182.239.243.38
{
"scan_id": 1753258172,
"ip": "182.239.243.38",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.239.243.32/27",
"postal_code": "2000",
"coordinates": {
"latitude": "-33.8672",
"longitude": "151.1997"
},
"geo_point": "-33.8672, 151.1997",
"locale_code": "en",
"continent": "Oceania",
"country_code": "AU",
"country_name": "Australia",
"city": "Sydney"
},
"location_updated_at": "2025-07-24T00:43:18Z",
"asn": {
"number": "AS7545",
"organization": "TPG Telecom Limited",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.239.128.0/17",
"organization": "ORG-IL1-AP",
"descr": "iiNet Limited",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T19:03:54Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-07-24T00:43:18Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-07-24T05:13:07Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-07-24T00:43:18Z"
}
],
"hostnames": [
{
"name": "182-239-243-38.tpgi.com.au",
"last_updated_at": "2025-07-25T22:27:56.888706042Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "1.25",
"product": "Cisco SSH",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:cisco:ssh:1.25",
"part": "a",
"vendor": "cisco",
"product": "ssh",
"version": "1\\.25",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-Cisco-1.25",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"3des-cbc",
"aes192-cbc",
"aes256-cbc"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"hmac-sha1",
"hmac-sha1-96"
],
"host_key_algorithms": [
"ssh-rsa"
],
"kex_algorithms": [
"diffie-hellman-group-exchange-sha1",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "0bd6d253b3ef007b3bd1f79b3b08166fefeff807cd53e34010cc3b7b45a37e6b",
"raw": "AAAAB3NzaC1yc2EAAAADAQABAAAAYQC5LhqmItNuJsPRQb6f10EKnfXnwmH0kzxbQ9zW9ixR/MXG3WtROT+fWAXIywV2eQnuySH8MyJCbcZvtF+t3P5C5V7kyxXH9y4IdU/i5RLTOFuVJKXy/3WacssEVJvCh9k="
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"3des-cbc",
"aes192-cbc",
"aes256-cbc"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"hmac-sha1",
"hmac-sha1-96"
],
"software": "Cisco-1.25",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-1999-1306",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-25T21:53:35.129Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Cisco IOS http config",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "401 Unauthorized\r\n",
"body_murmur": 819126370,
"body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
"content_length": -1,
"headers": {
"accept_ranges": [
"none"
],
"date": [
"Thu, 24 Jul 2025 06:09:24 GMT"
],
"server": [
"cisco-IOS"
],
"www_authenticate": [
"Basic realm=\"level_1_or_view_access\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.239.243.38",
"path": "",
"scheme": "http"
}
},
"status_code": 401
}
},
"cve": [
{
"id": "CVE-1999-1306",
"score": 7.5,
"severity": "high"
}
],
"url": "http://182.239.243.38/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-24T06:18:13.797Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "401 Unauthorized\r\n",
"body_murmur": 819126370,
"body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
"content_length": -1,
"headers": {
"accept_ranges": [
"none"
],
"date": [
"Wed, 23 Jul 2025 12:26:41 GMT"
],
"server": [
"cisco-IOS"
],
"www_authenticate": [
"Basic realm=\"level_1_or_view_access\""
