Odin HomeODIN logoODIN logo

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

175.29.167.123

SummaryCVE DetailsRaw Data
19 Dec 2025, 20:21:10 UTC

Geolocation

Network
175.29.160.0/21
Postal Code
1000
City
Dhaka
Country
Bangladesh (BD)
Continent
Asia
Locale Code
en
Geo Point
23.7278, 90.4135
Updated At
18 Dec 2025, 08:52:51 UTC

Whois

Network
175.29.164.0/22
Organization
Access Telecom (BD) Ltd
Desc
Access Telecom (BD) Ltd, Suite 901 Concord Tower, 113 Kazi Nazrul Islam Avenue
Updated At
09 Dec 2024, 11:27:40 UTC

Geolocation

Network
175.29.160.0/21
Postal Code
1000
City
Dhaka
Country
Bangladesh (BD)
Continent
Asia
Locale Code
en
Geo Point
23.7278, 90.4135
Updated At
18 Dec 2025, 08:52:51 UTC

Whois

Network
175.29.164.0/22
Organization
Access Telecom (BD) Ltd
Desc
Access Telecom (BD) Ltd, Suite 901 Concord Tower, 113 Kazi Nazrul Islam Avenue
Updated At
09 Dec 2024, 11:27:40 UTC

25/smtpTCPLast Updated At: 19 Dec 2025, 09:35:26 UTC

About Service
Product
Postfix smtpd
VersionN/A
Extra InfoN/A
Softwares
Vendor
postfix
Product
postfix
URI
cpe:/a:postfix:postfix
TLS
Serial Number
16002076796521544829
Validity From
19 Oct 2019, 08:42:30
Validity To
16 Oct 2029, 08:42:30
Subject AN
mail.nipagroup.net
Subject CN
mail.nipagroup.net
Subject Org
Nipa Group.
Issuer CN
mail.nipagroup.net
Issuer Org
Nipa Group.
Fingerprint
MD5
872481863408F84ABAB4AC9FCB51A9C6
SHA1
0640A194452D50ADED6EF63625CEBD0CE9BFB807
SHA256
5BEF5DE0F2B52D0630701747AC4B34FCA4916DACDBA4E64249F24FE209B754B1
JARM
00000000000000000000000000000000000000000000000000000000000000
//smtp

//smtp

{
  "banner": "220 mail.nipagroup.net ESMTP Postfix\r\n"
}

80/httpTCPLast Updated At: 19 Dec 2025, 20:21:10 UTC

About Service
Product
Apache httpd
Version
2.2.15
Extra InfoN/A
CVEsCVE-2006-20001CVE-2008-0455CVE-2009-3560CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
apache
Product
http_server
URI
cpe:/a:apache:http_server:2.2.15
HTTP
Status Code
401
Title
Unauthorized
Body SHA256
caf9868ccf87db168749f545ea446c765d10225f9023a73c6776b61659633d93
Component
MiniServ:1.791Webmin
Response Headers
connection
close
content type
text/html; Charset=iso-8859-1
date
Fri, 19 Dec 2025 20:17:26 GMT
server
MiniServ/1.791
www authenticate
Basic realm="Usermin Server"
//http

