Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.131.21.103

SummaryCVE DetailsRaw Data
11 Feb 2026, 01:04:47 UTC
{
  "scan_id": 1770705095,
  "ip": "182.131.21.103",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.131.16.0/21",
    "postal_code": "",
    "coordinates": {
      "latitude": "34.7732",
      "longitude": "113.722"
    },
    "geo_point": "34.7732, 113.722",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "CN",
    "country_name": "China",
    "city": ""
  },
  "location_updated_at": "2026-02-11T00:18:24Z",
  "asn": {
    "number": "AS38283",
    "organization": "CHINANET SiChuan Telecom Internet Data Center",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.128.0.0/12",
    "organization": "CHINANET Sichuan province network",
    "descr": "CHINANET Sichuan province network,\nData Communication Division,\nChina Telecom",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:50Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-02-11T00:18:24Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-02-11T00:31:15Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-02-11T00:18:24Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T14:43:50.963Z"
    },
    {
      "port": 22,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-02T00:42:35.964Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T00:49:57.44Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "2.0",
      "product": "Microsoft HTTPAPI httpd",
      "extra_info": "SSDP/UPnP",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
          "body_murmur": 1489525118,
          "body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
          "component": [
            "Microsoft HTTPAPI:2.0"
          ],
          "content_length": 315,
          "headers": {
            "content_length": [
              "315"
            ],
            "content_type": [
              "text/html; charset=us-ascii"
            ],
            "date": [
              "Mon, 26 Jan 2026 03:13:36 GMT"
            ],
            "server": [
              "Microsoft-HTTPAPI/2.0"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.131.21.103",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 404,
          "title": "Not Found"
        }
      },
      "url": "http://182.131.21.103/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-03T23:52:12.701Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-20T22:29:03.223Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T12:01:55.186Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.0",
      "product": "Microsoft HTTPAPI httpd",
      "extra_info": "SSDP/UPnP",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA"
                ],
                "ocsp_urls": [
                  "http://ocsp.digicert.com"
                ]
              },
              "authority_key_id": "78df91905feedeacf6c575ebd54c5553ef244ab6",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "cps": [
                    "http://www.digicert.com/CPS"
                  ],
                  "id": "2.23.140.1.2.1"
                }
              ],
              "ct_precert_scts": "Signed Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n                E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n    Timestamp : Feb  6 02:48:24.748 2026 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:46:02:21:00:E0:D5:65:02:A1:37:91:E2:24:F0:B0:\n                3A:06:80:F7:B3:CA:97:D3:51:9E:03:9C:B8:19:6D:1E:\n                F0:E2:09:1B:B7:02:21:00:93:57:09:E0:4D:B7:5B:B9:\n                E3:DD:08:D7:E0:AC:9C:7D:B8:A0:5B:90:65:82:03:F7:\n                2F:CF:9D:31:39:E7:CC:AC\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 16:83:2D:AB:F0:A9:25:0F:0F:F0:3A:A5:45:FF:C8:BF:\n                C8:23:D0:87:4B:F6:04:29:27:F8:E7:1F:33:13:F5:FA\n    Timestamp : Feb  6 02:48:24.735 2026 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:21:00:FE:D3:36:0B:D5:58:76:27:8D:C3:CA:\n                13:D1:E4:71:B8:9A:F5:08:1F:A8:01:ED:68:1F:FF:3E:\n                C6:A0:0B:F4:72:02:20:0E:88:FD:93:E6:88:5F:DC:9A:\n                85:DA:1F:20:D6:21:84:A8:00:F2:7A:E8:6D:73:59:FF:\n                4A:36:2F:F4:7E:16:F1\nSigned Certificate Timestamp:\n    Version   : v1 (0x0)\n    Log ID    : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n                4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n    Timestamp : Feb  6 02:48:24.763 2026 GMT\n    Extensions: none\n    Signature : ecdsa-with-SHA256\n                30:45:02:20:7E:DF:A1:17:9B:3B:48:EF:13:65:32:3E:\n                7F:7C:D9:F3:BF:7C:88:80:22:35:5F:DD:E1:D1:B3:19:\n                48:8D:E3:A7:02:21:00:89:96:55:99:3E:01:39:22:4C:\n                EB:3F:34:24:7E:2C:0D:83:B7:90:B8:D2:B2:04:15:2D:\n                CD:FC:85:C2:36:78:47",
