Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.131.21.59

SummaryCVE DetailsRaw Data
18 Jan 2026, 11:57:11 UTC
{
  "scan_id": 1768609241,
  "ip": "182.131.21.59",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.131.16.0/21",
    "postal_code": "",
    "coordinates": {
      "latitude": "34.7732",
      "longitude": "113.722"
    },
    "geo_point": "34.7732, 113.722",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "CN",
    "country_name": "China",
    "city": ""
  },
  "location_updated_at": "2026-01-14T16:41:30Z",
  "asn": {
    "number": "AS38283",
    "organization": "CHINANET SiChuan Telecom Internet Data Center",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.128.0.0/12",
    "organization": "CHINANET Sichuan province network",
    "descr": "CHINANET Sichuan province network,\nData Communication Division,\nChina Telecom",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:50Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-01-14T16:41:30Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-01-14T17:53:11Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-01-14T16:41:30Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T19:45:06.103Z"
    },
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "98.0p1",
      "product": "OpenSSH",
      "extra_info": "protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:openbsd:openssh:98.0p1",
          "part": "a",
          "vendor": "openbsd",
          "product": "openssh",
          "version": "98\\.0p1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-OpenSSH_98.0p1",
          "client_to_server_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]"
          ],
          "client_to_server_compression": [
            "none",
            "[email protected]"
          ],
          "client_to_server_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "host_key_algorithms": [
            "rsa-sha2-512",
            "rsa-sha2-256",
            "ssh-rsa",
            "ecdsa-sha2-nistp256",
            "ssh-ed25519"
          ],
          "kex_algorithms": [
            "curve25519-sha256",
            "[email protected]",
            "ecdh-sha2-nistp256",
            "ecdh-sha2-nistp384",
            "ecdh-sha2-nistp521",
            "diffie-hellman-group-exchange-sha256",
            "diffie-hellman-group16-sha512",
            "diffie-hellman-group18-sha512",
            "diffie-hellman-group14-sha256",
            "diffie-hellman-group14-sha1"
          ],
          "key": {
            "algorithm": "ecdsa-sha2-nistp256",
            "fingerprint_sha256": "14d3fa9314ccd56a3b4c8115655e4c4587c7a9076c17c707db847ce948bfe76e",
            "raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBO7c/R2H5PV2V6subfGZ5B38dgw4jXw1XKQ+FI0tKlnnFUQX6zddLgca+/vQKGhESEV/Lbouso9xgLb+bVGTYag="
          },
          "server_to_client_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]"
          ],
          "server_to_client_compression": [
            "none",
            "[email protected]"
          ],
          "server_to_client_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "software": "OpenSSH_98.0p1",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-2768",
          "score": 4.3,
          "severity": "medium"
        },
        {
          "id": "CVE-2008-3844",
          "score": 9.3,
          "severity": "high"
        },
        {
          "id": "CVE-2023-51767",
          "score": 7,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-15T05:55:35.954Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-12T06:13:53.194Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-12T20:53:45.461Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-07T11:24:49.547Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T08:17:45.501Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-12T12:29:26.416Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T20:49:27.917Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-15T06:16:58.796Z"
