Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035491a3b826ffd58fbc1e2c5212ccc46c24fd8e73494
Public Swagger UI/API detected at path: /swagger/index.html - sample paths: DELETE /api/v1/TestRemoveAll GET /api/v1/AccountID GET /api/v1/AllPushNotifications GET /api/v1/AppVersionCheck GET /api/v1/B2CInstance GET /api/v1/Clean GET /api/v1/CustomerAccounts GET /api/v1/DbHealth GET /api/v1/Devices GET /api/v1/EligibleItems GET /api/v1/EquipmentDBA GET /api/v1/FeaturedArticles GET /api/v1/FeedbackRequestForm GET /api/v1/MySupportTeam GET /api/v1/Notifications GET /api/v1/Notify GET /api/v1/PAPComplianceStatus GET /api/v1/PatientCommPreferences GET /api/v1/PatientIds GET /api/v1/PatientProfile GET /api/v1/SentNotifications GET /api/v1/ShippingAddressReorder GET /api/v1/TestAllPushNotifications GET /api/v1/TestAuthorization GET /api/v1/TestGetAll GET /api/v1/TestGetNew GET /api/v1/TestNoAuthorization GET /api/v1/TestNotify GET /api/v1/UsageDataResmed GET /api/v1/UsageDataRespironics GET /api/v1/ValidateUser GET /api/v1/ValidateUserB2C GET /api/v1/core-ping GET /api/v1/debug/token POST /api/v1/AddContact POST /api/v1/DisconnectDevice POST /api/v1/FeedbackRequestFormResponse POST /api/v1/Order POST /api/v1/PatientDevice POST /api/v1/RecurringOrderAgreement POST /api/v1/ReportAProblem POST /api/v1/RequestAccountDelete POST /api/v1/SendOTP POST /api/v1/SendOTPPhoneCall POST /api/v1/SendOTPSms POST /api/v1/SignTermsAndConditions PUT /api/v1/Contacts PUT /api/v1/InsuranceCoverage PUT /api/v1/NotificationStatus PUT /api/v1/RemoveAllRONotifications PUT /api/v1/ShippingAddress PUT /api/v1/TestResetNotificationStatuses PUT /api/v1/TestResetNotificationStatusesForPatient
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035491a3b826ffd58fbc1e2c5212ccc46c24fca248c8b
Public Swagger UI/API detected at path: /swagger/index.html - sample paths: DELETE /api/v1/TestRemoveAll GET /api/v1/AccountID GET /api/v1/AllPushNotifications GET /api/v1/AppVersionCheck GET /api/v1/B2CInstance GET /api/v1/Clean GET /api/v1/CustomerAccounts GET /api/v1/DbHealth GET /api/v1/Devices GET /api/v1/EligibleItems GET /api/v1/EquipmentDBA GET /api/v1/FeaturedArticles GET /api/v1/FeedbackRequestForm GET /api/v1/MySupportTeam GET /api/v1/Notifications GET /api/v1/Notify GET /api/v1/PAPComplianceStatus GET /api/v1/PatientCommPreferences GET /api/v1/PatientIds GET /api/v1/PatientProfile GET /api/v1/SentNotifications GET /api/v1/ShippingAddressReorder GET /api/v1/TestAllPushNotifications GET /api/v1/TestAuthorization GET /api/v1/TestGetAll GET /api/v1/TestGetNew GET /api/v1/TestNoAuthorization GET /api/v1/TestNotify GET /api/v1/UsageDataResmed GET /api/v1/UsageDataRespironics GET /api/v1/ValidateUser GET /api/v1/ValidateUserB2C GET /api/v1/core-ping GET /api/v1/debug/token POST /FeedbackRequestFormResponse POST /api/v1/AddContact POST /api/v1/DisconnectDevice POST /api/v1/Order POST /api/v1/PatientDevice POST /api/v1/RecurringOrderAgreement POST /api/v1/ReportAProblem POST /api/v1/RequestAccountDelete POST /api/v1/SendOTP POST /api/v1/SendOTPPhoneCall POST /api/v1/SendOTPSms POST /api/v1/SignTermsAndConditions PUT /api/v1/Contacts PUT /api/v1/InsuranceCoverage PUT /api/v1/NotificationStatus PUT /api/v1/RemoveAllRONotifications PUT /api/v1/ShippingAddress PUT /api/v1/TestResetNotificationStatuses PUT /api/v1/TestResetNotificationStatusesForPatient
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1a8bcc6e52e1b6d655a081fbdf7f61cd1d1a1ec6a940a51e1
Public Swagger UI/API detected at path: /webjars/swagger-ui/index.html - sample paths:
GET /api/v1/file
GET /api/v1/hsm
GET /api/v1/hsm/{hsmName}
POST /api/v1/dialog360/webhook
POST /api/v1/genesys/endconversation
POST /api/v1/genesys/{phoneNumber}/webhook
Severity: info
Fingerprint: 5733ddf49ff49cd1926e27d0926e27d0926e27d0926e27d0926e27d0926e27d0
Public Swagger UI/API detected at path: /webjars/swagger-ui/index.html
