Bug Bounty Recon Opt-Out

Stop automated scanning of your infrastructure

If you would like to opt out of this scanning, please email me at me@ryanjarv.sh.

Why Am I Seeing This?

You received an HTTP request containing a link to this page. This request is part of authorized security research conducted through your organization's bug bounty program—a program where companies invite security researchers to find and report vulnerabilities.

Your organization has published a bug bounty program that includes the requests domain in its scope. If you weren't aware of this, you may want to check with your security team.

These requests are important for helping me understand what systems exist and what software is running on them.

Scanning Policy

This scanning follows the AWS Guidelines for Network Scanning:

Observational: All requests are non-mutating. Systems are monitored for degradation, and scanning adjusts accordingly.

Identifiable: Requests include a User-Agent header with verifiable tokens linking to this page. Scanning originates from AWS ECS Fargate and CloudFront IP ranges.

Cooperative: Requests are limited to 1 per second per destination IP (or domain for CDN-fronted targets). Program-specific rate limits are honored when lower. Both pausing (use the link found in User-Agent) and opt-out (via email) are available.

About Me

I'm Ryan Gerstenkorn, an independent security researcher. I take great care to conduct this research responsibly.