    },
    {
      "port": 631,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T08:37:15.26Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T03:34:53.404Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-11T07:37:58.459Z"
    },
    {
      "port": 1234,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T00:43:07.671Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T03:07:50.553Z"
    },
    {
      "port": 1434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T07:39:22.546Z"
    },
    {
      "port": 1883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T09:08:17.811Z"
    },
    {
      "port": 1911,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T10:10:25.194Z"
    },
    {
      "port": 2181,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T09:59:53.142Z"
    },
    {
      "port": 2525,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T15:35:51.922Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T02:45:14.768Z"
    },
    {
      "port": 4891,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T17:21:56.434Z"
    },
    {
      "port": 5000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T23:10:08.384Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-09T15:40:00.388Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Golang net/http server",
      "extra_info": "Go-IPFS json-rpc or InfluxDB API",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:protocol_labs:go-ipfs",
          "part": "a",
          "vendor": "protocol_labs",
          "product": "go\\-ipfs",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "<!DOCTYPE html>\n<html lang=\"zh-CN\">\n\n<head>\n    <title>DevOps System v19.12.1</title>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0\">\n    <link rel=\"stylesheet\" href=\"./dist/asciinema-player.css\">\n    <link rel=\"stylesheet\" href=\"/dist/main.ef0afb89c1627c2548e0.css\">\n</head>\n\n<body>\n    <div id=\"app\"></div>\n    <div class=\"lock-screen-back\" id=\"lock_screen_back\"></div>\n    <script type=\"text/javascript\" src=\"./dist/asciinema-player.js\"></script>\n    <script type=\"text/javascript\" src=\"/dist/vender-base.ef0afb89c1627c2548e0.js\"></script>\n    <script type=\"text/javascript\" src=\"/dist/vender-exten.ef0afb89c1627c2548e0.js\"></script>\n    <script type=\"text/javascript\" src=\"/dist/main.ef0afb89c1627c2548e0.js\"></script>\n</body>\n\n</html>\n",
          "body_murmur": 1530360028,
          "body_sha256": "8cb8aaa8c372d3c72d29720f5704e9ebeef271ac3cd996ca41b1baa4479647fc",
          "content_length": -1,
          "headers": {
            "content_type": [
              "text/html; charset=utf-8"
            ],
            "date": [
              "Sat, 17 Jan 2026 01:50:06 GMT"
            ],
            "vary": [
              "Accept-Encoding"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.131.21.59:5432",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200,
          "title": "DevOps System v19.12.1"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true,
                "non_repudiation": true
              },
              "subject_alt_name": {
                "ip_address": [
                  "182.131.21.59"
                ]
              }
            },
            "fingerprint_md5": "61BD97F9CE9E992729775AC42FFCA603",
            "fingerprint_sha1": "EBF1EDFE90BFF250B0B29D2A921FFD10EA56B196",
            "fingerprint_sha256": "9E69F99815955C6ADE9E236B16A3CAD2C99039311444613E96FC9DFEBE4052B1",
            "issuer": {
              "common_name": [