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "auth.jzhy.com.cn"
                ]
              },
              "subject_key_id": "cd01f6f42f773c6c4de4a390248c03dfa22f94eb"
            },
            "fingerprint_md5": "B7B9B4AEF4933A00DFE9C13B40D61026",
            "fingerprint_sha1": "71EEDCD5ECE30D8CE5074092492EEE0DF6B558CF",
            "fingerprint_sha256": "AE8C9087121FEC0DB077F5DA42F0A8EBF8EAC71DA10CC1E695C2F27171A1A639",
            "issuer": {
              "common_name": [
                "Encryption Everywhere DV TLS CA - G2"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "DigiCert Inc"
              ],
              "organizational_unit": [
                "www.digicert.com"
              ]
            },
            "issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Encryption Everywhere DV TLS CA - G2",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "next_update": "2026-02-15T15:22:44",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "13998554122832282276708218275337705357",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100e0d56502a13791e224f0b03a0680f7b3ca97d3519e039cb8196d1ef0e2091bb7022100935709e04db75bb9e3dd08d7e0ac9c7db8a05b90658203f72fcf9d3139e7ccac"
                },
                "timestamp": "2026-02-06T02:48:24.748000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "16832dabf0a9250f0ff03aa545ffc8bfc823d0874bf6042927f8e71f3313f5fa",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100fed3360bd55876278dc3ca13d1e471b89af5081fa801ed681fff3ec6a00bf47202200e88fd93e6885fdc9a85da1f20d62184a800f27ae86d7359ff4a362ff47e16f1"
                },
                "timestamp": "2026-02-06T02:48:24.735000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502207edfa1179b3b48ef1365323e7f7cd9f3bf7c888022355fdde1d1b319488de3a7022100899655993e0139224ceb3f34247e2c0d83b790b8d2b204152dcdfc85c2367847"
                },
                "timestamp": "2026-02-06T02:48:24.763000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "auth.jzhy.com.cn"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "auth.jzhy.com.cn"
              ],
              "extended_dns_names": [
                {
                  "domain": "jzhy",
                  "fld": "jzhy.com.cn",
                  "subdomain": "auth",
                  "tld": "com.cn"
                }
              ]
            },
            "subject_dn": "/CN=auth.jzhy.com.cn",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "ce2e4397d3ec64152439ee04f94f716af902be6e08293d0b704ffa9412323f30",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "6d84dc11f7a7b9d8f6d8f8a46eb44c0f116fb46a71943bd87bf06b2a5ee96b40",
            "tbs_noct_fingerprint": "238f77a552f52f19a9ebe25f0bbef1e8a0e666f9957a4da59305fe05c4d6ad6a",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7689599,
              "not_after": "2026-05-05T23:59:59",
              "not_before": "2026-02-06T00:00:00"
            },
            "version": 2
          },
          "fingerprint_sha256": "AE8C9087121FEC0DB077F5DA42F0A8EBF8EAC71DA10CC1E695C2F27171A1A639",
          "precert": false,
          "raw": "MIIF+TCCBOGgAwIBAgIQCogGATvlHkafZHl46QGXjTANBgkqhkiG9w0BAQsFADBuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMS0wKwYDVQQDEyRFbmNyeXB0aW9uIEV2ZXJ5d2hlcmUgRFYgVExTIENBIC0gRzIwHhcNMjYwMjA2MDAwMDAwWhcNMjYwNTA1MjM1OTU5WjAbMRkwFwYDVQQDExBhdXRoLmp6aHkuY29tLmNuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtdGNPlMSVJp+SJapjt4fXDaFEqDEedvNd1yspxZ+9edDA4Pxg/gHI2xFuV2QLi7jrafTEDXjHcyoFiVlwHzpFB5HBt5VcecULOXHK40Iv9U7pgMKMlUhKaC1gYbbJ5Z+k94q4ABS15zCMzRRcgidSH2uCqOtOSPHHHbgfIu6uaGmC/yET0UJ0XHt5GK9T2wqheBfjC+mBxEGX+beK2O3wVne5k8DC3KKdeGFD1iWj2330zUa/UGL0mOEw4RBtGlJmtsVeyNDEjo6WG7tIecrq9Fv4lz6VpcYEnbJESOCmJxm4GaYaHoahjeC64LgJB11NsmTvvG8sbca9RTh7ZRy3wIDAQABo4IC5DCCAuAwHwYDVR0jBBgwFoAUeN+RkF/u3qz2xXXr1UxVU+8kSrYwHQYDVR0OBBYEFM0B9vQvdzxsTeSjkCSMA9+iL5TrMBsGA1UdEQQUMBKCEGF1dGguanpoeS5jb20uY24wPgYDVR0gBDcwNTAzBgZngQwBAgEwKTAnBggrBgEFBQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwgYAGCCsGAQUFBwEBBHQwcjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEoGCCsGAQUFBzAChj5odHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRW5jcnlwdGlvbkV2ZXJ5d2hlcmVEVlRMU0NBLUcyLmNydDAMBgNVHRMBAf8EAjAAMIIBfwYKKwYBBAHWeQIEAgSCAW8EggFrAWkAdwCWl2S/VViXrfdDh2g3CEJ36fA61fak8zZuRqQ/D8qpxgAAAZww2cesAAAEAwBIMEYCIQDg1WUCoTeR4iTwsDoGgPezypfTUZ4DnLgZbR7w4gkbtwIhAJNXCeBNt1u5490I1+CsnH24oFuQZYID9y/PnTE558ysAHYAFoMtq/CpJQ8P8DqlRf/Iv8gj0IdL9gQpJ/jnHzMT9foAAAGcMNnHnwAABAMARzBFAiEA/tM2C9VYdieNw8oT0eRxuJr1CB+oAe1oH/8+xqAL9HICIA6I/ZPmiF/cmoXaHyDWIYSoAPJ66G1zWf9KNi/0fhbxAHYAZBHEbKQS7KeJHKICLgC8q08oB9QeNSer6v7VA8l9zfAAAAGcMNnHuwAABAMARzBFAiB+36EXmztI7xNlMj5/fNnzv3yIgCI1X93h0bMZSI3jpwIhAImWVZk+ATkiTOs/NCR+LA2Dt5C40rIEFS3N/IXCNnhHMA0GCSqGSIb3DQEBCwUAA4IBAQAgB61BLFtZBU6d5XdFF8Y4TIYVv+N0umWgrO8qDXQtxqWVYucBowi1c2PhHXpixd95JtzSX0iJhwcUsQ76EK1eXz4kUaAvpe5DIc6WkpPzg9yaCt/rKEiB7eDg9UXToDKG8hw+pXs87HCb43Z3Fa2UcGnXuxd/uR/evgQEePI4bw2w/RtU+IUn7xBcZs1DWuz7Xw3ELVairg90w5Cqp1XoaRc54HuDpFPYSLliJKKuHqUC9qPSIUDdfqCLJqQifmVFNEzhbsVz+o3b62PtcWe64qPnuN9r/SScYc/vrWSFQX6LW2qgPVBm5fGQOfpPxrWYwiMM1rxga5ALpxH9RcM8",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "http://182.131.21.103:443/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T22:01:14.997Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-31T13:46:31.676Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-28T07:32:23.839Z"
    },
    {
      "port": 631,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T19:18:22.958Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T22:11:23.02Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T09:16:03.106Z"
    },
    {
      "port": 1234,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T20:25:34.76Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "ms-sql-s",
      "version": "12.00.6024",
      "product": "Microsoft SQL Server 2014",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:microsoft:sql_server:2014",
          "part": "a",
          "vendor": "microsoft",
          "product": "sql_server",
          "version": "2014",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:microsoft:windows",
          "part": "o",
          "vendor": "microsoft",
          "product": "windows",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_ON",
          "instance_name": "",
          "version": "12.0.6024"
        }
      },
      "cve": [
        {
          "id": "CVE-2015-1761",
          "score": 6.5,
          "severity": "medium"
        },
        {
          "id": "CVE-2015-1762",
          "score": 7.1,
          "severity": "high"
        },
        {
          "id": "CVE-2015-1763",
          "score": 8.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T13:07:59.784Z"
    },
    {
      "port": 1434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-06T08:37:02.492Z"
    },
    {
      "port": 1883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-05T21:42:23.038Z"
    },
    {
      "port": 1911,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T00:35:27.256Z"
    },
    {
      "port": 2181,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-06T08:09:38.215Z"
    },
    {
      "port": 2525,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T04:39:14.541Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "8.0.33",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:8.0.33",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "8\\.0\\.33",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_SSL": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "8.0.33"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              }
            },
            "fingerprint_md5": "4CF8A443756736ED31598508D70C67C7",
            "fingerprint_sha1": "6760F49E8E920587E56E374F985E054BBB594976",
            "fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
            "issuer": {
              "common_name": [
                "MySQL_Server_8.0.33_Auto_Generated_CA_Certificate"
              ]
            },
            "issuer_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_CA_Certificate",
