118.70.133.137
{
"scan_id": 1752774106,
"ip": "118.70.133.137",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "118.70.132.0/22",
"postal_code": "100000",
"coordinates": {
"latitude": "21.0184",
"longitude": "105.8461"
},
"geo_point": "21.0184, 105.8461",
"locale_code": "en",
"continent": "Asia",
"country_code": "VN",
"country_name": "Vietnam",
"city": "Hanoi"
},
"location_updated_at": "2025-07-18T16:47:30Z",
"asn": {
"number": "AS18403",
"organization": "FPT Telecom Company",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "118.70.133.0/24",
"organization": "Vietnam Internet Network Information Center (VNNIC)",
"descr": "Vietnam Internet Network Information Center (VNNIC),\n18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam,\n10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:04Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-07-18T16:47:30Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-07-18T18:42:30Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-07-18T16:47:30Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.24.0",
"product": "nginx",
"extra_info": "Ubuntu",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.24.0",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.24\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
"body_murmur": 1637199859,
"body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
"component": [
"Nginx:1.24.0",
"Ubuntu"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 21 Jul 2025 03:39:31 GMT"
],
"etag": [
"W/\"66b20ad6-267\""
],
"last_modified": [
"Tue, 06 Aug 2024 11:36:54 GMT"
],
"server": [
"nginx/1.24.0 (Ubuntu)"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "118.70.133.137",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to nginx!",
"transfer_encoding": [
"chunked"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "http://118.70.133.137/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-21T03:39:31.737Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n\n<head>\n <meta charset=\"utf-8\">\n <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n <meta name=\"robots\" content=\"noindex, nofollow\">\n\n <meta name=\"viewport\" content=\"width=device-width,initial-scale=1\"/>\n <title>Login to IEM</title>\n <link rel=\"icon\" href=\"/auth/resources/nasof/login/custom/img/favicon.ico\" />\n <link href=\"/auth/resources/nasof/login/custom/css/styles.css\" rel=\"stylesheet\" />\n <link href=\"/auth/resources/nasof/login/custom/css/ix-icons.css\" rel=\"stylesheet\" />\n <script src=\"/auth/resources/nasof/login/custom/js/show-hide-password.js\" type=\"text/javascript\"></script>\n <script type=\"module\" src=\"/osbar/iema-os-bar/iema-os-bar.esm.js\"></script>\n <link rel=\"stylesheet\" href=\"/osbar/iema-os-bar/iema-os-bar.css\"/>\n</head>\n\n<body class=\"difads theme-brand-light\">\n <iema-os-bar app-info=\"/auth/resources/nasof/login/custom/assets/app-info.json\" language=\"en\"></iema-os-bar>\n <div class=\"wrapper\"> \n <div class=\"layout\">\n <div class=\"layout__left\">\n <div class=\"layout__leftContainer\">\n <header>\n <p class=\"font--xxlarge font--bold\" id=\"kc-page-title\"> We are sorry...\n</p>\n </header>\n <div id=\"kc-content\">\n <div id=\"kc-content-wrapper\">\n\n <div class=\"systemmessage systemmessage--error\">\n <h1 class=\"systemmessage__title\"></h1>\n <div class=\"systemmessage__content\"><p>Invalid parameter: redirect_uri</p></div>\n </div>\n\n\n\n </div>\n </div>\n </div>\n </div>\n\n <div class=\"layout__right\">\n </div>\n </div>\n </div>\n</body>\n</html>\n",