                "devops.megvii.inc"
              ],
              "country": [
                "CN"
              ],
              "organization": [
                "Megvii"
              ],
              "organizational_unit": [
                "DevOps"
              ],
              "province": [
                "Beijing"
              ]
            },
            "issuer_dn": "/C=CN/ST=Beijing/O=Megvii/OU=DevOps/CN=devops.megvii.inc",
            "jarm": "29d21b20d29d29d21c41d21b21b41d863128bc160b816910681100a6250acf",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "16981195729166050576",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false,
              "value": "NGUyNGM3NmYwYzZmYjRjYmJhOGUwYWNmYzk0NWJlODJhNTI2YzQ2ZTJjYjk4YTgyMWM4MDkzYzU2MmY3YWExYWVjZGY5MTE1ZDg4ZDk5MzRlNjY3YzA4ZjE2YTEwZGM3MmU4MTY0YjgzYjc1YTZmNzg3MDkyYzdjOTUzZWZjOTE4NGM0ODkyNDQ5MDFmNGJkNjhlYzIzOGZiOTIwZWE5YjE4M2YzYTNhMjE5NDU2Y2FjZjYxNzcxYTZlNDI1NDVlNzA0MGI5ZjQyNjJjMzVkMjNlNDE3MDUxY2JhNTNhYjZiODRlYWNjNzBlYjIzYjQ0Zjk1YmFiMmY4YzAxNmNmYzg3Mjc4NWI4ZDk2ZDFlMjA0ZWVjZTUwZGM3MmU2YTg2ZmFiZDUwNDlhMjc2NTM0Y2MzOTAxOGUwYWQ5ZWRmNzI0OTkwYjM1Njg1Y2VmMmNiZDBmYjFkNGRiOTEwZTlmNDFlZjIxZmQzNTgyYTJiYTRhNDAyZDQwY2U3NWZmMjMwNTllMDI3NWE3MWJiNWI4ZmJiYjFjMTRmZTZhOGQ3NDU4MGExZWJjMTdkYzMwZjE3MzIxMzRhMTFmMjcxOTEyNTIxZWExMjhhYWJlYzcwZmQzYTIzNjk1ZDBkYjVkODc0MzA1ODQ1MGIyZWMxMzQ1YmE3ZDBkNWI4MGVmMjI4ZmQ4MmI4YzNlOTI4MTM3NDZiOTE3ZjNjZDAwZjlhMmY1NjZkZTlhYWIyZDBhN2Y4MTk2YTQ4NGUxYzVlMjA4NmE1MjMxZTc3MmQ0MzlhOThkYWE0Mzc2N2MwZjkwMTIzODdjNzMxN2Y5ZDVlNjBmMzU3ZTQ2YTNmZGUwOGU4NWI3OGExMmZhMDg4Yjg4NjU2NThiZWU1MjAxODAyYmYxZWFjOTkzMzdkYTFmN2ZkNTIwYTc4N2YzZjNjZTYwYWZlN2Y1ZDA1OWZmOTBiZDRhNGVkMWIwNDljZmFhZGIzNjQ5MjQzM2VjNDQ1OTQ0NGJlODE2NjM0ZmNkOGIzNDMxNTgyYjZjZDA0ZTZkMDgxM2YxYTYzNzRkNDRlZWVlNTJhNWNhNjNlMjYxMWY3OGE0NjVmZTQwNTk1ZjNjMGI0MDg2N2VmZDA4NTk4ZGY1MTk2MmM3N2YzNzE2YzYzZjRiYmQxNzU1MjlhMTliN2UzZTU5MzFmZGQyZjJjNWEzODkyZTQwMDFiY2RmM2ExNmM1OTM3MWEwZmE1ZDM3YTRmNDVjNzc5Y2EzMzhmMDdiNjQxNDdkMmNmMTE1NDE0NTFkNmVkZjQwMDNmNGYwMmUzY2MxNjc2MTcwNjVmNDAwZDJhMjE5Y2QxZWRmMDdlNjRkNTUwYTFjMWE2OWRhM2Q5MmRkMA=="
            },
            "subject": {
              "common_name": [
                "*.devops.megvii"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.devops.megvii"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=*.devops.megvii",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "a33be0db16f07fa5fe82d22dd61b72e80de02fc0f5e849a41922718b7a318550",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 4096,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "5321bbebb62a98b78061c32a141d4f214652dab033e8c0d71d0c05eac28259cd",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 864000000,
              "not_after": "2048-02-15T09:38:07",
              "not_before": "2020-09-29T09:38:07"
            },
            "version": 2
          },
          "fingerprint_sha256": "9E69F99815955C6ADE9E236B16A3CAD2C99039311444613E96FC9DFEBE4052B1",
          "precert": false,
          "raw": "MIIFJTCCAw2gAwIBAgIJAOupU4uiUqUQMA0GCSqGSIb3DQEBCwUAMF0xCzAJBgNVBAYTAkNOMRAwDgYDVQQIDAdCZWlqaW5nMQ8wDQYDVQQKDAZNZWd2aWkxDzANBgNVBAsMBkRldk9wczEaMBgGA1UEAwwRZGV2b3BzLm1lZ3ZpaS5pbmMwHhcNMjAwOTI5MDkzODA3WhcNNDgwMjE1MDkzODA3WjAaMRgwFgYDVQQDDA8qLmRldm9wcy5tZWd2aWkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCnepAVy2Tti0POUITIrrYdAoDSe1hYbjq723H1zgbZBf9kTdoRKJBJJCBeci8cUPLcl/gbOMDXeEMDFI73kVhKpR0wRF1Tg+dB3HFdNDWv+K2sdWV3mjrI8s0D6k7PqJfU31fnbVAmquoDHMRvX8wx2b8nSlU6ZYpnZM7EGhKAEa81KPRwRfDNe9aKJZUwbjavO/vw2ntQPstwBtIfad0k2rXpHpZT7+6nnEjc94KSTzqwtL8v7cRTNJQ+kqove6Av8lxECDGYNFscHDAXubsV4ztJ0ZAIS4C02D7mNz/TBK0NFZnG5ZNGMsqOMCmZYfykhe/mwjxsQ2u0oZeAo4qBWdBUC3T6Dwt2W6kO+6esJDSpUSO2cxexd9VKyIrtb1NtJJcaT62CrD7zaYgu/LNAW9dhDw3tu0CwuDBlBcOIpUzUXepjCxy8z/d5X8YULfSwU1tW6Lm9YVjGoyv1be0VgJW8ecZ3/smv3pezP4JRRZRjNOu7ZDihLoH2fivu5v5