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "MySQL_Server_8.0.33_Auto_Generated_Server_Certificate"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=MySQL_Server_8.0.33_Auto_Generated_Server_Certificate",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "43110fcf3d1cf0e99d7f103e8612e665ef8de017107b770f2e1d9ded956fb942",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "MHhiZDJhM2I2MTUyYWJkN2ZmMjcwMWM4NDgzNzZlYmNmOGViMWJhNmM0MDU5ZDZkNzUxZDU4ZjQwYzc1M2M1NzNkNmVlODYzMGRiNTNlMjUzMzkyZTFhNGEyMzA4NDgwZDQxYTg2YzcxN2Y3MTgzZDRjMDI2NzNmNmE1OGI5YjllZDZmYTQzMTYxODFhZDQ4YjVjZjBiNjU2M2EyMjlhNWUwYjUwZTQ3NWZlZGM1MmE5YmNjNWZkMWUyYmQ2YzFhZDM4MjhkMjJmYmQyMmI1ZmNkNGU5ZjU1NjIxODRhMmU4NGZmZDc1MjExMTEyZjQ1YzAzODM5ZDNjNWRiNjJiMzIxNWI4OTBiYTRkYmQ0NjMyYTlmNTYwN2ZmNTNlZGFmN2QzMzRiZDljZmYyN2NiODZhNDYxMmNiODJiNmFmMWZlYmYyZTgyNWQwZWI4NzQ1YjZmOWMyMTNlMjMzYTg1ZmNlOWI1Zjc4OWJiODYzZjE3MWJkMjA5YTM4YTE0MzBkM2E4ZGI2MGMzMGUyOWJlOTYxOWE1MmNlOWY1ZGMwZDNlNjQ4MjcxYmM1MmNlMWMzNTFlYzk0NzE4MzEzYjVjY2JiZjM4ZmI0ODEyMDJkYTYxYWMzODYxYTI2OWVhZmIzODc4NGYzNDY5OWM5MDMyMmZmZGI0NDNhOTkyOGFjOGQ1OQ=="
              }
            },
            "tbs_fingerprint": "ca1abaa28d5a7173892e527c183b6f924d0886a8f2565a4d2cf2b75c2d073dc6",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2033-09-03T06:30:29",
              "not_before": "2023-09-06T06:30:29"
            },
            "version": 2
          },
          "fingerprint_sha256": "05D9410866A3D24DE29504F3E2C2134C20267AEEDC48614A32261A2B986C5E41",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T16:17:06.614Z"
    },
    {
      "port": 4891,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T15:08:03.741Z"
    },
    {
      "port": 5000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T13:52:43.693Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T05:18:38.619Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T11:04:55.882Z"
    },
    {
      "port": 5671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T16:49:32.713Z"
    },
    {
      "port": 5984,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T09:52:54.419Z"
    },
    {
      "port": 6000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T19:17:41.35Z"
    },
    {
      "port": 6379,
      "protocol": "tcp",
      "name": "redis",
      "version": "3.2.100",
      "product": "Redis key-value store",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:redislabs:redis:3.2.100",
          "part": "a",
          "vendor": "redislabs",
          "product": "redis",
          "version": "3\\.2\\.100",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "redis": {
          "arch_bits": "64",
          "build_id": "dd26f1f93c5130ee",
          "gcc_version": "",
          "git_sha1": "00000000",
          "info_response": "# Server\r\nredis_version:3.2.100\r\nredis_git_sha1:00000000\r\nredis_git_dirty:0\r\nredis_build_id:dd26f1f93c5130ee\r\nredis_mode:standalone\r\nos:Windows  \r\narch_bits:64\r\nmultiplexing_api:WinSock_IOCP\r\nprocess_id:2432\r\nrun_id:031f691e80dc1ee32eb2d7555ea08adb1a163166\r\ntcp_port:6379\r\nuptime_in_seconds:1993471\r\nuptime_in_days:23\r\nhz:10\r\nlru_clock:9106498\r\nexecutable:D:\\Program Files\\Redis\\\"D:\\Program Files\\Redis\\redis-server.exe\"\r\nconfig_file:D:\\Program Files\\Redis\\redis.windows-service.conf\r\n\r\n# Clients\r\nconnected_clients:44\r\nclient_longest_output_list:0\r\nclient_biggest_input_buf:4\r\nblocked_clients:0\r\n\r\n# Memory\r\nused_memory:2166408\r\nused_memory_human:2.07M\r\nused_memory_rss:2128496\r\nused_memory_rss_human:2.03M\r\nused_memory_peak:5920392\r\nused_memory_peak_human:5.65M\r\ntotal_system_memory:0\r\ntotal_system_memory_human:0B\r\nused_memory_lua:47104\r\nused_memory_lua_human:46.00K\r\nmaxmemory:0\r\nmaxmemory_human:0B\r\nmaxmemory_policy:noeviction\r\nmem_fragmentation_ratio:0.98\r\nmem_allocator:jemalloc-3.6.0\r\n\r\n# Persistence\r\nloading:0\r\nrdb_changes_since_last_save:64\r\nrdb_bgsave_in_progress:0\r\nrdb_last_save_time:1770714057\r\nrdb_last_bgsave_status:ok\r\nrdb_last_bgsave_time_sec:1\r\nrdb_current_bgsave_time_sec:-1\r\naof_enabled:0\r\naof_rewrite_in_progress:0\r\naof_rewrite_scheduled:0\r\naof_last_rewrite_time_sec:-1\r\naof_current_rewrite_time_sec:-1\r\naof_last_bgrewrite_status:ok\r\naof_last_write_status:ok\r\n\r\n# Stats\r\ntotal_connections_received:61958\r\ntotal_commands_processed:3290986\r\ninstantaneous_ops_per_sec:2\r\ntotal_net_input_bytes:292535296\r\ntotal_net_output_bytes:2881209947\r\ninstantaneous_input_kbps:0.04\r\ninstantaneous_output_kbps:1.39\r\nrejected_connections:0\r\nsync_full:0\r\nsync_partial_ok:0\r\nsync_partial_err:0\r\nexpired_keys:89349\r\nevicted_keys:0\r\nkeyspace_hits:524993\r\nkeyspace_misses:73677\r\npubsub_channels:1\r\npubsub_patterns:0\r\nlatest_fork_usec:593\r\nmigrate_cached_sockets:0\r\n\r\n# Replication\r\nrole:master\r\nconnected_slaves:0\r\nmaster_repl_offset:0\r\nrepl_backlog_active:0\r\nrepl_backlog_size:1048576\r\nrepl_backlog_first_byte_offset:0\r\nrepl_backlog_histlen:0\r\n\r\n# CPU\r\nused_cpu_sys:17.75\r\nused_cpu_user:24.69\r\nused_cpu_sys_children:0.00\r\nused_cpu_user_children:0.00\r\n\r\n# Cluster\r\ncluster_enabled:0\r\n\r\n# Keyspace\r\ndb0:keys=212,expires=204,avg_ttl=20712806\r\ndb10:keys=15,expires=5,avg_ttl=2590594432\r\n",