Severity: info
Fingerprint: 5733ddf49ff49cd151e75e4b8ac62393380aaf0f189ac3af5d569f5825703723
Public Swagger UI/API detected at path: /v3/api-docs - sample paths:
GET /api/v1/file
GET /api/v1/hsm
GET /api/v1/hsm/{hsmName}
POST /api/v1/dialog360/webhook
POST /api/v1/genesys/endconversation
POST /api/v1/genesys/{phoneNumber}/webhook
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1b885ff43bfddc580bb011abc852f7aec7e89561d7c55e88a
Public Swagger UI/API detected at path: /swagger.json - sample paths:
GET /health
GET /v1/event-track/{eventTrackGUID}/track
GET /v1/impression/{impressionUrlId}
GET /v1/my-perks
GET /v1/perks
GET /v1/user-perks/publish
GET /v2/my-perks
POST /v1/decisions
POST /v2/perks
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d602624b7f739d79c37c505e7550b4d07809c47202e
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /healthcheck GET /healthcheck/healthcheck GET /systemmonitor GET /systemmonitor/details GET /systemmonitor/index POST /chatbot/ask POST /user/persona POST /user/session POST /user/theme PUT /user/session/keepAlive
Severity: info
Fingerprint: 5733ddf49ff49cd1f3d88d602624b7f739d79c37c505e7550b4d0780d3e5db94
Public Swagger UI/API detected at path: /swagger/v1/swagger.json - sample paths: GET /healthcheck GET /healthcheck/healthcheck GET /systemmonitor GET /systemmonitor/details GET /systemmonitor/index POST /user/persona POST /user/session POST /user/theme PUT /user/session/keepAlive
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd12ec8532c2ec8532c2ec8532c2ec8532c2ec8532c2ec8532c
Public Swagger UI/API detected at path: /swagger/index.html
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549befcaeb360b31f2eea896a86e82f7caa2a2735b0
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /api/v1/Account/{AccountNr}/CustomerInfo
GET /api/v1/Account/{AccountNr}/ProfileSizes
GET /api/v1/Account/{AccountNr}/ProfileSizes/AvailableProductTypeIds
GET /api/v1/Account/{AccountNr}/Profiles
GET /api/v1/Account/{AccountNr}/Profiles/Count
GET /api/v1/FactoryPassports
GET /api/v1/FactoryPassports/Factories
GET /api/v1/FactoryPassports/FactoryAlterations
GET /api/v1/FactoryPassports/FactoryBaseFitMappings
GET /api/v1/FactoryPassports/FactoryFits
GET /api/v1/FactoryPassports/FactorySizes
GET /api/v1/FactoryPassports/{factoryId}/{sizePassportId}
GET /api/v1/FactoryPassports/{sizePassportId}
GET /api/v1/FitMeasurement
GET /api/v1/FitMeasurement/__AvailableSpecifications__
GET /api/v1/FitMeasurement/{id}
GET /api/v1/Locations
GET /api/v1/Locations/ByLocationCode
GET /api/v1/ProductMeasurementCustom/CountryRegion
GET /api/v1/ProductMeasurementCustom/FitCountries
GET /api/v1/ProductMeasurementCustom/FitMeasurements
GET /api/v1/ProductMeasurementCustom/Fits
GET /api/v1/ProductMeasurementCustom/Measurements
GET /api/v1/ProductMeasurementCustom/RegionSizes
GET /api/v1/ProductMeasurementCustom/SizeGroups
GET /api/v1/Products/CountryRegion
GET /api/v1/Products/FitCountries
GET /api/v1/Products/FitMeasurements
GET /api/v1/Products/Fits
GET /api/v1/Products/KillerpageProducts
GET /api/v1/Products/Measurements
GET /api/v1/Products/RegionSizes
GET /api/v1/Products/SizeGroups
GET /api/v1/RtwProductFits
GET /api/v1/SizeConversions
GET /api/v1/SizePassportCustom
GET /api/v1/SizePassportCustom/ByIdsAndCountry
GET /api/v1/SizePassportCustom/Card/ByAccountNr
GET /api/v1/SizePassportCustom/Card/ByAccountNrAndProductType
GET /api/v1/SizePassportCustom/Card/ByCorrelationId
GET /api/v1/SizePassportCustom/Card/ByProfileId
GET /api/v1/SizePassportCustom/Card/{id}
GET /api/v1/SizePassportCustom/CustomerService/{id}
GET /api/v1/SizePassportCustom/ListByAccountAndProductType
GET /api/v1/SizePassportCustom/ListByAccountAndProductTypes
GET /api/v1/SizePassportCustom/SizeRecommendation
GET /api/v1/SizePassportCustom/Summary/{id}
GET /api/v1/SizePassportCustom/{id}
