Unless stated otherwise, this page refers to Ukrainian companies and individual entrepreneurs and uses identifiers from Ukrainian public registries.
This section describes requests used to work with enterprise inspections, inspection parts, violations, sanctions, and files.
Inspection list
GET /api/v1/enterprises/{registry_id}/inspections
This request returns inspections related to the enterprise.
The registry_id parameter in the request path is required. It is the enterprise identifier.
Filters
year: inspection year.super_type_id: inspection super type identifier. Available values can be retrieved from the Inspection super types request.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspections" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
Example response
{
"results": {
"enterprise": { "type": "company", "registry_id": "00178353" },
"items": [
{
"id": 123850,
"parent_id": null,
"super_type_id": 1,
"super_type_name": "Екологічні",
"authority_name": "Держекоінспекція",
"number": "123/2025",
"status": "completed",
"started_at": "2025-03-01",
"ended_at": "2025-03-10",
"violations_count": 5,
"sanctions_count": 2,
"files_count": 3,
"parts_count": 2,
"links": {
"details": "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-details/123850",
"parts": "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-parts/123850",
"violations": "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-violations/123850",
"sanctions": "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-sanctions/123850",
"files": "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-files/123850"
}
}
],
"pagination": { "current_page": 1, "per_page": 20, "total": 1, "last_page": 1 }
},
"stats": { "..." }
}
Response fields
results.items[]: short inspection objects with links to details, parts, violations, sanctions, and files.results.items[].parent_id: parent inspection identifier if the record is a child part of another inspection. Top-level inspections returnnull.results.items[].super_type_id: top-level inspection super type identifier.results.items[].super_type_name: top-level inspection super type name.
Inspection details
GET /api/v1/enterprises/{registry_id}/inspection-details/{inspection_id}
This request returns full data for a specific top-level inspection.
The registry_id and inspection_id parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-details/123850" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
The results.object payload uses the same inspection fields as results.items[] in the inspection list, including parent_id, super_type_id, and super_type_name.
Inspection parts
GET /api/v1/enterprises/{registry_id}/inspection-parts/{inspection_id}
This request returns child parts of a specific inspection.
The registry_id and inspection_id parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier.
The results.object payload for this request includes the same top-level inspection type fields: super_type_id and super_type_name.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-parts/123850" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
Inspection violations
GET /api/v1/enterprises/{registry_id}/inspection-violations/{inspection_id}
This request returns violations identified in a specific inspection.
The registry_id and inspection_id parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier.
The results.object payload for this request includes the same top-level inspection type fields: super_type_id and super_type_name.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-violations/123850" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
Inspection sanctions
GET /api/v1/enterprises/{registry_id}/inspection-sanctions/{inspection_id}
This request returns sanctions associated with a specific inspection.
The registry_id and inspection_id parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier.
The results.object payload for this request includes the same top-level inspection type fields: super_type_id and super_type_name.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-sanctions/123850" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
Inspection files
GET /api/v1/enterprises/{registry_id}/inspection-files/{inspection_id}
This request returns files related to a specific inspection.
The registry_id and inspection_id parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier.
Each file item includes type_code, for example act or order.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-files/123850" \
-H "Authorization: Bearer $ESG_API_TOKEN" \
-H 'Accept: application/json'
Inspection file download
GET /api/v1/enterprises/{registry_id}/inspection-files/{inspection_id}/download/{file_type}
This request returns an inspection file for download.
The registry_id, inspection_id, and file_type parameters in the request path are required. registry_id is the enterprise identifier. inspection_id is the inspection identifier. file_type is the technical file code.
Example request
$ ESG_API_TOKEN="your_api_token"
$ curl -L "https://esg.saveecobot.com/api/v1/enterprises/00178353/inspection-files/123850/download/act" \
-H "Authorization: Bearer $ESG_API_TOKEN"