//http

{
  "body": "<html>\n<head><title>Unauthorized</title></head>\n<body><h1>Unauthorized</h1>\nA password is required to access this\nweb server. Please try again. <p>\n</body></html>\n",
  "body_murmur": -738828725,
  "body_sha256": "caf9868ccf87db168749f545ea446c765d10225f9023a73c6776b61659633d93",
  "component": [
    "MiniServ:1.791",
    "Webmin"
  ],
  "content_length": -1,
  "headers": {
    "connection": [
      "close"
    ],
    "content_type": [
      "text/html; Charset=iso-8859-1"
    ],
    "date": [
      "Fri, 19 Dec 2025 20:17:26 GMT"
    ],
    "server": [
      "MiniServ/1.791"
    ],
    "www_authenticate": [
      "Basic realm=\"Usermin Server\""
    ]
  },
  "protocol": "HTTP/1.0",
  "redirects": [
    {
      "body": "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>302 Found</title>\n</head><body>\n<h1>Found</h1>\n<p>The document has moved <a href=\"http://mail.nipagroup.net:20000\">here</a>.</p>\n<hr>\n<address>Apache/2.2.15 (CentOS) Server at 175.29.167.123 Port 80</address>\n</body></html>\n",
      "body_murmur": 753886796,
      "body_sha256": "029879f8f95be3e1c30820856c11f2cfa52f342c03221bdf2707ea2bc5615e45",
      "content_length": 295,
      "headers": {
        "content_length": [
          "295"
        ],
        "content_type": [
          "text/html; charset=iso-8859-1"
        ],
        "date": [
          "Fri, 19 Dec 2025 20:17:26 GMT"
        ],
        "location": [
          "http://mail.nipagroup.net:20000"
        ],
        "server": [
          "Apache/2.2.15 (CentOS)"
        ]
      },
      "location": "http://mail.nipagroup.net:20000",
      "protocol": "HTTP/1.1",
      "status_code": 302,
      "status_line": "302 Found"
    }
  ],
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "referer": [
        "http://175.29.167.123"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "mail.nipagroup.net:20000",
      "path": "",
      "scheme": "http"
    }
  },
  "status_code": 401,
  "title": "Unauthorized"
}

110/pop3TCPLast Updated At: 14 Dec 2025, 16:10:44 UTC

About Service
Product
Dovecot pop3d
VersionN/A
Extra InfoN/A
Softwares
Vendor
dovecot
Product
dovecot
URI
cpe:/a:dovecot:dovecot
TLS
Serial Number
16002076796521544829
Validity From
19 Oct 2019, 08:42:30
Validity To
16 Oct 2029, 08:42:30
Subject AN
mail.nipagroup.net
Subject CN
mail.nipagroup.net
Subject Org
Nipa Group.
Issuer CN
mail.nipagroup.net
Issuer Org
Nipa Group.
Fingerprint
MD5
872481863408F84ABAB4AC9FCB51A9C6
SHA1
0640A194452D50ADED6EF63625CEBD0CE9BFB807
SHA256
5BEF5DE0F2B52D0630701747AC4B34FCA4916DACDBA4E64249F24FE209B754B1
JARM
00000000000000000000000000000000000000000000000000000000000000
//pop3

//pop3

{
  "banner": "+OK Dovecot ready.\r\n"
}

143/imapTCPLast Updated At: 12 Dec 2025, 12:26:50 UTC

About Service
Product
Dovecot imapd
VersionN/A
Extra InfoN/A
Softwares
Vendor
dovecot
Product
dovecot
URI
cpe:/a:dovecot:dovecot
TLS
Serial Number
16002076796521544829
Validity From
19 Oct 2019, 08:42:30
Validity To
16 Oct 2029, 08:42:30
Subject AN
mail.nipagroup.net
Subject CN
mail.nipagroup.net
Subject Org
Nipa Group.
Issuer CN
mail.nipagroup.net
Issuer Org
Nipa Group.
Fingerprint
MD5
872481863408F84ABAB4AC9FCB51A9C6
SHA1
0640A194452D50ADED6EF63625CEBD0CE9BFB807
SHA256
5BEF5DE0F2B52D0630701747AC4B34FCA4916DACDBA4E64249F24FE209B754B1
JARM
00000000000000000000000000000000000000000000000000000000000000
//imap

