182.73.207.129
{
"scan_id": 1746288521,
"ip": "182.73.207.129",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.73.206.0/23",
"postal_code": "562130",
"coordinates": {
"latitude": "12.9753",
"longitude": "77.591"
},
"geo_point": "12.9753, 77.591",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "Bengaluru"
},
"location_updated_at": "2025-05-07T00:20:09Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.73.192.0/20",
"organization": "BHARTI-IN",
"descr": "BHARTI-IN,\nBharti Airtel Limited,\nClass A ISP in INDIA .,\nPlot No. CP-5,sector-8,,\nIMT Manesar,\nINDIA",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:56Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-05-07T00:20:09Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-05-07T00:21:25Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-05-07T00:20:09Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "",
"product": "FortiSSH",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:fortinet:fortios",
"part": "o",
"vendor": "fortinet",
"product": "fortios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-cfH1t-849",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"[email protected]",
"hmac-ripemd160",
"[email protected]"
],
"host_key_algorithms": [
"ssh-rsa",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group-exchange-sha1",
"diffie-hellman-group14-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "fa795b6a8d3dc18628562283bf0b3855d56bacc1c39b7365a21a5a85e0a51e15"
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"[email protected]",
"hmac-ripemd160",
"[email protected]"
],
"software": "cfH1t-849",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2022-41328",
"severity": "high"
},
{
"id": "CVE-2022-41329",
"severity": "medium"
},
{
"id": "CVE-2022-42476",
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-07T23:23:57.466Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body_murmur": 390931134,
"body_sha256": "139dcb3dd29b1727eb6ee73f90dcc674ec148c2f09d009411aaa94a13fdabde5",
"content_length": -1,
"favicon": {
"md5_hash": "e462005902f81094ab3de44e4381de19",
"murmur_hash": 945408572,
"path": "http://182.73.207.129:80/favicon.ico",
"size": 318
},
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 05 May 2025 21:44:35 GMT"
],
"last_modified": [
"Thu, 29 Jul 2021 23:34:56 GMT"
],
"strict_transport_security": [
"max-age=15552000"
],
"vary": [
"Accept-encoding"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body_murmur": -492004449,
"body_sha256": "c7db2eb2fee1cd989fc284b2b73990df7e253173a69ee658a3cddf5aac99698c",
"content_length": 211,
"location": "https://182.73.207.129:443/",
"status_code": 302,
"status_line": "302 Found"
},
{
"body_murmur": 2090781829,
"body_sha256": "b241edf0fe2fce001a1452af8ded7eef1ab9ca2970679f5bbfe5c8edfd309ee2",
"content_length": 209,
"location": "https://182.73.207.129/ng",
"status_code": 302,
"status_line": "302 Found"
}
],
"status_code": 200
}
},
"url": "http://182.73.207.129/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-05T21:44:36.782Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body_murmur": 390931134,
"body_sha256": "139dcb3dd29b1727eb6ee73f90dcc674ec148c2f09d009411aaa94a13fdabde5",
"content_length": -1,
"favicon": {
"md5_hash": "e462005902f81094ab3de44e4381de19",
"murmur_hash": 945408572,
"path": "https://182.73.207.129:443/favicon.ico",
"size": 318
},
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 05 May 2025 09:14:35 GMT"
],
"last_modified": [
"Thu, 29 Jul 2021 23:34:56 GMT"
],
"strict_transport_security": [
"max-age=15552000"
],
"vary": [
"Accept-encoding"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body_murmur": 2090781829,
"body_sha256": "b241edf0fe2fce001a1452af8ded7eef1ab9ca2970679f5bbfe5c8edfd309ee2",
"content_length": 209,
"location": "https://182.73.207.129/ng",
"status_code": 302,
"status_line": "302 Found"
}
],
"status_code": 200
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
}
},
"fingerprint_md5": "321073C357C435457935B2FF45309A1D",
"fingerprint_sha1": "B575EAD17210ED1050D4F4A10C5322EC229AE874",
"fingerprint_sha256": "5727B92E65E486884442410A2B4A0619AF257F312076A9B01F21E5DD21EC5034",
"issuer": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"jarm": "07d0bd0fd21d21d07c42d43d0000009424803a662b126a748cf4f90707a33c",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "213009116685904934",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true
},
"subject": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"subject_alt_name": {
"dns_names": [
"FortiGate"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "2dc13bd07efff4030697dbc9a41629f710718f669073e0579eace5f41140d057",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048
}
},
"tbs_fingerprint": "be956154ec64daa4d9bb59190e4b039cd1919df1e3e19ac9481f84a5c418ca94",
"validation_level": "OV",
"validity": {
"length_seconds": 71280000,
"not_after": "2027-07-20T18:37:11",
"not_before": "2025-04-16T18:37:11"
},
"version": 2
},
"fingerprint_sha256": "5727B92E65E486884442410A2B4A0619AF257F312076A9B01F21E5DD21EC5034",
"precert": false,
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://182.73.207.129/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-05-05T09:48:41.387Z"
}
],
"services_hash": "5e14b91a21029954dfdabb6733241b5ec4811f1fb10bfa452daeeb66ff490ec3",
"last_updated_at": "2025-05-07T23:23:57.466Z",
"banner": [
"ssh",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-2022-41328": {
"id": "CVE-2022-41328",
"references": [
"https://fortiguard.com/psirt/FG-IR-22-369"
],
"score": 7.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"weakness": "CWE-22"
},
"CVE-2022-41329": {
"id": "CVE-2022-41329",
"references": [
"https://fortiguard.com/psirt/FG-IR-22-364"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7, FortiOS version 7.2.0 through 7.2.3 and 7.0.0 through 7.0.9 allows an unauthenticated attackers to obtain sensitive logging informations on the device via crafted HTTP GET requests.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2022-42476": {
"id": "CVE-2022-42476",
"references": [
"https://fortiguard.com/psirt/FG-IR-22-401"
],
"score": 8.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.8 and before 6.4.11, FortiProxy version 7.2.0 through 7.2.2 and 7.0.0 through 7.0.8 allows privileged VDOM administrators to escalate their privileges to super admin of the box via crafted CLI requests.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"weakness": "CWE-22"
},
"CVE-2022-45861": {
"id": "CVE-2022-45861",
"references": [
"https://fortiguard.com/psirt/FG-IR-22-477"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An access of uninitialized pointer vulnerability [CWE-824] in the SSL VPN portal of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9 and before 6.4.11 and FortiProxy version 7.2.0 through 7.2.1, version 7.0.0 through 7.0.7 and before 2.0.11 allows a remote authenticated attacker to crash the sslvpn daemon via an HTTP GET request.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-824"
},
"CVE-2023-36640": {
"id": "CVE-2023-36640",
"references": [
"https://fortiguard.com/psirt/FG-IR-23-137"
],
"score": 6.7,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-134"
},
"CVE-2023-45583": {
"id": "CVE-2023-45583",
"references": [
"https://fortiguard.com/psirt/FG-IR-23-137"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-134"
},
"CVE-2023-45586": {
"id": "CVE-2023-45586",
"references": [
"https://fortiguard.com/psirt/FG-IR-23-225"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
"weakness": "CWE-345"
}
}
}