rkMNNu6v/QJMiPZQKlVWXXGdmhRc/7D1GmKd6xuPpPSREop57vLf+WcYaWm9SYX02Pdxs9YEJlRMLmTt2OMn9jZidr/fH27s6fUtATypAlyENsFL3IM4InPxa6C2W+BDOO3+5AkXdxQPU7z+6cITR8+BCpwqO6f6UyKPAjehM4wIDAQABoyswKTAJBgNVHRMEAjAAMAsGA1UdDwQEAwIF4DAPBgNVHREECDAGhwS2gxU7MA0GCSqGSIb3DQEBCwUAA4ICAQBOJMdvDG+0y7qOCs/JRb6CpSbEbiy5ioIcgJPFYveqGuzfkRXYjZk05mfAjxahDccugWS4O3Wm94cJLHyVPvyRhMSJJEkB9L1o7COPuSDqmxg/OjohlFbKz2F3Gm5CVF5wQLn0Jiw10j5BcFHLpTq2uE6sxw6yO0T5W6svjAFs/IcnhbjZbR4gTuzlDccuaob6vVBJonZTTMOQGOCtnt9ySZCzVoXO8svQ+x1NuRDp9B7yH9NYKiukpALUDOdf8jBZ4Cdacbtbj7uxwU/mqNdFgKHrwX3DDxcyE0oR8nGRJSHqEoqr7HD9OiNpXQ212HQwWEULLsE0W6fQ1bgO8ij9grjD6SgTdGuRfzzQD5ovVm3pqrLQp/gZakhOHF4ghqUjHnctQ5qY2qQ3Z8D5ASOHxzF/nV5g81fkaj/eCOhbeKEvoIi4hlZYvuUgGAK/HqyZM32h9/1SCnh/PzzmCv5/XQWf+QvUpO0bBJz6rbNkkkM+xEWURL6BZjT82LNDFYK2zQTm0IE/GmN01E7u5Spcpj4mEfeKRl/kBZXzwLQIZ+/QhZjfUZYsd/NxbGP0u9F1UpoZt+Plkx/dLyxaOJLkABvN86FsWTcaD6XTek9Fx3nKM48HtkFH0s8RVBRR1u30AD9PAuPMFnYXBl9ADSohnNHt8H5k1VChwaado9kt0A==",
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://182.131.21.59:5432/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T02:08:38.186Z"
    },
    {
      "port": 5671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T06:44:52.082Z"
    },
    {
      "port": 5984,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T13:55:07.638Z"
    },
    {
      "port": 6000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T08:05:19.32Z"
    },
    {
      "port": 6379,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T15:02:10.676Z"
    },
    {
      "port": 7574,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T01:13:40.383Z"
    },
    {
      "port": 8000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T09:49:35.296Z"
    },
    {
      "port": 8080,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Golang net/http server",
      "extra_info": "Go-IPFS json-rpc or InfluxDB API",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:protocol_labs:go-ipfs",
          "part": "a",
          "vendor": "protocol_labs",
          "product": "go\\-ipfs",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "404 page not found\n",
          "body_murmur": 731197476,
          "body_sha256": "b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793",
          "content_length": -1,
          "headers": {
            "content_type": [
              "text/plain; charset=utf-8"
            ],
            "date": [
              "Tue, 13 Jan 2026 03:47:00 GMT"
            ],
            "vary": [
              "Accept-Encoding"
            ],
            "x_content_type_options": [
              "nosniff"
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.131.21.59:8080",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 404
        }
      },
      "url": "http://182.131.21.59:8080/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T04:04:59.457Z"
    },
    {
      "port": 8086,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-15T11:06:03.349Z"
    },
    {
      "port": 8087,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T10:20:23.88Z"
    },
    {
      "port": 8500,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T12:49:52.596Z"
    },
    {
      "port": 8883,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T11:56:18.756Z"
    },
    {
      "port": 8983,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T05:17:59.024Z"
    },
    {
      "port": 9042,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-18T07:59:55.115Z"
    },
    {
      "port": 9092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T23:54:01.528Z"
    },
    {
      "port": 9093,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T06:17:13.276Z"
    },
    {
      "port": 9200,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T11:01:11.631Z"
    },
    {