//imap

{
  "banner": "* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.\r\n"
}

443/httpTCPLast Updated At: 19 Dec 2025, 10:40:31 UTC

About Service
Product
Apache httpd
Version
2.2.15
Extra Info
(CentOS)
CVEsCVE-2006-20001CVE-2008-0455CVE-2009-3560CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
apache
Product
http_server
URI
cpe:/a:apache:http_server:2.2.15
HTTP
Status Code
403
Title
Apache HTTP Server Test Page powered by CentOS
Body SHA256
29a8b2a2dbac349f919923d25af4f9162bc58c29b2daac41a56f5b25ba24276d
Component
Apache HTTP Server:2.2.15CentOS
Response Headers
accept ranges
bytes
content length
4961
content type
text/html; charset=UTF-8
date
Fri, 19 Dec 2025 10:04:14 GMT
server
Apache/2.2.15 (CentOS)
TLS
Serial Number
25696
Validity From
28 Mar 2016, 03:06:53
Validity To
28 Mar 2017, 03:06:53
Subject AN
mail
Subject CN
mail
Subject Org
SomeOrganization
Issuer CN
mail
Issuer Org
SomeOrganization
Fingerprint
MD5
AF7DF907F18F9D1EF3E98E421C550642
SHA1
3B04B04B5474A0DE6EEC512E53B35AE89385F8F1
SHA256
10F3D028A3D7DE5B59223DCB7F8D6E8235DB8ACFF697CA7F42A3C6F4EBD27CD0
JARM
05d02d20d21d20d05c05d02d05d20d74fcf6501ae7a92319e575bfafd2a827
//http