"body_murmur": -1001983392,
"body_sha256": "f8f1d42b83874e8390ea2a035cfed93f81de012c4ebf011061edd83da8421888",
"content_length": 1852,
"favicon": {
"md5_hash": "a586e37636a42008eedc8c6c17c534ad",
"murmur_hash": 261439797,
"path": "https://edge.swoc.pisa.vn:443/auth/resources/nasof/login/custom/img/favicon.ico",
"size": 4286
},
"headers": {
"connection": [
"keep-alive"
],
"content_language": [
"en"
],
"content_length": [
"1852"
],
"content_security_policy": [
"default-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; font-src 'self' data:; frame-ancestors 'self';"
],
"content_type": [
"text/html;charset=utf-8"
],
"set_cookie": [
"KC_STATE_CHECKER=eyJhbGciOiJIUzUxMiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlYjc1NDJiNC0yYmJmLTRhZGMtYWNhYy0xMzliZjFlNzE1YTkifQ.eyJta3kiOiJpbnZhbGlkUGFyYW1ldGVyTWVzc2FnZSIsIm10eSI6IkVSUk9SIiwibXBhciI6WyJyZWRpcmVjdF91cmkiXSwic3RhdCI6NDAwLCJjbGlkIjoiYmJmYzhkMGEtNTA1OS00MjdhLWE2N2UtZDI5MTcwOWJlNDE1Iiwic3QyIjoiNzYxNGFmODctMmU4ZS00ZDgyLTgyZTctOGM0OTYxNjE4MzUxIn0.hJYdud4rqaK655TYKIyHenMqWfjdHGD3Ay-dwQ_MDwrMKC_OxNnB8ceiEAEfxXvR0llb5VVQHp9DvtiqURr6KQ;Version=1;Path=/auth/realms/customer/;Max-Age=300;Secure;HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"unknown": [
{
"key": "x_robots_tag",
"value": [
"none"
]
},
{
"key": "referrer_policy",
"value": [
"no-referrer"
]
}
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html>\r\n<head><title>302 Found</title></head>\r\n<body>\r\n<center><h1>302 Found</h1></center>\r\n</body>\r\n</html>\r\n",
"body_murmur": -9616316,
"body_sha256": "075f0fd7eeb4bfec31816d61be72b064d4899853b224bd5f380041d7dd0b1d19",
"content_length": 110,
"headers": {
"cache_control": [
"no-cache, no-store, max-age=0"
],
"connection": [
"keep-alive"
],
"content_length": [
"110"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 20 Jul 2025 16:05:48 GMT"
],
"location": [
"https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e"
],
"set_cookie": [
"session=r588A5yOun6KRlrW_7OScA|1753031148|gWZiCYSR_hQwfSnb_EbI1ZQrV4FTnhd58qgALcoSwkLNNt-SKDve_3XihmlDarli69NZfXFBkrfR3WGosQwIseQUnF26ch0w3u6K-md4iBg49jnLHRuz5DKNIGbS4mlD4SfuNjYgmNVJOntKB6zGwOzwp2M55rHBM5JtS1sB4CMaUgMftF0-AT2wlxJxjbjD|oXhxR8yOPY1Tlb8VTorWT6urlfY; Path=/; SameSite=Lax; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"unknown": [
{
"key": "referrer_policy",
"value": [
"strict-origin"
]
}
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"location": "https://edge.swoc.pisa.vn/auth/realms/customer/protocol/openid-connect/auth?response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Moved Temporarily"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://118.70.133.137"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "edge.swoc.pisa.vn",
"path": "/auth/realms/customer/protocol/openid-connect/auth",
"raw_query": "response_type=code&redirect_uri=https%3A%2F%2F118.70.133.137%2Fcb&client_id=ie-management&scope=openid&state=07b2ed322c00e84c8ff80c5863d65b45&nonce=f7dfb9be7dd0227976d07e29ab94851e",
"scheme": "https"
}
},
"status_code": 400,
"title": "Login to IEM"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt"
],
"ocsp_urls": [
"http://status.rapidssl.com"
]
},
"authority_key_id": "0cdb6c82490f4a670ab814ee7ac4485288eb5638",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"http://www.digicert.com/CPS"
],
"id": "2.23.140.1.2.1"
