Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.158.143.181

SummaryCVE DetailsRaw Data
25 Jan 2026, 06:31:39 UTC
{
  "scan_id": 1769233337,
  "ip": "182.158.143.181",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.158.143.128/26",
    "postal_code": "",
    "coordinates": {
      "latitude": "33.8407",
      "longitude": "132.7646"
    },
    "geo_point": "33.8407, 132.7646",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "JP",
    "country_name": "Japan",
    "city": ""
  },
  "location_updated_at": "2026-01-22T00:42:59Z",
  "asn": {
    "number": "AS4725",
    "organization": "SoftBank Corp.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.158.0.0/15",
    "organization": "SoftBank Corp.",
    "descr": "SoftBank Corp.,\nTokyo Port City Takeshiba Office Tower, 1-7-1 Kaigan, Minato-ku, Tokyo, Japan",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:51Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-01-22T00:42:59Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-01-22T04:33:25Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-01-22T00:42:59Z"
    }
  ],
  "hostnames": [
    {
      "name": "MYNcd-02p18-181.ppp11.odn.ad.jp",
      "last_updated_at": "2026-01-22T04:33:25Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "1.25",
      "product": "Cisco SSH",
      "extra_info": "protocol 1.99",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:cisco:ssh:1.25",
          "part": "a",
          "vendor": "cisco",
          "product": "ssh",
          "version": "1\\.25",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-1.99-Cisco-1.25",
          "client_to_server_ciphers": [
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "aes128-cbc",
            "3des-cbc",
            "aes192-cbc",
            "aes256-cbc"
          ],
          "client_to_server_compression": [
            "none"
          ],
          "client_to_server_macs": [
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "host_key_algorithms": [
            "ssh-rsa"
          ],
          "kex_algorithms": [
            "diffie-hellman-group-exchange-sha1",
            "diffie-hellman-group14-sha1",
            "diffie-hellman-group1-sha1"
          ],
          "key": {
            "algorithm": "ssh-rsa",
            "fingerprint_sha256": "85d57de37f488e00fc41d1a619b472265354cdc564305b52b1d157491ea40d3f",
            "raw": "AAAAB3NzaC1yc2EAAAADAQABAAAAgQCYxFEDr6JOwmdMAfyxqhGvAMAAwPv+e3ZDCUNGNJpC6lFniYdSQk2dK+qpbyHvFem9JOcYBFrKZuy7q6sxlMHrw9y5XVq937x9Wq+0mvuuQpFNRd4X6jdFIW9Dlap3WhMjJFxX31ymXpNgMjN39XW5VrbiBYKa4s0IKCYIef0SMQ=="
          },
          "server_to_client_ciphers": [
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "aes128-cbc",
            "3des-cbc",
            "aes192-cbc",
            "aes256-cbc"
          ],
          "server_to_client_compression": [
            "none"
          ],
          "server_to_client_macs": [
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "software": "Cisco-1.25",
          "version": "1.99"
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-25T06:31:39.183Z"
    },
    {
      "port": 23,
      "protocol": "tcp",
      "name": "telnet",
      "version": "",
      "product": "Cisco router telnetd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:cisco:telnet",
          "part": "a",
          "vendor": "cisco",
          "product": "telnet",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "telnet": {
          "banner": "\r\n-----------------------------------------------------------------------\r\nCisco Configuration Professional (Cisco CP) is installed on this device.\r\nThis feature requires the one-time use of the username \"cisco\" with the \r\npassword \"cisco\". These default credentials have a privilege level of 15.\r\n \r\nYOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE\r\nPUBLICLY-KNOWN CREDENTIALS\r\n\r\nHere are the Cisco IOS commands.\r\n\r\nusername <myuser>  privilege 15 secret 0 <mypassword>\r\nno username cisco\r\n\r\nReplace <myuser> and <mypassword> with the username and password you want \r\nto use. \r\n\r\nIF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL \r\nNOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.\r\n \r\nFor more information about Cisco CP please follow the instructions in the\r\nQUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp \r\n-----------------------------------------------------------------------\r\n\r\n\r\nUser Access Verification\r\n\r\nUsername: "