//http

{
  "body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">\n\t<head>\n\t\t<title>Apache HTTP Server Test Page powered by CentOS</title>\n\t\t<meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n\t\t<style type=\"text/css\">\n\t\t\tbody {\n\t\t\t\tbackground-color: #fff;\n\t\t\t\tcolor: #000;\n\t\t\t\tfont-size: 0.9em;\n\t\t\t\tfont-family: sans-serif,helvetica;\n\t\t\t\tmargin: 0;\n\t\t\t\tpadding: 0;\n\t\t\t}\n\t\t\t:link {\n\t\t\t\tcolor: #0000FF;\n\t\t\t}\n\t\t\t:visited {\n\t\t\t\tcolor: #0000FF;\n\t\t\t}\n\t\t\ta:hover {\n\t\t\t\tcolor: #3399FF;\n\t\t\t}\n\t\t\th1 {\n\t\t\t\ttext-align: center;\n\t\t\t\tmargin: 0;\n\t\t\t\tpadding: 0.6em 2em 0.4em;\n\t\t\t\tbackground-color: #3399FF;\n\t\t\t\tcolor: #ffffff;\n\t\t\t\tfont-weight: normal;\n\t\t\t\tfont-size: 1.75em;\n\t\t\t\tborder-bottom: 2px solid #000;\n\t\t\t}\n\t\t\th1 strong {\n\t\t\t\tfont-weight: bold;\n\t\t\t}\n\t\t\th2 {\n\t\t\t\tfont-size: 1.1em;\n\t\t\t\tfont-weight: bold;\n\t\t\t}\n\t\t\t.content {\n\t\t\t\tpadding: 1em 5em;\n\t\t\t}\n\t\t\t.content-columns {\n\t\t\t\t/* Setting relative positioning allows for \n\t\t\t\tabsolute positioning for sub-classes */\n\t\t\t\tposition: relative;\n\t\t\t\tpadding-top: 1em;\n\t\t\t}\n\t\t\t.content-column-left {\n\t\t\t\t/* Value for IE/Win; will be overwritten for other browsers */\n\t\t\t\twidth: 47%;\n\t\t\t\tpadding-right: 3%;\n\t\t\t\tfloat: left;\n\t\t\t\tpadding-bottom: 2em;\n\t\t\t}\n\t\t\t.content-column-right {\n\t\t\t\t/* Values for IE/Win; will be overwritten for other browsers */\n\t\t\t\twidth: 47%;\n\t\t\t\tpadding-left: 3%;\n\t\t\t\tfloat: left;\n\t\t\t\tpadding-bottom: 2em;\n\t\t\t}\n\t\t\t.content-columns>.content-column-left, .content-columns>.content-column-right {\n\t\t\t\t/* Non-IE/Win */\n\t\t\t}\n\t\t\timg {\n\t\t\t\tborder: 2px solid #fff;\n\t\t\t\tpadding: 2px;\n\t\t\t\tmargin: 2px;\n\t\t\t}\n\t\t\ta:hover img {\n\t\t\t\tborder: 2px solid #3399FF;\n\t\t\t}\n\t\t</style>\n\t</head>\n\n\t<body>\n\t<h1>Apache 2 Test Page<br><font size=\"-1\"><strong>powered by</font> CentOS</strong></h1>\n\n\t\t<div class=\"content\">\n\t\t\t<div class=\"content-middle\">\n\t\t\t\t<p>This page is used to test the proper operation of the Apache HTTP server after it has been installed. If you can read this page it means that the Apache HTTP server installed at this site is working properly.</p>\n\t\t\t</div>\n<hr />\n\t\t\t<div class=\"content-columns\">\n\t\t\t\t<div class=\"content-column-left\">\n\t\t\t\t\t<h2>If you are a member of the general public:</h2>\n\n\t\t\t\t\t<p>The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance.</p>\n\n\t\t\t\t\t<p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name \"webmaster\" and directed to the website's domain should reach the appropriate person.</p>\n\n\t\t\t\t\t<p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to \"[email protected]\".</p>\n\t\t\t\t</div>\n\n\t\t\t\t<div class=\"content-column-right\">\n\t\t\t\t\t<h2>If you are the website administrator:</h2>\n\n\t\t\t\t\t<p>You may now add content to the directory <tt>/var/www/html/</tt>. Note that until you do so, people visiting your website will see this page and not your content. To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p>\n\n\t\t\t\t\t\t<p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers.  Thanks for using Apache and CentOS!</p>\n\n\t\t\t\t\t\t<p><a href=\"http://httpd.apache.org/\"><img src=\"/icons/apache_pb.gif\" alt=\"[ Powered by Apache ]\"/></a> <a href=\"http://www.centos.org/\"><img src=\"/icons/poweredby.png\" alt=\"[ Powered by CentOS Linux ]\" width=\"88\" height=\"31\" /></a></p>\n\t\t\t\t</div>\n\t\t\t</div>\n                </div>\n                <div class=\"content\">\n<div class=\"content-middle\"><h2>About CentOS:</h2><b>The Community ENTerprise Operating System</b> (CentOS) Linux is a community-supported enterprise distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with Red Hat Enterprise Linux. The CentOS Project is the organization that builds CentOS. We mainly change packages to remove upstream vendor branding and artwork.</p> <p>For information on CentOS please visit the <a href=\"http://www.centos.org/\">CentOS website</a>.</p>\n<p><h2>Note:</h2><p>CentOS is an Operating System and it is used to power this website; however, the webserver is owned by the domain owner and not the CentOS Project.  <b>If you have issues with the content of this site, contact the owner of the domain, not the CentOS Project.</b> <p>Unless this server is on the <b>centos.org</b> domain, the CentOS Project doesn't have anything to do with the content on this webserver or any e-mails that directed you to this site.</p> <p>For example, if this website is www.example.com, you would find the owner of the example.com domain at the following WHOIS server:</p> <p><a href=\"http://www.internic.net/whois.html\">http://www.internic.net/whois.html</a></p>\n                        </div>\n\t\t</div>\n</body>\n</html>\n",
  "body_murmur": -1123910839,
  "body_sha256": "29a8b2a2dbac349f919923d25af4f9162bc58c29b2daac41a56f5b25ba24276d",
  "component": [
    "Apache HTTP Server:2.2.15",
    "CentOS"
  ],
  "content_length": 4961,
  "headers": {
    "accept_ranges": [
      "bytes"
    ],
    "content_length": [
      "4961"
    ],
    "content_type": [
      "text/html; charset=UTF-8"
    ],
    "date": [
      "Fri, 19 Dec 2025 10:04:14 GMT"
    ],
    "server": [
      "Apache/2.2.15 (CentOS)"
    ]
  },
  "protocol": "HTTP/1.1",
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "175.29.167.123",
      "path": "",
      "scheme": "https"
    }
  },
  "status_code": 403,
  "title": "Apache HTTP Server Test Page powered by CentOS"
}

