182.176.78.83
{
"scan_id": 1763609656,
"ip": "182.176.78.83",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.176.78.0/23",
"postal_code": "52250",
"coordinates": {
"latitude": "32.1537",
"longitude": "74.2199"
},
"geo_point": "32.1537, 74.2199",
"locale_code": "en",
"continent": "Asia",
"country_code": "PK",
"country_name": "Pakistan",
"city": "Gujranwala"
},
"location_updated_at": "2025-11-20T00:43:28Z",
"asn": {
"number": "AS17557",
"organization": "Pakistan Telecommunication Company Limited",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.176.72.0/21",
"organization": "Pakistan Telecommuication company limited",
"descr": "Pakistan Telecommuication company limited,\nCDDT Building, H-9/1, Training Block,\nPakistan Telecommunication Company Limited,\nGM, Multimedia & Broadband",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:19Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-11-20T00:43:28Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-11-20T01:11:59Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-11-20T00:43:28Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "10.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:10.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "10\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\" />\r\n<title>IIS Windows Server</title>\r\n<style type=\"text/css\">\r\n<!--\r\nbody {\r\n\tcolor:#000000;\r\n\tbackground-color:#0072C6;\r\n\tmargin:0;\r\n}\r\n\r\n#container {\r\n\tmargin-left:auto;\r\n\tmargin-right:auto;\r\n\ttext-align:center;\r\n\t}\r\n\r\na img {\r\n\tborder:none;\r\n}\r\n\r\n-->\r\n</style>\r\n</head>\r\n<body>\r\n<div id=\"container\">\r\n<a href=\"http://go.microsoft.com/fwlink/?linkid=66138&clcid=0x409\"><img src=\"iisstart.png\" alt=\"IIS\" width=\"960\" height=\"600\" /></a>\r\n</div>\r\n</body>\r\n</html>",
"body_murmur": 703707298,
"body_sha256": "557b5e9015b4963a130c7039e077b3ec0306d401b6ee13d631721d5d969d2917",
"component": [
"IIS:10.0",
"Windows Server"
],
"content_length": 703,
"headers": {
"accept_ranges": [
"bytes"
],
"content_length": [
"703"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 22 Nov 2025 04:53:22 GMT"
],
"etag": [
"\"664bec99425dc1:0\""
],
"last_modified": [
"Sun, 14 Sep 2025 16:29:48 GMT"
],
"server": [
"Microsoft-IIS/10.0"
],
"x_powered_by": [
"ASP.NET"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.176.78.83",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "IIS Windows Server"
}
},
"url": "http://182.176.78.83/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T15:53:38.815Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "10.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:10.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "10\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\">\r\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\r\n<head>\r\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\" />\r\n<title>IIS Windows Server</title>\r\n<style type=\"text/css\">\r\n<!--\r\nbody {\r\n\tcolor:#000000;\r\n\tbackground-color:#0072C6;\r\n\tmargin:0;\r\n}\r\n\r\n#container {\r\n\tmargin-left:auto;\r\n\tmargin-right:auto;\r\n\ttext-align:center;\r\n\t}\r\n\r\na img {\r\n\tborder:none;\r\n}\r\n\r\n-->\r\n</style>\r\n</head>\r\n<body>\r\n<div id=\"container\">\r\n<a href=\"http://go.microsoft.com/fwlink/?linkid=66138&clcid=0x409\"><img src=\"iisstart.png\" alt=\"IIS\" width=\"960\" height=\"600\" /></a>\r\n</div>\r\n</body>\r\n</html>",
"body_murmur": 703707298,
"body_sha256": "557b5e9015b4963a130c7039e077b3ec0306d401b6ee13d631721d5d969d2917",
"component": [
"IIS:10.0",
"Windows Server"
],
"content_length": 703,
"headers": {
"accept_ranges": [
"bytes"
],
"content_length": [
"703"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 22 Nov 2025 03:23:56 GMT"
],
"etag": [
"\"664bec99425dc1:0\""
],
"last_modified": [
"Sun, 14 Sep 2025 16:29:48 GMT"
],
"server": [
"Microsoft-IIS/10.0"
],
"x_powered_by": [
"ASP.NET"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.176.78.83",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"title": "IIS Windows Server"
},
"tls": {
"certificate": {
"extensions": {
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": true,
"decipher_only": false,
"digital_signature": false,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
}
},
"fingerprint_md5": "1239953366B374E3D17CA750837D5C4B",
"fingerprint_sha1": "CDF23598ACE3A7938B5E01C263CA98331CABA4B2",
"fingerprint_sha256": "5D566845850205920B633FCC62F2A4DEEE95C068BE7DC7796538433193994588",
"issuer": {
"common_name": [
"ZEETECH-SERVER"
]
},
"issuer_dn": "/CN=ZEETECH-SERVER",
"jarm": "2ad2ad16d00000022c2ad2ad2ad2ad46ff59a659b30fd8aeaa6755c67691b4",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "141344165565689199543334114223315804601",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"ZEETECH-SERVER"
]
},
"subject_alt_name": {