GET /api/v1/SizePassportProfile/Profile
GET /api/v1/SizePassportProfile/Profiles
GET /api/v1/SizePassportProfile/RecommendedProfiles
GET /api/v1/SizePassportProfile/RtwProfiles
GET /api/v1/SizePassports
GET /api/v1/SizePassports/ByIdsAndCountry
GET /api/v1/SizePassports/Card/ByAccountNr
GET /api/v1/SizePassports/Card/ByAccountNrAndProductType
GET /api/v1/SizePassports/Card/ByCorrelationId
GET /api/v1/SizePassports/Card/ByProfileId
GET /api/v1/SizePassports/Card/{id}
GET /api/v1/SizePassports/CustomerService/{id}
GET /api/v1/SizePassports/ListByAccountAndProductType
GET /api/v1/SizePassports/ListByAccountAndProductTypes
GET /api/v1/SizePassports/SizeRecommendation
GET /api/v1/SizePassports/Summary/{id}
GET /api/v1/SizePassports/{id}
GET /api/v1/Tags
GET /api/v1/specifications/FitMeasurement
PATCH /api/v1/SizePassportProfile/{id}
POST /api/v1/Alterations/fallback-logs
POST /api/v1/EpcInfo
POST /api/v1/EpcPassports/SaveEpcPassport
POST /api/v1/SizePassportCustom/SizePassportWithDefaultMeasurementValues
POST /api/v1/SizePassportCustom/SizePassportWithProfile
POST /api/v1/SizePassportProfile/{accountNr}/{id}/Disable
POST /api/v1/SizePassports/CML
POST /api/v1/SizePassports/SizePassportWithDefaultMeasurementValues
POST /api/v1/SizePassports/SizePassportWithProfile
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3ab8874f04c7637f4bebf00e8862a560c896aefcb
GraphQL introspection enabled at /graphql Types: 416 (by kind: ENUM: 44, INPUT_OBJECT: 92, INTERFACE: 24, OBJECT: 251, SCALAR: 5) Operations: - Query: Query | fields: CountryListGraphql, amLabelProvider, amLabelSetting, attributesForm, attributesList - Mutation: Mutation | fields: addBundleProductsToCart, addConfigurableProductsToCart, addProductsToCart, addProductsToWishlist, addSimpleProductsToCart Directives: deprecated, include, skip (total: 3) Detected: Magento
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3ab8874f04c7637f4bebf00e8862a560c381b0534
GraphQL introspection enabled at /graphql Types: 416 (by kind: ENUM: 44, INPUT_OBJECT: 92, INTERFACE: 24, OBJECT: 251, SCALAR: 5) Operations: - Query: Query | fields: CountryListGraphql, amLabelProvider, amLabelSetting, attributesForm, attributesList - Mutation: Mutation | fields: addBundleProductsToCart, addConfigurableProductsToCart, addProductsToCart, addProductsToWishlist, addSimpleProductsToCart Directives: deprecated, include, skip (total: 3)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa361f7f7b535d6113724cbebaf2452641fcaae4c3f
GraphQL introspection enabled at /graphql Types: 414 (by kind: ENUM: 44, INPUT_OBJECT: 92, INTERFACE: 24, OBJECT: 249, SCALAR: 5) Operations: - Query: Query | fields: CountryListGraphql, amLabelProvider, amLabelSetting, attributesForm, attributesList - Mutation: Mutation | fields: addBundleProductsToCart, addConfigurableProductsToCart, addProductsToCart, addProductsToWishlist, addSimpleProductsToCart Directives: deprecated, include, skip (total: 3)
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3f97412ba323e83ea44ddd750562b1dc414742443
GraphQL introspection enabled at /graphql Types: 415 (by kind: ENUM: 43, INPUT_OBJECT: 93, INTERFACE: 24, OBJECT: 250, SCALAR: 5) Operations: - Query: Query | fields: CountryListGraphql, attributesForm, attributesList, availableStores, cart - Mutation: Mutation | fields: addBundleProductsToCart, addConfigurableProductsToCart, addProductsToCart, addProductsToWishlist, addSimpleProductsToCart Directives: deprecated, include, skip (total: 3) Detected: Magento
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa3f97412ba323e83ea44ddd750562b1dc424b0d3bc
GraphQL introspection enabled at /graphql Types: 415 (by kind: ENUM: 43, INPUT_OBJECT: 93, INTERFACE: 24, OBJECT: 250, SCALAR: 5) Operations: - Query: Query | fields: CountryListGraphql, attributesForm, attributesList, availableStores, cart - Mutation: Mutation | fields: addBundleProductsToCart, addConfigurableProductsToCart, addProductsToCart, addProductsToWishlist, addSimpleProductsToCart Directives: deprecated, include, skip (total: 3)
