Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.239.243.38

SummaryCVE DetailsRaw Data
25 Jul 2025, 21:53:35 UTC
{
  "scan_id": 1753258172,
  "ip": "182.239.243.38",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.239.243.32/27",
    "postal_code": "2000",
    "coordinates": {
      "latitude": "-33.8672",
      "longitude": "151.1997"
    },
    "geo_point": "-33.8672, 151.1997",
    "locale_code": "en",
    "continent": "Oceania",
    "country_code": "AU",
    "country_name": "Australia",
    "city": "Sydney"
  },
  "location_updated_at": "2025-07-24T00:43:18Z",
  "asn": {
    "number": "AS7545",
    "organization": "TPG Telecom Limited",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.239.128.0/17",
    "organization": "ORG-IL1-AP",
    "descr": "iiNet Limited",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:54Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-07-24T00:43:18Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-07-24T05:13:07Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-07-24T00:43:18Z"
    }
  ],
  "hostnames": [
    {
      "name": "182-239-243-38.tpgi.com.au",
      "last_updated_at": "2025-07-25T22:27:56.888706042Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "1.25",
      "product": "Cisco SSH",
      "extra_info": "protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:cisco:ssh:1.25",
          "part": "a",
          "vendor": "cisco",
          "product": "ssh",
          "version": "1\\.25",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        },
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-Cisco-1.25",
          "client_to_server_ciphers": [
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "aes128-cbc",
            "3des-cbc",
            "aes192-cbc",
            "aes256-cbc"
          ],
          "client_to_server_compression": [
            "none"
          ],
          "client_to_server_macs": [
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "host_key_algorithms": [
            "ssh-rsa"
          ],
          "kex_algorithms": [
            "diffie-hellman-group-exchange-sha1",
            "diffie-hellman-group14-sha1",
            "diffie-hellman-group1-sha1"
          ],
          "key": {
            "algorithm": "ssh-rsa",
            "fingerprint_sha256": "0bd6d253b3ef007b3bd1f79b3b08166fefeff807cd53e34010cc3b7b45a37e6b",
            "raw": "AAAAB3NzaC1yc2EAAAADAQABAAAAYQC5LhqmItNuJsPRQb6f10EKnfXnwmH0kzxbQ9zW9ixR/MXG3WtROT+fWAXIywV2eQnuySH8MyJCbcZvtF+t3P5C5V7kyxXH9y4IdU/i5RLTOFuVJKXy/3WacssEVJvCh9k="
          },
          "server_to_client_ciphers": [
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "aes128-cbc",
            "3des-cbc",
            "aes192-cbc",
            "aes256-cbc"
          ],
          "server_to_client_compression": [
            "none"
          ],
          "server_to_client_macs": [
            "hmac-sha1",
            "hmac-sha1-96"
          ],
          "software": "Cisco-1.25",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-25T21:53:35.129Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Cisco IOS http config",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body": "401 Unauthorized\r\n",
          "body_murmur": 819126370,
          "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "none"
            ],
            "date": [
              "Thu, 24 Jul 2025 06:09:24 GMT"
            ],
            "server": [
              "cisco-IOS"
            ],
            "www_authenticate": [
              "Basic realm=\"level_1_or_view_access\""
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.239.243.38",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 401
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "score": 7.5,
          "severity": "high"
        }
      ],
      "url": "http://182.239.243.38/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-24T06:18:13.797Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "unknown",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "401 Unauthorized\r\n",
          "body_murmur": 819126370,
          "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "none"
            ],
            "date": [
              "Wed, 23 Jul 2025 12:26:41 GMT"
            ],
            "server": [
              "cisco-IOS"
            ],
            "www_authenticate": [
              "Basic realm=\"level_1_or_view_access\""
            ]
          },
          "protocol": "HTTP/1.1",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "182.239.243.38",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 401
        },
        "tls": {
          "certificate": {
            "fingerprint_md5": "87B98D3ADD57D9C796FF7ED9C0846B21",
            "fingerprint_sha1": "CF6492263BD03588AE0DEF84FDB0BFB8142DE62A",
            "fingerprint_sha256": "218315DD0CA71D7A5ACD7ECCC35F97E306500AAAB3518376BAEA6811941CBDFC",
            "issuer": {
              "common_name": [
                "APS_temp.GSKCAFE"
              ],
              "serial_number": [
                "FCW1925C12Z"
              ],
              "unstructured_name": [
                "APS_temp.GSKCAFE"
              ]
            },
            "issuer_dn": "/CN=APS_temp.GSKCAFE/serialNumber=FCW1925C12Z+unstructuredName=APS_temp.GSKCAFE",
            "jarm": "07b02b09b04b04b07b07b02b07b04bd7fc4c7c6ef19b77a4ca0787979cdc13",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "2",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true,
              "value": "MjA5NjkxZGI4MDgyZDFhYjYyYTE4MDhmNTM0YmVhMDVmNjUwMjRhZmZkNTJkZDgwODUwZWM5ZTYyOGI2YzJmMDMwYjA1MDVmOGUxNmI1YTI3OGYzNWI1MzU3ODA4MzhjZmZlYTQ1YWRjODcyOTdiNDYyNTRlYzA3MDRjZTBiZjFiOWU2YjI0NDExOWQ2NmI0ZDNiYjk5ZDQ4Y2FiOWU5ODk4MjMxYzg4MTlmYWYyMzlhZjQ4NmQ0YTQ3ODI2MDdi"
            },
            "subject": {
              "common_name": [
                "APS_temp.GSKCAFE"
              ],
              "serial_number": [
                "FCW1925C12Z"
              ],
              "unstructured_name": [
                "APS_temp.GSKCAFE"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "APS_temp.GSKCAFE"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/CN=APS_temp.GSKCAFE/serialNumber=FCW1925C12Z+unstructuredName=APS_temp.GSKCAFE",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "60450ebd753b7db20ea9635da522cff69b223ea7a4cc188473383964be225781",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 768,
                "modulus": "MHhiOTJlMWFhNjIyZDM2ZTI2YzNkMTQxYmU5ZmQ3NDEwYTlkZjVlN2MyNjFmNDkzM2M1YjQzZGNkNmY2MmM1MWZjYzVjNmRkNmI1MTM5M2Y5ZjU4MDVjOGNiMDU3Njc5MDllZWM5MjFmYzMzMjI0MjZkYzY2ZmI0NWZhZGRjZmU0MmU1NWVlNGNiMTVjN2Y3MmUwODc1NGZlMmU1MTJkMzM4NWI5NTI0YTVmMmZmNzU5YTcyY2IwNDU0OWJjMjg3ZDk="
              }
            },
            "tbs_fingerprint": "bddd88679ea51106031d7d2a260cd2c81fb7607e90ea6dde3098f072f1d8c35f",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 315360000,
              "not_after": "2035-05-22T19:42:50",
              "not_before": "2025-05-24T19:42:50"
            }
          },
          "fingerprint_sha256": "218315DD0CA71D7A5ACD7ECCC35F97E306500AAAB3518376BAEA6811941CBDFC",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://182.239.243.38/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-07-23T12:45:34.678Z"
    }
  ],
  "services_hash": "7ad668b790b0e93bf81e8906e319bbe201c24ebe7acc0c229d000d7cc2196627",
  "last_updated_at": "2025-07-25T21:53:35.129Z",
  "banner": [
    "ssh",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-1306": {
      "id": "CVE-1999-1306",
      "references": [
        "http://www.cert.org/advisories/CA-1992-20.html"
      ],
      "score": 7.5,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-Other"
    }
  }
}