Public S3/Blob Finder

Cloud/Sec utility · Safe: DNS + HEAD/GET/OPTIONS only

Scan target

Non-intrusive discovery. We will not attempt authentication or brute force. Keep it ethical: only scan assets you have rights to test.

Database connection issue: SQLSTATE[28000] [1045] Access denied for user 'root'@'localhost' (using password: NO). Scans can run without saving, but export/history will be unavailable.
Providers
Mode
Checks
Advanced

Requires OPENAI_API_KEY configured. Will contact the AI provider only if checked.

Results

No scan yet. Enter a target and run a quick check. We generate safe, common naming patterns and verify via DNS and HEAD/GET/OPTIONS only.

History

History unavailable without database.

Usage notes: This tool performs only DNS lookups and HTTP HEAD/GET/OPTIONS requests to well-known object storage endpoints. No authentication or brute-force. Respect legal and ethical boundaries.