      "port": 10250,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T10:43:31.819Z"
    },
    {
      "port": 11211,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T20:01:14.587Z"
    },
    {
      "port": 11434,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-07T17:26:57.932Z"
    },
    {
      "port": 15671,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T14:05:40.132Z"
    },
    {
      "port": 15672,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T00:05:22.541Z"
    },
    {
      "port": 20000,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-12T15:01:18.179Z"
    },
    {
      "port": 27017,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-18T11:57:11.657Z"
    },
    {
      "port": 27018,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T19:56:28.303Z"
    },
    {
      "port": 27019,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-16T15:16:36.968Z"
    },
    {
      "port": 29092,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-17T05:06:15.881Z"
    }
  ],
  "services_hash": "5d10629c8e96a83988f1bb3816964ab1beef8913ca6156a7acd924ac9f003628",
  "last_updated_at": "2026-01-18T11:57:11.657Z",
  "banner": [
    "http",
    "tls",
    "ssh"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2007-2768": {
      "id": "CVE-2007-2768",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/",
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/"
      ],
      "score": 4.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2008-3844": {
      "id": "CVE-2008-3844",
      "references": [
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
      ],
      "score": 9.3,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.  NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points.  As of 20080827, no unofficial distributions of this software are known.",
      "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2023-51767": {
      "id": "CVE-2023-51767",
      "references": [
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767",
        "https://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/2",
        "http://www.openwall.com/lists/oss-security/2025/09/23/1",
        "http://www.openwall.com/lists/oss-security/2025/09/23/3",
        "http://www.openwall.com/lists/oss-security/2025/09/23/4",
        "http://www.openwall.com/lists/oss-security/2025/09/23/5",
        "http://www.openwall.com/lists/oss-security/2025/09/24/4",
        "http://www.openwall.com/lists/oss-security/2025/09/24/7",
        "http://www.openwall.com/lists/oss-security/2025/09/25/2",
        "http://www.openwall.com/lists/oss-security/2025/09/25/6",
        "http://www.openwall.com/lists/oss-security/2025/09/26/2",
        "http://www.openwall.com/lists/oss-security/2025/09/26/4",
        "http://www.openwall.com/lists/oss-security/2025/09/27/1",
        "http://www.openwall.com/lists/oss-security/2025/09/27/2",
        "http://www.openwall.com/lists/oss-security/2025/09/27/3",
        "http://www.openwall.com/lists/oss-security/2025/09/27/4",
        "http://www.openwall.com/lists/oss-security/2025/09/27/5",
        "http://www.openwall.com/lists/oss-security/2025/09/27/6",
        "http://www.openwall.com/lists/oss-security/2025/09/27/7",
        "http://www.openwall.com/lists/oss-security/2025/09/28/7",
        "http://www.openwall.com/lists/oss-security/2025/09/29/1",
        "http://www.openwall.com/lists/oss-security/2025/09/29/4",
        "http://www.openwall.com/lists/oss-security/2025/09/29/5",
        "http://www.openwall.com/lists/oss-security/2025/09/29/6",
        "http://www.openwall.com/lists/oss-security/2025/10/01/1",
        "http://www.openwall.com/lists/oss-security/2025/10/01/2",
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    }
  }
}