465/smtpTCPLast Updated At: 14 Dec 2025, 16:20:11 UTC

About Service
Product
Postfix smtpd
VersionN/A
Extra InfoN/A
Softwares
Vendor
postfix
Product
postfix
URI
cpe:/a:postfix:postfix

587/smtpTCPLast Updated At: 16 Dec 2025, 05:36:48 UTC

About Service
Product
Postfix smtpd
VersionN/A
Extra InfoN/A
Softwares
Vendor
postfix
Product
postfix
URI
cpe:/a:postfix:postfix
TLS
Serial Number
16002076796521544829
Validity From
19 Oct 2019, 08:42:30
Validity To
16 Oct 2029, 08:42:30
Subject AN
mail.nipagroup.net
Subject CN
mail.nipagroup.net
Subject Org
Nipa Group.
Issuer CN
mail.nipagroup.net
Issuer Org
Nipa Group.
Fingerprint
MD5
872481863408F84ABAB4AC9FCB51A9C6
SHA1
0640A194452D50ADED6EF63625CEBD0CE9BFB807
SHA256
5BEF5DE0F2B52D0630701747AC4B34FCA4916DACDBA4E64249F24FE209B754B1
JARM
00000000000000000000000000000000000000000000000000000000000000
//smtp

//smtp

{
  "banner": "220 mail.nipagroup.net ESMTP Postfix\r\n"
}

993/imapTCPLast Updated At: 15 Dec 2025, 00:10:33 UTC

About Service
Product
Dovecot imapd
VersionN/A
Extra InfoN/A
Softwares
Vendor
dovecot
Product
dovecot
URI
cpe:/a:dovecot:dovecot

995/pop3TCPLast Updated At: 12 Dec 2025, 05:45:15 UTC

About Service
Product
Dovecot pop3d
VersionN/A
Extra InfoN/A
Softwares
Vendor
dovecot
Product
dovecot
URI
cpe:/a:dovecot:dovecot

20000/httpTCPLast Updated At: 19 Dec 2025, 16:43:17 UTC

About Service
Product
MiniServ
Version
1.791
Extra Info
Webmin httpd
HTTP
Status Code
401
Title
Unauthorized
Body SHA256
caf9868ccf87db168749f545ea446c765d10225f9023a73c6776b61659633d93
Component
MiniServ:1.791Webmin
Favicon
Path
http://175.29.167.123:20000/favicon.ico
MD5 Hash
4227e5d927da75b717de6053c4100d2d
Murmur Hash
1453890729
Size
1150
Response Headers
connection
close
content type
text/html; Charset=iso-8859-1
date
Fri, 19 Dec 2025 16:39:34 GMT
server
MiniServ/1.791
www authenticate
Basic realm="Usermin Server"
//http

//http

{
  "body": "<html>\n<head><title>Unauthorized</title></head>\n<body><h1>Unauthorized</h1>\nA password is required to access this\nweb server. Please try again. <p>\n</body></html>\n",
  "body_murmur": -738828725,
  "body_sha256": "caf9868ccf87db168749f545ea446c765d10225f9023a73c6776b61659633d93",
  "component": [
    "MiniServ:1.791",
    "Webmin"
  ],
  "content_length": -1,
  "favicon": {
    "md5_hash": "4227e5d927da75b717de6053c4100d2d",
    "murmur_hash": 1453890729,
    "path": "http://175.29.167.123:20000/favicon.ico",
    "size": 1150
  },
  "headers": {
    "connection": [
      "close"
    ],
    "content_type": [
      "text/html; Charset=iso-8859-1"
    ],
    "date": [
      "Fri, 19 Dec 2025 16:39:34 GMT"
    ],
    "server": [
      "MiniServ/1.791"
    ],
    "www_authenticate": [
      "Basic realm=\"Usermin Server\""
    ]
  },
  "protocol": "HTTP/1.0",
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "175.29.167.123:20000",
      "path": "",
      "scheme": "http"
    }
  },
  "status_code": 401,
  "title": "Unauthorized"
}