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa31a0bbaa31a0bbaa31a0bbaa31a0bbaa31a0bbaa3
GraphQL introspection enabled at /graphql
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa39da178e6eebbad96e56c12d256ac28177e0a5a27
GraphQL introspection enabled at /graphql Types: 331 (by kind: ENUM: 15, INPUT_OBJECT: 16, INTERFACE: 15, OBJECT: 263, SCALAR: 22) Operations: - Query: Query | fields: WhiskeyFacts, flavorFinderCategories, flavorFinderQuestions, flavorFinderTestCategories, pieceByPath - Mutation: Mutation | fields: flavorFinderSubmit, registerCurrentUser, signUpFfyb, updateFavoritePiece, updateFfyb Directives: deprecated, include, skip (total: 3)
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad0354920c561732d0124b5d494beef2f5a88ab638d8ad0
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /v1/configurations
GET /v1/configurations/{id}
GET /v1/legacy/configurations/{id}
GET /v1/sub-configurations/prices
GET /v1/sub-configurations/{id}
POST /v1/configurations/{id}/validate
PUT /v1/configurations/size-passport-ids
PUT /v1/configurations/{id}/country-code
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549ba5947cea8a04b95c46b63bbb069b8ebd2178367
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /v{version}/color-configs
GET /v{version}/compositions
GET /v{version}/configuration-types
GET /v{version}/configurator-rules/fabrics
GET /v{version}/configurator-rules/option-values
GET /v{version}/country-currencies
GET /v{version}/delivery-periods-with-countries
GET /v{version}/dessin
GET /v{version}/fabric-groups
GET /v{version}/fabric-stocks
GET /v{version}/fabric-stocks/by-fabric-ids
GET /v{version}/fabrics
GET /v{version}/fabrics-with-details
GET /v{version}/font-configs
GET /v{version}/id-lookups
GET /v{version}/id-lookups/configuration-type
GET /v{version}/id-lookups/fabric
GET /v{version}/id-lookups/option
GET /v{version}/id-lookups/option-value
GET /v{version}/manufacturers
GET /v{version}/option-groups
GET /v{version}/option-groups-with-presentations
GET /v{version}/option-value-prices
GET /v{version}/option-values
GET /v{version}/options
GET /v{version}/options-with-presentations
GET /v{version}/options-with-values
GET /v{version}/positions
GET /v{version}/presentations/color
GET /v{version}/presentations/color-config
GET /v{version}/presentations/dessin
GET /v{version}/presentations/fabric
GET /v{version}/presentations/fabric-group
GET /v{version}/presentations/font
GET /v{version}/presentations/option
GET /v{version}/presentations/option-group
GET /v{version}/presentations/option-value
GET /v{version}/presentations/position
GET /v{version}/presentations/season
GET /v{version}/presentations/style-preset
GET /v{version}/prices
GET /v{version}/prices/fabrics
GET /v{version}/prices/option-values
GET /v{version}/qualities
GET /v{version}/quality-groups-with-qualities
GET /v{version}/seasons
GET /v{version}/style-presets
GET /v{version}/weaves
POST /v{version}/fabric-groups/{id}/fabrics/{fabricId}
POST /v{version}/legacy/id-lookup
POST /v{version}/presentations/fabric-group/{id}/sanitize
POST /v{version}/prices/fabricsByConfigurationTypeId
POST /v{version}/prices/optionValuesByConfigurationTypeId
PUT /v{version}/fabric-groups/{id}
PUT /v{version}/fabric-groups/{id}/fabrics
PUT /v{version}/option-groups/{id}
PUT /v{version}/presentations/fabric-group/{id}
PUT /v{version}/presentations/option-group/{id}
PUT /v{version}/presentations/option/{id}
PUT /v{version}/presentations/style-preset/{id}
PUT /v{version}/style-presets/{id}
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549fe42297a894cb81ceae8c9e77537ead6203142cb