}
],
"crl_distribution_points": [
"http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl"
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:\n F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A\n Timestamp : Sep 6 08:24:38.209 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:22:E0:9F:42:F5:C3:83:D7:13:73:4C:16:\n 0E:1F:1A:01:7F:55:E4:25:BD:A8:84:F6:3D:6B:C7:53:\n CD:EC:61:9D:02:20:08:2A:81:2F:26:58:1D:C1:90:EB:\n C9:3C:99:B0:34:BD:DD:B5:66:D4:89:4E:62:8D:D5:BC:\n 43:F6:41:C9:DC:B6\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:\n 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8\n Timestamp : Sep 6 08:24:38.165 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:D1:7B:34:58:54:15:41:B8:D0:21:FB:\n 27:6C:4C:5D:F5:6E:8A:A8:3A:06:A9:3A:D0:BC:0F:C2:\n 14:12:10:4E:94:02:20:16:5C:AE:D0:40:AD:BB:3B:A9:\n BE:9C:DA:A1:14:85:5D:EE:78:A1:FD:B3:DA:A1:29:3C:\n 1C:A6:F0:7A:83:24:E9\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:\n D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50\n Timestamp : Sep 6 08:24:38.179 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:C2:C4:E6:F0:B2:28:D4:34:C9:0D:1C:\n 45:FC:09:70:0D:4C:16:65:94:CD:B5:C8:B0:40:6E:5E:\n 80:DF:78:9F:A5:02:21:00:E4:CF:79:6D:42:E5:39:9A:\n EE:E5:FF:E2:B0:F9:BE:2C:28:24:AC:78:A1:64:35:F2:\n A5:02:F0:83:44:C5:5E:38",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"edge.swoc.pisa.vn",
"www.edge.swoc.pisa.vn"
]
},
"subject_key_id": "c360abfdf1653321860aaefe868fe5edeb52e139"
},
"fingerprint_md5": "9AE4FCAA592D45E46FC8BF61D8248F73",
"fingerprint_sha1": "28DA73489AD76475E239E3FDAE265DBBD361FBC1",
"fingerprint_sha256": "8679E5D737B0747332750998014CFE2C67FF1911BE3403518404D78D5977CDC1",
"issuer": {
"common_name": [
"RapidSSL TLS RSA CA G1"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=RapidSSL TLS RSA CA G1",
"jarm": "15d3fd16d29d29d00042d43d00000041ad16ead50175e1e575f5579aa6b5c8",
"redacted": false,
"revocation": {
"crl": {
"next_update": "2025-07-27T20:09:15",
"reason": "UNKNOWN",
"revoked": false
},
"ocsp": {
"next_update": "2025-07-27T04:57:01",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1562589652247475164359053793586285988",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "12f14e34bd53724c840619c38f3f7a13f8e7b56287889c6d300584ebe586263a",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3044022022e09f42f5c383d713734c160e1f1a017f55e425bda884f63d6bc753cdec619d0220082a812f26581dc190ebc93c99b034bdddb566d4894e628dd5bc43f641c9dcb6"
},
"timestamp": "2024-09-06T08:24:38.209000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "7d591e12e1782a7b1c61677c5efdf8d0875c14a04e959eb9032fd90e8c2e79b8",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100d17b3458541541b8d021fb276c4c5df56e8aa83a06a93ad0bc0fc21412104e940220165caed040adbb3ba9be9cdaa114855dee78a1fdb3daa1293c1ca6f07a8324e9"
},
"timestamp": "2024-09-06T08:24:38.165000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "e6d2316340778cc1104106d771b9cec1d240f6968486fbba87321dfd1e378e50",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100c2c4e6f0b228d434c90d1c45fc09700d4c166594cdb5c8b0406e5e80df789fa5022100e4cf796d42e5399aeee5ffe2b0f9be2c2824ac78a16435f2a502f08344c55e38"
},
"timestamp": "2024-09-06T08:24:38.179000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"edge.swoc.pisa.vn"
]
},
"subject_alt_name": {
"dns_names": [
"edge.swoc.pisa.vn",
"www.edge.swoc.pisa.vn"
],
"extended_dns_names": [
{
