Kestrel
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035497337c24f9d927200fa964ce7597a8512692ce68d
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
DELETE /api/chief-complaints/batch
DELETE /api/hot-wash/batch
DELETE /api/media
DELETE /api/responders/batch
GET /api/account-requests
GET /api/after-action-report-settings/incidentId/{incidentId}
GET /api/after-action-report-settings/{id}
GET /api/after-action-reports
GET /api/after-action-reports/document
GET /api/after-action-reports/{id}
GET /api/authentication/current-user
GET /api/authentication/organization-request
GET /api/badges/pdf
GET /api/badges/team-badge
GET /api/chief-complaints
GET /api/chief-complaints/{id}
GET /api/family-assistance
GET /api/family-assistance/{id}
GET /api/general-contacts
GET /api/general-contacts/{id}
GET /api/hot-wash
GET /api/hot-wash/{id}
GET /api/incidents
GET /api/incidents/{id}
GET /api/locations
GET /api/locations/{id}
GET /api/map
GET /api/map/statistics
GET /api/map/victims
GET /api/meal-tracking
GET /api/meal-tracking/statistics
GET /api/organization-roles
GET /api/organization-roles/{id}
GET /api/persons
GET /api/persons/{id}
GET /api/responder-time-logs
GET /api/responders
GET /api/responders/team
GET /api/responders/{id}
GET /api/status-map
GET /api/super-admin
GET /api/super-admin/{id}
GET /api/tenant-configurations/{TenantId}
GET /api/tenant-settings/{TenantId}/list
GET /api/tenants
GET /api/tenants/{Id}
GET /api/users
GET /api/users/{id}
POST /api/account-requests/batch
POST /api/after-action-report-settings
POST /api/authentication/login
POST /api/authentication/logout
POST /api/authentication/refresh-token
POST /api/authentication/request-reset
POST /api/authentication/reset
POST /api/meal-tracking/get-by-id
POST /api/media/upload
POST /api/persons/match
POST /api/persons/unmatch
POST /api/super-admin/reset-password
POST /api/tenant-configurations
POST /api/tenant-settings
POST /api/tenants/default-units
POST /api/tenants/status
POST /api/users/batch
POST /api/users/reset-password/batch
PUT /api/persons/connect
PUT /api/users/settings
Open service 48.217.128.10:443 · api-dev.emcplatforms.com
2026-01-09 21:42
HTTP/1.1 404 Not Found content-length: 0 date: Fri, 09 Jan 2026 21:42:55 GMT server: Kestrel request-context: appId=cid-v1:a788c8f1-b8e2-4dd1-bc82-0f7cd8e81ce6 connection: close
Open service 48.217.128.10:443 · api-dev.emcplatforms.com
2026-01-02 16:46
HTTP/1.1 404 Not Found content-length: 0 date: Fri, 02 Jan 2026 16:46:44 GMT server: Kestrel request-context: appId=cid-v1:a788c8f1-b8e2-4dd1-bc82-0f7cd8e81ce6 connection: close
Open service 48.217.128.10:443 · api-dev.emcplatforms.com
2025-12-30 14:17
HTTP/1.1 404 Not Found content-length: 0 date: Tue, 30 Dec 2025 14:17:49 GMT server: Kestrel request-context: appId=cid-v1:a788c8f1-b8e2-4dd1-bc82-0f7cd8e81ce6 connection: close
Open service 48.217.128.10:443 · api-dev.emcplatforms.com
2025-12-23 05:08
HTTP/1.1 404 Not Found content-length: 0 date: Tue, 23 Dec 2025 05:08:39 GMT server: Kestrel request-context: appId=cid-v1:a788c8f1-b8e2-4dd1-bc82-0f7cd8e81ce6 connection: close
Open service 48.217.128.10:443 · api-dev.emcplatforms.com
2025-12-20 15:36
HTTP/1.1 404 Not Found content-length: 0 date: Sat, 20 Dec 2025 15:36:12 GMT server: Kestrel request-context: appId=cid-v1:a788c8f1-b8e2-4dd1-bc82-0f7cd8e81ce6 connection: close