Public Swagger UI/API detected at path: /swagger/index.html - sample paths: GET /api/v1/ConfigurationTypes GET /api/v1/ConfiguratorRules GET /api/v1/DefaultValues GET /api/v1/DeliveryPeriod GET /api/v1/FabricGroups GET /api/v1/FabricStock GET /api/v1/Fabrics GET /api/v1/Filters GET /api/v1/Options GET /api/v1/ProductLayerImageDefinitions GET /api/v1/StylePresets
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad0354944b0a3da3423ab75a385824166e7dffd83e9b93e
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /api/v1/blank/Get
GET /api/v1/blank/GetAuth
GET /api/v1/query/DemandwareEquivalentModel
GET /api/v1/query/DemandwareEquivalentModelWithDetails
GET /api/v1/query/GetHybridProducts
GET /api/v1/query/GetSessionByCode
GET /api/v1/query/GetSessionsWithReadModels
GET /api/v1/query/InitialRenderSchema
GET /api/v1/query/ProductSpecificRenderSchemaByExistingConfiguration
GET /api/v1/query/RenderSchema
GET /api/v1/query/RenderSchemaByExistingConfiguration
GET /api/v1/query/RenderSchemaWithPreSet
GET /api/v1/query/TranslationByLanguageCode
POST /api/v1/command/AssignCustomerToConfiguration
POST /api/v1/query/GetConfigurationsPrice
POST /api/v1/query/GetFabric
POST /api/v1/query/GetRenderSchema
POST /api/v1/query/ValidateConfiguration
POST /api/v1/query/ValidateConfigurations
POST /api/v1/query/ValidatePrice
PUT /api/v1/command/RemoveConfiguration/{configurationId}
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad03549ba5947cea8a04b95c46b63bbb069b8ebd2178367
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
GET /v{version}/color-configs
GET /v{version}/compositions
GET /v{version}/configuration-types
GET /v{version}/configurator-rules/fabrics
GET /v{version}/configurator-rules/option-values
GET /v{version}/country-currencies
GET /v{version}/delivery-periods-with-countries
GET /v{version}/dessin
GET /v{version}/fabric-groups
GET /v{version}/fabric-stocks
GET /v{version}/fabric-stocks/by-fabric-ids
GET /v{version}/fabrics
GET /v{version}/fabrics-with-details
GET /v{version}/font-configs
GET /v{version}/id-lookups
GET /v{version}/id-lookups/configuration-type
GET /v{version}/id-lookups/fabric
GET /v{version}/id-lookups/option
GET /v{version}/id-lookups/option-value
GET /v{version}/manufacturers
GET /v{version}/option-groups
GET /v{version}/option-groups-with-presentations
GET /v{version}/option-value-prices
GET /v{version}/option-values
GET /v{version}/options
GET /v{version}/options-with-presentations
GET /v{version}/options-with-values
GET /v{version}/positions
GET /v{version}/presentations/color
GET /v{version}/presentations/color-config
GET /v{version}/presentations/dessin
GET /v{version}/presentations/fabric
GET /v{version}/presentations/fabric-group
GET /v{version}/presentations/font
GET /v{version}/presentations/option
GET /v{version}/presentations/option-group
GET /v{version}/presentations/option-value
GET /v{version}/presentations/position
GET /v{version}/presentations/season
GET /v{version}/presentations/style-preset
GET /v{version}/prices
GET /v{version}/prices/fabrics
GET /v{version}/prices/option-values
GET /v{version}/qualities
GET /v{version}/quality-groups-with-qualities
GET /v{version}/seasons
GET /v{version}/style-presets
GET /v{version}/weaves
POST /v{version}/fabric-groups/{id}/fabrics/{fabricId}
POST /v{version}/legacy/id-lookup
POST /v{version}/presentations/fabric-group/{id}/sanitize
POST /v{version}/prices/fabricsByConfigurationTypeId
POST /v{version}/prices/optionValuesByConfigurationTypeId
PUT /v{version}/fabric-groups/{id}
PUT /v{version}/fabric-groups/{id}/fabrics
PUT /v{version}/option-groups/{id}
PUT /v{version}/presentations/fabric-group/{id}
PUT /v{version}/presentations/option-group/{id}
PUT /v{version}/presentations/option/{id}
PUT /v{version}/presentations/style-preset/{id}
PUT /v{version}/style-presets/{id}
GraphQL introspection is enabled.
This could leak to data leak if not properly configured.
