Microsoft-IIS 10.0
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad0354911dc5b1142f41805df1d9690df1d9690df1d9690
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /api/v1/prices
GET /api/v1/prices/ean/{ean}/storenumber/{storeNumber}
GET /api/v1/prices/{ipid}
Open service 52.232.19.237:443 · lexmarkgateway-staging.egretail-test.cloud
2026-01-23 14:03
HTTP/1.1 200 OK Content-Length: 162 Connection: close Content-Type: text/html; charset=utf-8 Date: Fri, 23 Jan 2026 14:03:59 GMT Server: Microsoft-IIS/10.0 Set-Cookie: ARRAffinity=96ab32851de58070611930dcfd1aeb259429766fe83c01e562e3ca42adf636a1;Path=/;HttpOnly;Secure;Domain=lexmarkgateway-staging.egretail-test.cloud Set-Cookie: ARRAffinitySameSite=96ab32851de58070611930dcfd1aeb259429766fe83c01e562e3ca42adf636a1;Path=/;HttpOnly;SameSite=None;Secure;Domain=lexmarkgateway-staging.egretail-test.cloud Strict-Transport-Security: max-age=2592000 Request-Context: appId=cid-v1:1b8245f8-95a4-4de5-a1e8-570f216ba056 Content-Security-Policy: upgrade-insecure-requests; default-src 'self'; font-src 'self'; script-src 'unsafe-inline' 'self'; style-src 'unsafe-inline' 'self'; img-src data: 'self'; frame-ancestors 'none' X-Powered-By: ASP.NET <html><body><p>Welcome to EG Lexmark Gateway API!</p><p><a href='/swagger/index.html'>API documentation</a></p><p><a href='/hc'>Health Check</a></p></body></html>
Open service 52.232.19.237:443 · lexmarkgateway-staging.egretail-test.cloud
2026-01-10 19:13
HTTP/1.1 200 OK Content-Length: 162 Connection: close Content-Type: text/html; charset=utf-8 Date: Sat, 10 Jan 2026 19:14:01 GMT Server: Microsoft-IIS/10.0 Set-Cookie: ARRAffinity=96ab32851de58070611930dcfd1aeb259429766fe83c01e562e3ca42adf636a1;Path=/;HttpOnly;Secure;Domain=lexmarkgateway-staging.egretail-test.cloud Set-Cookie: ARRAffinitySameSite=96ab32851de58070611930dcfd1aeb259429766fe83c01e562e3ca42adf636a1;Path=/;HttpOnly;SameSite=None;Secure;Domain=lexmarkgateway-staging.egretail-test.cloud Strict-Transport-Security: max-age=2592000 Request-Context: appId=cid-v1:1b8245f8-95a4-4de5-a1e8-570f216ba056 Content-Security-Policy: upgrade-insecure-requests; default-src 'self'; font-src 'self'; script-src 'unsafe-inline' 'self'; style-src 'unsafe-inline' 'self'; img-src data: 'self'; frame-ancestors 'none' X-Powered-By: ASP.NET <html><body><p>Welcome to EG Lexmark Gateway API!</p><p><a href='/swagger/index.html'>API documentation</a></p><p><a href='/hc'>Health Check</a></p></body></html>
Open service 52.232.19.237:80 · lexmarkgateway-staging.egretail-test.cloud
2026-01-10 19:13
HTTP/1.1 301 Moved Permanently Content-Length: 0 Connection: close Date: Sat, 10 Jan 2026 19:14:00 GMT Location: https://lexmarkgateway-staging.egretail-test.cloud/