"domain": "pisa",
"fld": "pisa.vn",
"subdomain": "edge.swoc",
"tld": "vn"
},
{
"domain": "pisa",
"fld": "pisa.vn",
"subdomain": "www.edge.swoc",
"tld": "vn"
}
]
},
"subject_dn": "/CN=edge.swoc.pisa.vn",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "bbe8de7d9d3aaa58de1c8c7dcd8c4b99ccdc57a40cf0cf0c88fcf1db0338d9be",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "7349714aa7427728a2c62ca27021fd5d59232a20043c49676c9f0a3859d56905",
"tbs_noct_fingerprint": "2e4efccd30b7eace4df0f83ea105095892cb7e0ed3c300df8e44c9a6d3c496a1",
"validation_level": "DV",
"validity": {
"length_seconds": 31536000,
"not_after": "2025-09-05T23:59:59",
"not_before": "2024-09-06T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "8679E5D737B0747332750998014CFE2C67FF1911BE3403518404D78D5977CDC1",
"precert": false,
"raw": "MIIGOTCCBSGgAwIBAgIQASzxnjNzFsj4gUofo+eNpDANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMR8wHQYDVQQDExZSYXBpZFNTTCBUTFMgUlNBIENBIEcxMB4XDTI0MDkwNjAwMDAwMFoXDTI1MDkwNTIzNTk1OVowHDEaMBgGA1UEAxMRZWRnZS5zd29jLnBpc2Eudm4wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDprx0K2s+zN2FJNqB+MOi9N7eoWuj31ovdgAMaIjIVjL8r2L7XddBZiwCYjoG/D099/ZAR2YPeS5XMUytTkXlU8ykWsvoHYPXkopW1jFn25LZ9utGZWJvdo0BMHSH8eUvyYYvwO4eCdnBWrZZ8o03DUayHn/HCSywYIOgkevAGQznKYFbRz8I7y1mLcg6fqFdQsD7u6Adz+tHQ8F+laTcF94FTfKRE2+avHOWVu75Yl+8J/tLGH6AkGB/WUNUB6q89ABBPJd2GxTDHLLZpYeZ70IGV00gVIEqdcYAhRa3zDzsP5NojbL6G+sJK8fliZytCPx8X8vIYuk61j7lAA7H5AgMBAAGjggMxMIIDLTAfBgNVHSMEGDAWgBQM22yCSQ9KZwq4FO56xEhSiOtWODAdBgNVHQ4EFgQUw2Cr/fFlMyGGCq7+ho/l7etS4TkwMwYDVR0RBCwwKoIRZWRnZS5zd29jLnBpc2Eudm6CFXd3dy5lZGdlLnN3b2MucGlzYS52bjA+BgNVHSAENzA1MDMGBmeBDAECATApMCcGCCsGAQUFBwIBFhtodHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY2RwLnJhcGlkc3NsLmNvbS9SYXBpZFNTTFRMU1JTQUNBRzEuY3JsMHYGCCsGAQUFBwEBBGowaDAmBggrBgEFBQcwAYYaaHR0cDovL3N0YXR1cy5yYXBpZHNzbC5jb20wPgYIKwYBBQUHMAKGMmh0dHA6Ly9jYWNlcnRzLnJhcGlkc3NsLmNvbS9SYXBpZFNTTFRMU1JTQUNBRzEuY3J0MAwGA1UdEwEB/wQCMAAwggF+BgorBgEEAdZ5AgQCBIIBbgSCAWoBaAB1ABLxTjS9U3JMhAYZw48/ehP457Vih4icbTAFhOvlhiY6AAABkcZvckEAAAQDAEYwRAIgIuCfQvXDg9cTc0wWDh8aAX9V5CW9qIT2PWvHU83sYZ0CIAgqgS8mWB3BkOvJPJmwNL3dtWbUiU5ijdW8Q/ZBydy2AHYAfVkeEuF4KnscYWd8Xv340IdcFKBOlZ65Ay/ZDowuebgAAAGRxm9yFQAABAMARzBFAiEA0Xs0WFQVQbjQIfsnbExd9W6KqDoGqTrQvA/CFBIQTpQCIBZcrtBArbs7qb6c2qEUhV3ueKH9s9qhKTwcpvB6gyTpAHcA5tIxY0B3jMEQQQbXcbnOwdJA9paEhvu6hzId/R43jlAAAAGRxm9yIwAABAMASDBGAiEAwsTm8LIo1DTJDRxF/AlwDUwWZZTNtciwQG5egN94n6UCIQDkz3ltQuU5mu7l/+Kw+b4sKCSseKFkNfKlAvCDRMVeODANBgkqhkiG9w0BAQsFAAOCAQEAqbxLusgRQ0dNSj4VQjhx86MDjDw7d9S8mXiJHKMwzKltTSe/qd4H02o+FuhGz/TaWzMGsnHKkO8bNZue2ZJ6bA49CWoKIGLT6XJQRkM1VK0EVLimoijAqr9xvf1kr76BC65KKYnm4UNtAP3epkmiKV7XgqMxTfYoEsAmbJmiLNXEuFCYtgnN93Bij8mdV+FH+Zb7j5avbUWOvXAudLQflTTCsXGgO0/plDgZ/xXqRwntGZWuVGm9iJZfEw9XsHU/BBS7KWOgTnG5yWECpT2SWrpHxlzvX8swJ3wBp2yan6/EFj4rrRDYD2cjZ/FF5jp92AiBHpRKm6YDA+esuEZmEQ==",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://118.70.133.137/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-20T22:36:33.245Z"
}
],
"services_hash": "e0510fe06f50a47c4cd3edccbfbf5c5f7d31986c88da5b12df701699d129a842",
"last_updated_at": "2025-07-21T03:39:31.737Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"80/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"80/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"80/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"80/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"80/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}