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa315728e73083813f1a8822bd868393bf868393bf8
GraphQL introspection enabled at /graphql Types: 11 (by kind: ENUM: 2, OBJECT: 7, SCALAR: 2) Operations: - Query: Query | fields: youAreNotAuthorized Directives: deprecated, include, oneOf, skip, specifiedBy (total: 5)
Severity: medium
Fingerprint: c2db3a1c40d490db1a0bbaa315728e73083813f1a8822bd83ada684a3ada684a
GraphQL introspection enabled at /graphql Types: 11 (by kind: ENUM: 2, OBJECT: 7, SCALAR: 2) Operations: - Query: Query | fields: youAreNotAuthorized Directives: deprecated, include, skip, specifiedBy (total: 4)
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c668fcbec668fcbecac82a5dc36d4c17e51bd4173c547c0f3
Found 17 files trough .DS_Store spidering: /assets /assets/ckeditor /assets/ckeditor/adapters /assets/ckeditor/lang /assets/ckeditor/plugins /assets/ckeditor/skins /assets/favicons /assets/fonts /assets/img /assets/img/icons /assets/img/loaders /assets/img/p /assets/template-email /DevOps /Dockerfiles /ng1 /tracking
The server-status page (usually /server-status) allows server administrators to find out how well their server is performing.
This is a HTML page that gives the current server statistics such as the server version, up time,cpu, ram, and information about requests made to the server.
This information can be very useful if the application is sent sensitive information as GET requests. If you monitor this page you might be able to find CSRF tokens, API keys, hidden paths, and other sensitive information being sent to the server.
https://medium.com/@ghostlulzhacks/apache-server-status-a70abed83f5a
Severity: medium
Fingerprint: ee80c6706842d3ef6842d3ef6325bb316325bb31cd140c5dcd140c5d3f42acd7
Apache Status Apache Server Status for capitaliq.com (via 151.108.154.114) Server Version: Apache/2.4.41 (Unix) Server MPM: worker Server Built: May 8 2020 20:48:13 Current Time: Monday, 21-Apr-2025 16:35:09 EDT Restart Time: Sunday, 20-Apr-2025 00:17:32 EDT Parent Server Config. Generation: 1 Parent Server MPM Generation: 0 Server uptime: 1 day 16 hours 17 minutes 37 seconds Server load: 0.11 0.13 0.10 Total accesses: 41155 - Total Traffic: 85.8 MB CPU Usage: u11.92 s9.32 cu0 cs0 - .0146% CPU load .284 requests/sec - 620 B/second - 2186 B/request 2 requests currently being processed, 98 idle workers ________________________________________ _________________________K__________............................ ................................................................ ................................................................ ................................................................ ................................................................ ................ Scoreboard Key: "_" Waiting for Connection, "S" Starting up, "R" Reading Request, "W" Sending Reply, "K" Keepalive (read), "D" DNS Lookup, "C" Closing connection, "L" Logging, "G" Gracefully finishing, "I" Idle cleanup of worker, "." Open slot with no current process SrvPIDAccMCPU SSReqConnChildSlotClientVHostRequest 0-031650/419/419_ 5.421059196080.00.900.90 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-0316511/343/343W 5.470024.70.610.61 23.48.151.172localhost:8080GET /server-status HTTP/1.1 0-031650/328/328_ 5.4728830.00.680.68 23.48.151.190localhost:8080GET /ciqdotnet/login.aspx HTTP/1.1 0-031650/455/455_ 5.4738530.00.970.97 23.218.252.166localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/407/407_ 5.4562360.00.830.83 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/426/426_ 5.4572540.00.840.84 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/375/375_ 5.4640850.00.710.71 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/468/468_ 5.4724650.00.930.93 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/486/486_ 5.41142340.01.001.00 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/397/397_ 5.4734140.00.860.86 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/454/454_ 5.42111140.00.940.94 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/431/431_ 5.4580340.00.810.81 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/333/333_ 5.42115440.00.730.73 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/343/343_ 5.4485430.00.740.74 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/494/494_ 5.4394530.01.071.07 206.189.89.152localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/505/505_ 5.4719470.01.321.32 23.218.252.161localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fcompany.aspx% 0-031650/396/396_ 5.474440.00.810.81 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/589/589_ 5.478440.01.111.11 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/490/490_ 5.421058156610.00.970.97 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/453/453_ 5.421027410.00.950.95 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/323/323_ 5.4654840.00.700.70 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/412/412_ 5.42119040.00.850.85 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/387/387_ 5.4576450.00.830.83 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-031650/505/505_ 5.4557450.01.071.07 23.48.151.190localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fcompany.aspx% 0-031650/425/425_ 5.42120340.00.930.93 