          "major": 3,
          "mem_allocator": "jemalloc-3.6.0",
          "minor": 2,
          "mode": "standalone",
          "nonexistent_response": "(Error: ERR unknown command 'NONEXISTENT')",
          "os": "Windows  ",
          "patchlevel": 100,
          "ping_response": "PONG",
          "quit_response": "OK",
          "total_commands_processed": 3290986,
          "total_connections_received": 61958,
          "uptime_in_seconds": 1993471,
          "used_memory": 2166408,
          "version": "3.2.100"
        }
      },
      "cve": [
        {
          "id": "CVE-2018-12326",
          "score": 8.4,
          "severity": "high"
        },
        {
          "id": "CVE-2018-12453",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2020-14147",
          "score": 7.7,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T09:02:59.371Z"
    },
    {
      "port": 6443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-09T15:44:54.115Z"
    },
    {
      "port": 7574,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T08:06:03.806Z"
    },
    {
      "port": 8000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T22:26:05.983Z"
    },
    {
      "port": 8080,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T03:15:12.515Z"
    },
    {
      "port": 8086,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-02T03:40:47.193Z"
    },
    {
      "port": 8087,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T20:57:30.226Z"
    },
    {
      "port": 8500,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-01T02:08:04.579Z"
    },
    {
      "port": 8883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T09:14:27.796Z"
    },
    {
      "port": 8983,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-05T20:33:14.214Z"
    },
    {
      "port": 9042,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-11T01:04:47.145Z"
    },
    {
      "port": 9092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T12:32:55.567Z"
    },
    {
      "port": 9093,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T16:12:56.733Z"
    },
    {
      "port": 9200,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T10:15:37.408Z"
    },
    {
      "port": 10250,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T11:05:55.816Z"
    },
    {
      "port": 11211,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T13:09:41.87Z"
    },
    {
      "port": 11434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T13:20:27.692Z"
    },
    {
      "port": 15671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T10:26:33.835Z"
    },
    {
      "port": 15672,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T09:21:44.527Z"
    },
    {
      "port": 18789,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T21:54:24.948Z"
    },
    {
      "port": 20000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T16:13:19.241Z"
    },
    {
      "port": 27017,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-07T05:53:18.332Z"
    },
    {
      "port": 27018,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-10T06:48:11.982Z"
    },
    {
      "port": 27019,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T01:46:30.814Z"
    },
    {
      "port": 29092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-02-08T10:21:41.175Z"
    }
  ],
  "services_hash": "a13bced1c47eccdf896b79bd34e2542829a90320d18e003b08a0e5f5a624c94c",
  "last_updated_at": "2026-02-11T01:04:47.145Z",
  "banner": [
    "redis",
    "tls",
    "mssql",
    "mysql",
    "http"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2015-1761": {
      "id": "CVE-2015-1761",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05382740"
      ],
      "score": 6.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "medium",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka \"SQL Server Elevation of Privilege Vulnerability.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-284"
    },
    "CVE-2015-1762": {
      "id": "CVE-2015-1762",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 7.1,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-74"
