Odin HomeODIN logoODIN logo
PricingJoin us on Discord

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.239.243.38

SummaryCVE DetailsRaw Data

Geolocation

Network
182.239.243.32/27
Postal Code
2000
City
Sydney
Country
Australia (AU)
Continent
Oceania
Locale Code
en
Geo Point
-33.8672, 151.1997
Updated At
24 Jul 2025, 00:43:18 UTC

Whois

Network
182.239.128.0/17
Organization
ORG-IL1-AP
Desc
iiNet Limited
Updated At
09 Dec 2024, 19:03:54 UTC

Geolocation

Network
182.239.243.32/27
Postal Code
2000
City
Sydney
Country
Australia (AU)
Continent
Oceania
Locale Code
en
Geo Point
-33.8672, 151.1997
Updated At
24 Jul 2025, 00:43:18 UTC

Whois

Network
182.239.128.0/17
Organization
ORG-IL1-AP
Desc
iiNet Limited
Updated At
09 Dec 2024, 19:03:54 UTC

22/sshTCPLast Updated At: 25 Jul 2025, 21:53:35 UTC

About Service
Product
Cisco SSH
Version
1.25
Extra Info
protocol 2.0
CVEsCVE-1999-1306CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Upgrade Your Plan
Softwares
Vendor
cisco
Product
ssh
URI
cpe:/a:cisco:ssh:1.25
Vendor
cisco
Product
ios
URI
cpe:/o:cisco:ios
//ssh

//ssh

{
  "banner": "SSH-2.0-Cisco-1.25",
  "client_to_server_ciphers": [
    "aes128-ctr",
    "aes192-ctr",
    "aes256-ctr",
    "aes128-cbc",
    "3des-cbc",
    "aes192-cbc",
    "aes256-cbc"
  ],
  "client_to_server_compression": [
    "none"
  ],
  "client_to_server_macs": [
    "hmac-sha1",
    "hmac-sha1-96"
  ],
  "host_key_algorithms": [
    "ssh-rsa"
  ],
  "kex_algorithms": [
    "diffie-hellman-group-exchange-sha1",
    "diffie-hellman-group14-sha1",
    "diffie-hellman-group1-sha1"
  ],
  "key": {
    "algorithm": "ssh-rsa",
    "fingerprint_sha256": "0bd6d253b3ef007b3bd1f79b3b08166fefeff807cd53e34010cc3b7b45a37e6b",
    "raw": "AAAAB3NzaC1yc2EAAAADAQABAAAAYQC5LhqmItNuJsPRQb6f10EKnfXnwmH0kzxbQ9zW9ixR/MXG3WtROT+fWAXIywV2eQnuySH8MyJCbcZvtF+t3P5C5V7kyxXH9y4IdU/i5RLTOFuVJKXy/3WacssEVJvCh9k="
  },
  "server_to_client_ciphers": [
    "aes128-ctr",
    "aes192-ctr",
    "aes256-ctr",
    "aes128-cbc",
    "3des-cbc",
    "aes192-cbc",
    "aes256-cbc"
  ],
  "server_to_client_compression": [
    "none"
  ],
  "server_to_client_macs": [
    "hmac-sha1",
    "hmac-sha1-96"
  ],
  "software": "Cisco-1.25",
  "version": "2.0"
}

80/httpTCPLast Updated At: 24 Jul 2025, 06:18:13 UTC

About Service
Product
Cisco IOS http config
VersionN/A
Extra InfoN/A
CVEsCVE-1999-1306CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Upgrade Your Plan
Softwares
Vendor
cisco
Product
ios
URI
cpe:/o:cisco:ios
HTTP
Status Code
401
TitleN/A
Body SHA256
86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9
ComponentN/A
Response Headers
accept ranges
none
date
Thu, 24 Jul 2025 06:09:24 GMT
server
cisco-IOS
www authenticate
Basic realm="level_1_or_view_access"
//http

//http

{
  "body": "401 Unauthorized\r\n",
  "body_murmur": 819126370,
  "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
  "content_length": -1,
  "headers": {
    "accept_ranges": [
      "none"
    ],
    "date": [
      "Thu, 24 Jul 2025 06:09:24 GMT"
    ],
    "server": [
      "cisco-IOS"
    ],
    "www_authenticate": [
      "Basic realm=\"level_1_or_view_access\""
    ]
  },
  "protocol": "HTTP/1.1",
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "182.239.243.38",
      "path": "",
      "scheme": "http"
    }
  },
  "status_code": 401
}

443/unknownTCPLast Updated At: 23 Jul 2025, 12:45:34 UTC

HTTP
Status Code
401
TitleN/A
Body SHA256
86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9
ComponentN/A
Response Headers
accept ranges
none
date
Wed, 23 Jul 2025 12:26:41 GMT
server
cisco-IOS
www authenticate
Basic realm="level_1_or_view_access"
TLS
Serial Number
2
Validity From
24 May 2025, 19:42:50
Validity To
22 May 2035, 19:42:50
Subject AN
APS_temp.GSKCAFE
Subject CN
APS_temp.GSKCAFE
Subject Org
N/A
Issuer CN
APS_temp.GSKCAFE
Issuer Org
N/A
Fingerprint
MD5
87B98D3ADD57D9C796FF7ED9C0846B21
SHA1
CF6492263BD03588AE0DEF84FDB0BFB8142DE62A
SHA256
218315DD0CA71D7A5ACD7ECCC35F97E306500AAAB3518376BAEA6811941CBDFC
JARM
07b02b09b04b04b07b07b02b07b04bd7fc4c7c6ef19b77a4ca0787979cdc13
//http

//http

{
  "body": "401 Unauthorized\r\n",
  "body_murmur": 819126370,
  "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
  "content_length": -1,
  "headers": {
    "accept_ranges": [
      "none"
    ],
    "date": [
      "Wed, 23 Jul 2025 12:26:41 GMT"
    ],
    "server": [
      "cisco-IOS"
    ],
    "www_authenticate": [
      "Basic realm=\"level_1_or_view_access\""
    ]
  },
  "protocol": "HTTP/1.1",
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "182.239.243.38",
      "path": "",
      "scheme": "https"
    }
  },
  "status_code": 401
}
25 Jul 2025, 21:53:35 UTC