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.239.243.38",
"path": "",
"scheme": "https"
}
},
"status_code": 401
},
"tls": {
"certificate": {
"fingerprint_md5": "87B98D3ADD57D9C796FF7ED9C0846B21",
"fingerprint_sha1": "CF6492263BD03588AE0DEF84FDB0BFB8142DE62A",
"fingerprint_sha256": "218315DD0CA71D7A5ACD7ECCC35F97E306500AAAB3518376BAEA6811941CBDFC",
"issuer": {
"common_name": [
"APS_temp.GSKCAFE"
],
"serial_number": [
"FCW1925C12Z"
],
"unstructured_name": [
"APS_temp.GSKCAFE"
]
},
"issuer_dn": "/CN=APS_temp.GSKCAFE/serialNumber=FCW1925C12Z+unstructuredName=APS_temp.GSKCAFE",
"jarm": "07b02b09b04b04b07b07b02b07b04bd7fc4c7c6ef19b77a4ca0787979cdc13",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "2",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "MjA5NjkxZGI4MDgyZDFhYjYyYTE4MDhmNTM0YmVhMDVmNjUwMjRhZmZkNTJkZDgwODUwZWM5ZTYyOGI2YzJmMDMwYjA1MDVmOGUxNmI1YTI3OGYzNWI1MzU3ODA4MzhjZmZlYTQ1YWRjODcyOTdiNDYyNTRlYzA3MDRjZTBiZjFiOWU2YjI0NDExOWQ2NmI0ZDNiYjk5ZDQ4Y2FiOWU5ODk4MjMxYzg4MTlmYWYyMzlhZjQ4NmQ0YTQ3ODI2MDdi"
},
"subject": {
"common_name": [
"APS_temp.GSKCAFE"
],
"serial_number": [
"FCW1925C12Z"
],
"unstructured_name": [
"APS_temp.GSKCAFE"
]
},
"subject_alt_name": {
"dns_names": [
"APS_temp.GSKCAFE"
],
"extended_dns_names": []
},
"subject_dn": "/CN=APS_temp.GSKCAFE/serialNumber=FCW1925C12Z+unstructuredName=APS_temp.GSKCAFE",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "60450ebd753b7db20ea9635da522cff69b223ea7a4cc188473383964be225781",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 768,
"modulus": "MHhiOTJlMWFhNjIyZDM2ZTI2YzNkMTQxYmU5ZmQ3NDEwYTlkZjVlN2MyNjFmNDkzM2M1YjQzZGNkNmY2MmM1MWZjYzVjNmRkNmI1MTM5M2Y5ZjU4MDVjOGNiMDU3Njc5MDllZWM5MjFmYzMzMjI0MjZkYzY2ZmI0NWZhZGRjZmU0MmU1NWVlNGNiMTVjN2Y3MmUwODc1NGZlMmU1MTJkMzM4NWI5NTI0YTVmMmZmNzU5YTcyY2IwNDU0OWJjMjg3ZDk="
}
},
"tbs_fingerprint": "bddd88679ea51106031d7d2a260cd2c81fb7607e90ea6dde3098f072f1d8c35f",
"validation_level": "OV",
"validity": {
"length_seconds": 315360000,
"not_after": "2035-05-22T19:42:50",
"not_before": "2025-05-24T19:42:50"
}
},
"fingerprint_sha256": "218315DD0CA71D7A5ACD7ECCC35F97E306500AAAB3518376BAEA6811941CBDFC",
"precert": false,
"raw": "MIIByjCCAVQCAQIwDQYJKoZIhvcNAQEFBQAwUDEZMBcGA1UEAwwQQVBTX3RlbXAuR1NLQ0FGRTEzMBIGA1UEBRMLRkNXMTkyNUMxMlowHQYJKoZIhvcNAQkCFhBBUFNfdGVtcC5HU0tDQUZFMB4XDTI1MDUyNDE5NDI1MFoXDTM1MDUyMjE5NDI1MFowUDEZMBcGA1UEAwwQQVBTX3RlbXAuR1NLQ0FGRTEzMBIGA1UEBRMLRkNXMTkyNUMxMlowHQYJKoZIhvcNAQkCFhBBUFNfdGVtcC5HU0tDQUZFMHwwDQYJKoZIhvcNAQEBBQADawAwaAJhALkuGqYi024mw9FBvp/XQQqd9efCYfSTPFtD3Nb2LFH8xcbda1E5P59YBcjLBXZ5Ce7JIfwzIkJtxm+0X63c/kLlXuTLFcf3Lgh1T+LlEtM4W5UkpfL/dZpyywRUm8KH2QIDAQABMA0GCSqGSIb3DQEBBQUAA2EAIJaR24CC0atioYCPU0vqBfZQJK/9Ut2AhQ7J5ii2wvAwsFBfjha1onjzW1NXgIOM/+pFrchyl7RiVOwHBM4L8bnmskQRnWa007uZ1IyrnpiYIxyIGfryOa9IbUpHgmB7",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"url": "https://182.239.243.38/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-23T12:45:34.678Z"
}
],
"services_hash": "7ad668b790b0e93bf81e8906e319bbe201c24ebe7acc0c229d000d7cc2196627",
"last_updated_at": "2025-07-25T21:53:35.129Z",
"banner": [
"ssh",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-1306": {
"id": "CVE-1999-1306",
"references": [
"http://www.cert.org/advisories/CA-1992-20.html"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
}
}
}