In networking, an endpoint is a device or location that is used to access a network. It includes computers, laptops, servers, smartphones, and other devices connected to the network [1]. Endpoints are typically used to access network resources and services, such as the internet or internal network resources. Endpoints are often the target of attackers, as they can be used to gain access to a network and its resources [2]. So, endpoint protection is exigency. The experts suggest many standards policies, practices and guidelines to in tune with security [3, 4].
*Author for correspondenceOrganizations implemented various security measures to protect endpoints, including antivirus and firewall software, strong password policies, and regular updates to security protocols and software to keep attackers at bay. These security measures were up to mark against a distributed or centralised technique. However, blockchain, the latest technique, is fully decentralised [5]. So, these security measures are inadequate to protect endpoints in the blockchain. A few papers were published on endpoint vulnerabilities in blockchain, but none notice and addressed them properly. This study aims to investigate and find the endpoint vulnerabilities in existing blockchain, its root causes and mitigation techniques and fulfil the