"dns_names": [
"ZEETECH-SERVER"
],
"extended_dns_names": []
},
"subject_dn": "/CN=ZEETECH-SERVER",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "9c07f6877270cb2f3a7b524f2793d5d57075325105d80d03a3b6deb5f7b66161",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "731a9bf470fd59908072a9e2d3015379294e6225e8d6f90982ae153b4e4e5fbf",
"validation_level": "DV",
"validity": {
"length_seconds": 15811200,
"not_after": "2026-03-15T16:30:33",
"not_before": "2025-09-13T16:30:33"
},
"version": 2
},
"fingerprint_sha256": "5D566845850205920B633FCC62F2A4DEEE95C068BE7DC7796538433193994588",
"precert": false,
"raw": "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",
"tags": [
"dv",
"self_signed",
"root"
]
}
},
"url": "https://182.176.78.83/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T14:44:57.174Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "15.00.2000",
"product": "Microsoft SQL Server 2019",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2019",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2019",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_ON",
"instance_name": "",
"version": "15.0.2000"
}
},
"cve": [
{
"id": "CVE-2007-5090",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2021-1636",
"score": 8.8,
"severity": "high"
},
{
"id": "CVE-2022-23276",
"score": 7.8,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-21T02:36:41.767Z"
}
],
"services_hash": "e80571f6e3490d177ca24daf4c2f8f2e501e03df35377831a6e831ed425ed937",
"last_updated_at": "2025-11-21T15:53:38.815Z",
"banner": [
"mssql",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-2007-5090": {
"id": "CVE-2007-5090",
"references": [
"http://osvdb.org/40598",
"http://secunia.com/advisories/26899",
"http://www-1.ibm.com/support/docview.wss?uid=swg21268116",
"http://www.securityfocus.com/bid/25810",
"http://www.securitytracker.com/id?1018735",
"http://www.vupen.com/english/advisories/2007/3264",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/36771"
],
"score": 7.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Unspecified vulnerability in IBM Rational ClearQuest (CQ), when a Microsoft SQL Server or an IBM DB2 database is used, allows attackers to corrupt data via unspecified vectors.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-264"
},
"CVE-2021-1636": {
"id": "CVE-2021-1636",
"references": [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Elevation of Privilege Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-89"
},
"CVE-2022-23276": {
"id": "CVE-2022-23276",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23276"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "SQL Server for Linux Containers Elevation of Privilege Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-269"
},
"CVE-2022-29143": {
"id": "CVE-2022-29143",
"references": [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29143"
],
"score": 7.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21528": {
"id": "CVE-2023-21528",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21528"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21704": {
"id": "CVE-2023-21704",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21704"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21705": {
"id": "CVE-2023-21705",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21705"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21713": {
"id": "CVE-2023-21713",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21713"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-21718": {
"id": "CVE-2023-21718",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-23384": {
"id": "CVE-2023-23384",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384"
],
"score": 7.3,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-29349": {
"id": "CVE-2023-29349",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29349"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC and OLE DB Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-29356": {
"id": "CVE-2023-29356",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29356"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32025": {
"id": "CVE-2023-32025",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32025"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32026": {
"id": "CVE-2023-32026",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32026"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32027": {
"id": "CVE-2023-32027",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32027"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-32028": {
"id": "CVE-2023-32028",
"references": [
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32028"
],
"score": 7.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft OLE DB Remote Code Execution Vulnerability",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
}
}
}