    },
    "CVE-2015-1763": {
      "id": "CVE-2015-1763",
      "references": [
        "http://www.securitytracker.com/id/1032893",
        "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058"
      ],
      "score": 8.5,
      "services": [
        "1433/ms-sql-s"
      ],
      "severity": "high",
      "summary": "Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka \"SQL Server Remote Code Execution Vulnerability.\"",
      "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-284"
    },
    "CVE-2018-12326": {
      "id": "CVE-2018-12326",
      "references": [
        "https://access.redhat.com/errata/RHSA-2019:0052",
        "https://access.redhat.com/errata/RHSA-2019:0094",
        "https://access.redhat.com/errata/RHSA-2019:1860",
        "https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
        "https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
        "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
        "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
        "https://www.exploit-db.com/exploits/44904/",
        "https://access.redhat.com/errata/RHSA-2019:0052",
        "https://access.redhat.com/errata/RHSA-2019:0094",
        "https://access.redhat.com/errata/RHSA-2019:1860",
        "https://gist.github.com/fakhrizulkifli/f831f40ec6cde4f744c552503d8698f0",
        "https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50",
        "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
        "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
        "https://www.exploit-db.com/exploits/44904/"
      ],
      "score": 8.4,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.",
      "vector_string": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-119"
    },
    "CVE-2018-12453": {
      "id": "CVE-2018-12453",
      "references": [
        "https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
        "https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
        "https://www.exploit-db.com/exploits/44908/",
        "https://gist.github.com/fakhrizulkifli/34a56d575030682f6c564553c53b82b5",
        "https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6",
        "https://www.exploit-db.com/exploits/44908/"
      ],
      "score": 7.5,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-704"
    },
    "CVE-2020-14147": {
      "id": "CVE-2020-14147",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
        "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
        "https://github.com/antirez/redis/pull/6875",
        "https://security.gentoo.org/glsa/202008-17",
        "https://www.debian.org/security/2020/dsa-4731",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html",
        "https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571",
        "https://github.com/antirez/redis/pull/6875",
        "https://security.gentoo.org/glsa/202008-17",
        "https://www.debian.org/security/2020/dsa-4731",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 7.7,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2021-32761": {
      "id": "CVE-2021-32761",
      "references": [
        "https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
        "https://security.gentoo.org/glsa/202209-17",
        "https://security.netapp.com/advisory/ntap-20210827-0004/",
        "https://www.debian.org/security/2021/dsa-5001",
        "https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2021/08/msg00026.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6O7AUOROBYGP5IMGJPC5HZ3R2RB6GZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGX7RRAWGXWXEAKJTQYSDSBO2BC3SAHD/",
        "https://security.gentoo.org/glsa/202209-17",
        "https://security.netapp.com/advisory/ntap-20210827-0004/",
        "https://www.debian.org/security/2021/dsa-5001"
      ],
      "score": 7.5,
      "services": [
        "6379/redis"
      ],
      "severity": "high",
      "summary": "Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2021-3470": {
      "id": "CVE-2021-3470",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1943623",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1943623"
      ],
      "score": 5.3,
      "services": [
        "6379/redis"
      ],
      "severity": "medium",
      "summary": "A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "weakness": "CWE-119"
    }
  }
}