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/468/468_ 5.251016230.01.011.01 23.48.151.172localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fRatingsDirect 1-031660/478/478_ 5.25105752690.00.900.90 23.48.151.190localhost:8080GET /ciqdotnet/logout.aspx?redirect=%2fciqdotnet%2flogin.aspx%3 1-031660/354/354_ 5.2588640.00.730.73 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/565/565_ 5.23113140.01.291.29 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/366/366_ 5.23120940.00.740.74 23.48.151.190localhost:8080GET /CIQDotNet/Login.aspx HTTP/1.1 1-031660/471/471_ 5.2850640.00.960.96 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/466/466_ 5.2583140.01.051.05 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/417/417_ 5.2926350.00.800.80 23.218.252.142localhost:8080GET /ciqdotnet/logout.aspx?redirect=%2fciqdotnet%2flogin.aspx%3 1-031660/426/426_ 5.312540.00.900.90 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/418/418_ 5.2847540.00.900.90 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/399/399_ 5.2931730.00.800.80 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/422/422_ 5.22127760.00.890.89 23.48.151.172localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fRatingsDirect 1-031660/343/343_ 5.2599970.00.640.64 206.189.89.152localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/462/462_ 5.2935940.01.051.05 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/369/369_ 5.27641200.00.760.76 23.48.151.190localhost:8080GET /ciqdotnet/logout.aspx?redirect=%2fciqdotnet%2flogin.aspx%3 1-031660/337/337_ 5.241061284230.00.640.64 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/351/351_ 5.2839040.00.690.69 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/489/489_ 5.30941290.01.181.18 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/389/389_ 5.251058182500.00.780.78 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/380/380_ 5.2762730.00.770.77 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/389/389_ 5.315240.00.830.83 23.48.151.190localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fRatingsDirect 1-031660/418/418_ 5.2855840.00.820.82 23.218.252.142localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fmy%2fdashboar 1-031660/350/350_ 5.23126540.00.790.79 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/390/390_ 5.251057112570.01.041.04 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-031660/387/387_ 5.2914940.00.760.76 23.48.151.190localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fmy%2fdashboar 2-031670/490/490_ 5.2774740.00.970.97 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-031670/423/423_ 5.2932760.00.950.95 23.48.151.172localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fFinancial%2fI 2-031670/463/463_ 5.25105611230.00.930.93 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-031670/392/392_ 5.2746940.00.770.77 23.218.252.142localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fmy%2fdashboar 2-031670/422/422_ 5.251059207030.00.810.81 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-031670/404/404_ 5.2934730.00.770.77 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-031670/464/464_
Severity: medium
Fingerprint: ee80c6706842d3ef6842d3ef6325bb316325bb314f22508d4f22508d562494ff
Apache Status Apache Server Status for capitaliq.com (via 151.108.154.176) Server Version: Apache/2.4.41 (Unix) Server MPM: worker Server Built: May 8 2020 16:23:25 Current Time: Tuesday, 18-Mar-2025 04:09:51 EDT Restart Time: Saturday, 01-Mar-2025 23:35:13 EST Parent Server Config. Generation: 1 Parent Server MPM Generation: 0 Server uptime: 16 days 3 hours 34 minutes 37 seconds Server load: 0.26 0.12 0.05 Total accesses: 633733 - Total Traffic: 1.8 GB CPU Usage: u27.13 s24.23 cu0 cs0 - .00368% CPU load .454 requests/sec - 1356 B/second - 2986 B/request 2 requests currently being processed, 98 idle workers _________K______________________________ __________W_________________________............................ ................................................................ ................................................................ ................................................................ ................................................................ ................ Scoreboard Key: "_" Waiting for Connection, "S" Starting up, "R" Reading Request, "W" Sending Reply, "K" Keepalive (read), "D" DNS Lookup, "C" Closing connection, "L" Logging, "G" Gracefully finishing, "I" Idle cleanup of worker, "." Open slot with no current process SrvPIDAccMCPU SSReqConnChildSlotClientVHostRequest 0-018652970/2514/5715_ 30.00136840.06.5816.57 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2475/6308_ 30.0079940.06.5717.74 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1749/4879_ 30.00110640.04.9213.81 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2460/5328_ 30.0086430.06.8514.64 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2150/5110_ 29.99138840.05.6014.84 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1777/5135_ 30.01452310.04.9915.40 23.218.252.142localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fFilings%2fDoc 0-018652970/2310/4791_ 30.00121040.06.4513.93 23.48.151.172localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fScreening%2fS 0-018652970/1896/4429_ 