Kestrel
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035491d2c1dcd59f1c675c91943c5ba88571d6d332d1a
Public Swagger UI/API detected at path: /swagger/index.html - sample paths: GET /GetAnalysesRequest GET /GetAnalysisRequest GET /GetAnalyticsArtifactRequest GET /GetAnalyticsReportRequest GET /GetChildUsersRequest GET /GetDeploymentDetailsRequest GET /GetDeploymentsRequest GET /GetLibraryDeploymentsRequest GET /GetLibraryVersionsRequest GET /GetMyResourcesRequest GET /GetReportKindsPresentOnDeploymentRequest GET /RequestArtifactAccessUrlRequest GET /UpdateWarsawFinesReportWithNewNoticeDataRequest POST /AddAnalysisNotificationSubscriberRequest POST /AddDataSourceToDeploymentRequest POST /AddUserToDeploymentRequest POST /AuthenticateWithGuestAccessKeyRequest POST /AuthenticateWithResourceAccessTokenRequest POST /CancelAnalysisRequest POST /ChangeUserCultureRequest POST /ConfirmArtifactUploadStatusRequest POST /CreateAnalysisRequest POST /CreateArtifactRequest POST /CreateChildUserAccessTokenRequest POST /CreateDataSourceRequest POST /CreateDeploymentRequest POST /CreateLibraryUserRequest POST /CreateLibraryVersionRequest POST /CreateReportRequest POST /CreateSyncClientUserRequest POST /CreateUserResourceAccessRequest POST /DeleteAnalysisRequest POST /GetGuestUserAccessKeyRequest POST /GetReportDocumentRequest POST /NotifyNewScanningSessionsCreatedRequest POST /RemoveAnalysisNotificationSubscriberRequest POST /RemoveChildUserRequest POST /RemoveUserFromDeploymentRequest POST /ReportAnalysisReportProgressRequest POST /ReportOverallAnalysisProgressRequest POST /RequestArtifactUploadTokenRequest POST /ReuploadAnalysisArtifactsRequest POST /SendAnalysisNotificationRequest POST /SetAnalysisExpirationDateRequest POST /SetGuestUserAccessKeyRequest POST /SetUserDeploymentAccessTypesRequest POST /SyncAnalyticsUserRequest POST /UpdateLibraryVersionRequest POST /UploadAnalysisRequest
Open service 34.116.159.62:443 · dev.reporting.analytics.dotconnect.vc
2026-01-23 08:45
HTTP/1.1 404 Not Found Access-Control-Allow-Headers: * Access-Control-Allow-Methods: * Access-Control-Allow-Origin: * Alt-Svc: h3=":443"; ma=2592000 Content-Length: 0 Date: Fri, 23 Jan 2026 08:45:42 GMT Server: Kestrel Via: 1.1 Caddy Connection: close
Open service 34.116.159.62:443 · dev.reporting.analytics.dotconnect.vc
2026-01-09 13:17
HTTP/1.1 404 Not Found Access-Control-Allow-Headers: * Access-Control-Allow-Methods: * Access-Control-Allow-Origin: * Alt-Svc: h3=":443"; ma=2592000 Content-Length: 0 Date: Fri, 09 Jan 2026 13:17:14 GMT Server: Kestrel Via: 1.1 Caddy Connection: close
Open service 34.116.159.62:443 · dev.reporting.analytics.dotconnect.vc
2026-01-02 19:48
HTTP/1.1 404 Not Found Access-Control-Allow-Headers: * Access-Control-Allow-Methods: * Access-Control-Allow-Origin: * Alt-Svc: h3=":443"; ma=2592000 Content-Length: 0 Date: Fri, 02 Jan 2026 19:48:09 GMT Server: Kestrel Via: 1.1 Caddy Connection: close
Open service 34.116.159.62:443 · dev.reporting.analytics.dotconnect.vc
2025-12-23 07:34
HTTP/1.1 404 Not Found Access-Control-Allow-Headers: * Access-Control-Allow-Methods: * Access-Control-Allow-Origin: * Alt-Svc: h3=":443"; ma=2592000 Content-Length: 0 Date: Tue, 23 Dec 2025 07:34:38 GMT Server: Kestrel Via: 1.1 Caddy Connection: close