"block_exploits": false,
"advanced_config": "# Security Headers\nadd_header X-Content-Type-Options \"nosniff\" always;\nadd_header X-Frame-Options \"SAMEORIGIN\" always;\nadd_header X-XSS-Protection \"1; mode=block\" always;\nadd_header Referrer-Policy \"strict-origin-when-cross-origin\" always;\nadd_header Content-Security-Policy \"default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https: data:; style-src 'self' 'unsafe-inline' https: data:; font-src 'self' https: data:; img-src 'self' data: https: blob:; connect-src 'self' https: wss: ws:; media-src 'self' https: data:; object-src 'none'; base-uri 'self'; form-action 'self' https:; frame-ancestors 'none'; upgrade-insecure-requests\" always;\n\n# Ensure proper DOCTYPE (if backend doesn't provide it)\n# Note: This requires backend to send proper DOCTYPE, Nginx can't modify HTML body easily",
"meta": {
"nginx_online": true,
"nginx_err": null
},
"allow_websocket_upgrade": false,
"http2_support": true,
"forward_scheme": "http",
"enabled": true,
"locations": null,
"hsts_enabled": true,
"hsts_subdomains": true
}
]