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-20T13:53:37.208Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Cisco IOS http config",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "401 Unauthorized\r\n",
          "body_murmur": 819126370,
          "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "none"
            ],
            "date": [
              "Mon, 19 Jan 2026 19:05:47 GMT"
            ],
            "server": [
              "cisco-IOS"
            ],
            "www_authenticate": [
              "Basic realm=\"level_15 or view_access\""
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.158.143.181",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 401
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "url": "http://182.158.143.181/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-19T18:22:43.304Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "401 Unauthorized\r\n",
          "body_murmur": 819126370,
          "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "none"
            ],
            "date": [
              "Mon, 19 Jan 2026 13:12:52 GMT"
            ],
            "server": [
              "cisco-IOS"
            ],
            "www_authenticate": [
              "Basic realm=\"level_15 or view_access\""
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.158.143.181",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 401
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "d6009e8bc210bd519be0a20e1fb9b9d962dc6067",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "d6009e8bc210bd519be0a20e1fb9b9d962dc6067"
            },
            "fingerprint_md5": "491F0906C123903FEDEE7AD2A55278F5",
            "fingerprint_sha1": "C862FA8369D3BD82EF7951753F32A7D6F187223D",
            "fingerprint_sha256": "065C597A59C35D30225A9219534569749DE0BA09B66E633C39BF9839AF8327BA",
            "issuer": {
              "common_name": [
                "IOS-Self-Signed-Certificate-1597926911"
              ]
            },
            "issuer_dn": "/CN=IOS-Self-Signed-Certificate-1597926911",
            "jarm": "07b02b09b04b04b07b07b02b07b04bd7fc4c7c6ef19b77a4ca0787979cdc13",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "NGRkYzc0MjlkOTc0OGI2ODM0M2IyMzYzMDE1NjQ0NWY5ZWFlM2YxMjQxZjcyNTVjMjgyYWU1YWVkZmU3MTVjNmNmY2MwNDg2ODMyYWRiYzI2MDZjZDU1NWRhNWRiYzI5NWI3NTY3MDNiZDY4NTZjYWNlZWUyYzk2OTI0NjNiYzdkZjI3MjRmZWY3YzcxNDQ3YjUxMWVkMmEzOGI0MDdiZmFlZjE3NmQ0M2Q4YzAyMWI2MTQ1ZTJhZDEwMzEwN2Q5YzlhM2IwOTk1YWRmYTU1YTdkMTkxYWQwN2Y4YmRkOTY4OWEwYmI3NjJlOGU5N2RkNTQ1NmE4MGIzZWQyZWU3Nw=="
            },
            "subject": {
              "common_name": [
                "IOS-Self-Signed-Certificate-1597926911"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "IOS-Self-Signed-Certificate-1597926911"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=IOS-Self-Signed-Certificate-1597926911",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "0abaddbb35f793e8cc64a234cc327cdf1101f34057414b4f6ba49660756df745",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 1024,
                "modulus": "MHg5OGM0NTEwM2FmYTI0ZWMyNjc0YzAxZmNiMWFhMTFhZjAwYzAwMGMwZmJmZTdiNzY0MzA5NDM0NjM0OWE0MmVhNTE2Nzg5ODc1MjQyNGQ5ZDJiZWFhOTZmMjFlZjE1ZTliZDI0ZTcxODA0NWFjYTY2ZWNiYmFiYWIzMTk0YzFlYmMzZGNiOTVkNWFiZGRmYmM3ZDVhYWZiNDlhZmJhZTQyOTE0ZDQ1ZGUxN2VhMzc0NTIxNmY0Mzk1YWE3NzVhMTMyMzI0NWM1N2RmNWNhNjVlOTM2MDMyMzM3N2Y1NzViOTU2YjZlMjA1ODI5YWUyY2QwODI4MjYwODc5ZmQxMjMx"
              }
            },
            "tbs_fingerprint": "1e9d5df17c4cbb0d7871f21d0e052a13753183b123ccb6df43106c0aaa0824be",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 28312672,
              "not_after": "2020-01-01T00:00:00",
              "not_before": "2019-02-07T07:22:09"
            },
            "version": 2
          },
          "fingerprint_sha256": "065C597A59C35D30225A9219534569749DE0BA09B66E633C39BF9839AF8327BA",
          "precert": false,
          "raw": "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",
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://182.158.143.181/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-19T15:57:15.051Z"
    }
  ],
  "services_hash": "8efadc6ebe56180514f32ad38704589cf7f9bc4920a603f8823458cb5790d017",
  "last_updated_at": "2026-01-25T06:31:39.183Z",
  "banner": [
    "ssh",
    "telnet",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-1306": {
      "id": "CVE-1999-1306",
      "references": [
        "http://www.cert.org/advisories/CA-1992-20.html"
      ],
      "score": 7.5,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-Other"
    }
  }
}