30.022640.05.0212.57 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1610/4290_ 30.028540.04.3512.43 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2433/5397_ 30.025440.06.3114.55 154.28.229.91localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1895/4755_ 30.0152030.04.8213.44 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1698/4642_ 30.0210630.04.6812.55 23.48.151.136localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1978/5842_ 30.00126340.05.3316.50 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1849/4255_ 30.0164340.05.1212.41 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2050/4508_ 30.0094840.05.1812.59 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2175/5045_ 30.0097560.06.2415.19 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2266/5263_ 30.0092340.06.0315.62 23.218.252.166localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2425/5920_ 30.0224440.06.6417.43 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2376/5573_ 30.0082930.06.8616.28 23.218.252.166localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/2336/4759_ 30.0139640.05.8312.80 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1870/4265_ 30.0159740.04.6111.44 23.218.252.142localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fmy%2fdashboar 0-018652970/1749/4804_ 30.00127740.04.5613.40 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1947/4602_ 30.0234240.05.8314.42 23.218.252.161localhost:8080GET /CIQDotNet/Logout.aspx?preserve=true HTTP/1.1 0-018652970/1736/4603_ 30.0218740.04.3413.48 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 0-018652970/1586/4678_ 30.00119050.04.2113.51 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/518/5364_ 6.71135640.01.3215.34 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/332/5444_ 6.76882220.00.8516.37 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/393/5223_ 6.7816440.01.0414.43 23.218.252.161localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fCreditResearc 1-01326500/530/5848_ 6.789140.01.3415.66 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/451/5901_ 6.7835160.01.0416.19 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/442/6125_ 6.7750040.01.1017.42 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/510/5585_ 6.7827130.01.4114.90 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/383/6006_ 6.7492440.00.9116.88 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326501/547/5907K 6.78942.11.4017.03 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/367/5830_ 6.7821330.00.9016.47 96.126.124.184localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/677/5701_ 6.7686140.01.7015.54 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/379/5868_ 6.7753740.00.9016.45 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/306/5399_ 6.74101150.00.8415.88 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/469/5632_ 6.72121170.01.3416.98 180.102.134.69localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/540/5386_ 6.786060.01.4115.55 10.188.23.1localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/431/5306_ 6.7773140.01.1514.62 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/392/5536_ 6.782930.01.0215.25 154.28.229.130localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/549/5241_ 6.7760040.01.3914.54 23.48.151.190localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fFilings%2fDoc 1-01326500/522/5391_ 6.721318130.01.2415.20 23.48.151.172localhost:8080POST /CIQDotNet/Plugin/9.51.3510.3078/UsageTrackingWebService.a 1-01326500/389/5276_ 6.7683970.00.8614.31 23.48.151.172localhost:8080GET /ciqdotnet/login.aspx HTTP/1.1 1-01326500/353/5211_ 6.72124630.00.8213.94 23.48.151.164localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/392/6039_ 6.749681210.01.0318.76 23.218.252.142localhost:8080GET /ciqdotnet/login.aspx?redirect=%2fCIQDotNet%2fMy%2fCustomiz 1-01326500/432/5635_ 6.7766740.01.2315.90 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/570/4976_ 6.72128540.01.4813.40 23.218.252.142localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 1-01326500/413/6745_ 6.7844330.00.9319.66 206.189.89.152localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/398/5418_ 7.156741200.00.9214.95 23.48.151.190localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/379/6430_ 7.1927650.00.9817.80 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/376/6255_ 7.1563130.00.9318.11 206.189.89.152localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/392/7068_ 7.1755340.00.8719.43 23.48.151.172localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/393/6047_ 7.1210671230.00.9317.69 23.218.252.161localhost:8080GET /CIQDotNet/login.aspx HTTP/1.1 2-01343960/431/5315_ 7.11129050.01.1715.60 23.48.151.190
qa.middlewarewabi.linde.ar 3 office.bowmore.com 3 data-staging.homepass.com 2 capitaliq.com 2 uninav.dev.notified.com 2 tst.api.measurements.suitsupply.com 2 office.ardray.com 2 content.beamdistilling.com 2 dev.vent.lincare.com 2 tst.productconfiguration.custommade.suitsupply.com 1 tst.configuratordataprovider.custommade.suitsupply.com 1 testing.api.custom-made.suitsupply.com 1 tst.productinfomanagement.custommade.suitsupply.com 1 acc.productinfomanagement.custommade.suitsupply.com 1 crisis-training.carnival.com 1 perks-api.thebump.com 1