Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

182.253.79.148

SummaryCVE DetailsRaw Data
14 Jan 2026, 23:18:51 UTC
{
  "scan_id": 1768190223,
  "ip": "182.253.79.148",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.253.78.0/23",
    "postal_code": "80117",
    "coordinates": {
      "latitude": "-8.6542",
      "longitude": "115.1926"
    },
    "geo_point": "-8.6542, 115.1926",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "ID",
    "country_name": "Indonesia",
    "city": "Denpasar"
  },
  "location_updated_at": "2026-01-11T00:43:12Z",
  "asn": {
    "number": "AS17451",
    "organization": "BIZNET NETWORKS",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.253.0.0/16",
    "organization": "Biznet Networks",
    "descr": "Biznet Networks,\nInternet Service Provider,\nJakarta, Indonesia",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:54Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2026-01-11T00:43:12Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2026-01-11T06:08:37Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2026-01-11T00:43:12Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "",
      "product": "FortiSSH",
      "extra_info": "protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/o:fortinet:fortios",
          "part": "o",
          "vendor": "fortinet",
          "product": "fortios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-Lcq6L",
          "client_to_server_ciphers": [
            "aes256-ctr",
            "[email protected]"
          ],
          "client_to_server_compression": [
            "none",
            "[email protected]"
          ],
          "client_to_server_macs": [
            "hmac-sha2-256",
            "[email protected]",
            "hmac-sha2-512",
            "[email protected]"
          ],
          "host_key_algorithms": [
            "rsa-sha2-512",
            "rsa-sha2-256",
            "ssh-ed25519"
          ],
          "kex_algorithms": [
            "diffie-hellman-group14-sha256",
            "diffie-hellman-group16-sha512",
            "diffie-hellman-group18-sha512",
            "diffie-hellman-group-exchange-sha256",
            "[email protected]",
            "ecdh-sha2-nistp256",
            "ecdh-sha2-nistp384",
            "ecdh-sha2-nistp521"
          ],
          "key": {
            "algorithm": "ssh-ed25519",
            "fingerprint_sha256": "35e5f61513138f8fb5f1f340c2f2fbc29d0b1a50a5d63049aea3b0ab9a86c562"
          },
          "server_to_client_ciphers": [
            "aes256-ctr",
            "[email protected]"
          ],
          "server_to_client_compression": [
            "none",
            "[email protected]"
          ],
          "server_to_client_macs": [
            "hmac-sha2-256",
            "[email protected]",
            "hmac-sha2-512",
            "[email protected]"
          ],
          "software": "Lcq6L",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2022-41328",
          "severity": "high"
        },
        {
          "id": "CVE-2022-41329",
          "severity": "medium"
        },
        {
          "id": "CVE-2022-42476",
          "severity": "high"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-13T12:16:52.298Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "https",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "ssl",
      "modules": {
        "http": {
          "body_murmur": 324260192,
          "body_sha256": "b5d848ac5a24a6bf3162d5dcbf621f14144661c5a9bb4390e895f9aa8944fc59",
          "content_length": -1,
          "favicon": {
            "md5_hash": "2c5169a038c1e0ffc9ee9dc1da26a48e",
            "murmur_hash": -404383634,
            "path": "https://182.253.79.148:443/favicon/apple-touch-icon.png",
            "size": 745
          },
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_security_policy": [
              "frame-ancestors 'self'"
            ],
            "content_type": [
              "text/html"
            ],
            "date": [
              "Wed, 14 Jan 2026 22:52:54 GMT"
            ],
            "etag": [
              "gss7nc0NH1Hhgtj77gp8G53pqbpNnfj1"
            ],
            "strict_transport_security": [
              "max-age=15552000"
            ],
            "x_frame_options": [
              "SAMEORIGIN"
            ],
            "x_xss_protection": [
              "1; mode=block"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "FortiGate",
          "transfer_encoding": [
            "chunked"
          ]
        },
        "tls": {
          "certificate": {
            "extensions": {
              "basic_constraints": {
                "is_ca": true
              },
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": false,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              }
            },
            "fingerprint_md5": "42705303F9482304BFEABDDBD743BD2F",
            "fingerprint_sha1": "5DED2B87684A080457A93E9CDA0129E628475836",
            "fingerprint_sha256": "E036D63AB49FC6A558670CFF885DC8E5057F2ADD314C3B4FE757CB71124EB492",
            "issuer": {
              "common_name": [
                "FortiGate"
              ],
              "organization": [
                "Fortinet Ltd."
              ]
            },
            "jarm": "0bd0bd0000bd0bd00042d42d0000009f6c10cf2baa8e8566d140ba89a7485c",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "7735152479592552252",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "FortiGate"
              ],
              "organization": [
                "Fortinet Ltd."
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "FortiGate"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e98bee59ca7cacacf8060b83aa2de19019e95a0f08c2dfd0fc8a69a354c4bd18",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "5f208661575865eb24e7d79e65a0b6b9e7afa127b4477f0846a0dcafd0c5ee9d",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 71280000,
              "not_after": "2027-12-22T05:01:47",
              "not_before": "2025-09-18T05:01:47"
            },
            "version": 2
          },
          "fingerprint_sha256": "E036D63AB49FC6A558670CFF885DC8E5057F2ADD314C3B4FE757CB71124EB492",
          "precert": false,
          "tags": [
            "ov",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://182.253.79.148/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2026-01-14T23:18:51.586Z"
    }
  ],
  "services_hash": "b390cf2c608f2e0217d4fef4d5f10507e1c59dd5a0e1a3875d19ca5bcfba18ab",
  "last_updated_at": "2026-01-14T23:18:51.586Z",
  "banner": [
    "ssh",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2022-41328": {
      "id": "CVE-2022-41328",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-22-369"
      ],
      "score": 7.1,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
      "weakness": "CWE-22"
    },
    "CVE-2022-41329": {
      "id": "CVE-2022-41329",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-22-364"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7, FortiOS version 7.2.0 through 7.2.3 and 7.0.0 through 7.0.9 allows an unauthenticated attackers to obtain sensitive logging informations on the device via crafted HTTP GET requests.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2022-42476": {
      "id": "CVE-2022-42476",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-22-401"
      ],
      "score": 8.2,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.8 and before 6.4.11, FortiProxy version 7.2.0 through 7.2.2 and 7.0.0 through 7.0.8 allows privileged VDOM administrators to escalate their privileges to super admin of the box via crafted CLI requests.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-22"
    },
    "CVE-2022-45861": {
      "id": "CVE-2022-45861",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-22-477"
      ],
      "score": 6.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An access of uninitialized pointer vulnerability [CWE-824] in the SSL VPN portal of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9 and before 6.4.11 and FortiProxy version 7.2.0 through 7.2.1, version 7.0.0 through 7.0.7 and before 2.0.11 allows a remote authenticated attacker to crash the sslvpn daemon via an HTTP GET request.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-824"
    },
    "CVE-2023-36640": {
      "id": "CVE-2023-36640",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-23-137"
      ],
      "score": 6.7,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-134"
    },
    "CVE-2023-45583": {
      "id": "CVE-2023-45583",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-23-137"
      ],
      "score": 7.2,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-134"
    },
    "CVE-2023-45586": {
      "id": "CVE-2023-45586",
      "references": [
        "https://fortiguard.com/psirt/FG-IR-23-225"
      ],
      "score": 5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
      "weakness": "CWE-345"
    }
  }
}