Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.74.21.29

SummaryCVE DetailsRaw Data
08 Dec 2025, 12:14:50 UTC

Basic Information

ip182.74.21.29
is_ipv4true
is_ipv6false
location.network182.74.21.0/24
location.postal_code122016
location.coordinates.latitude28.4597
location.coordinates.longitude77.0282
location.geo_point28.4597, 77.0282
location.locale_codeen
location.continentAsia
location.country_codeIN
location.country_nameIndia
location.cityGurugram
location_updated_at2025-12-08T00:43:35Z
asn.numberAS9498
asn.organizationBHARTI Airtel Ltd.
asn_updated_at0001-01-01T00:00:00Z
whois_updated_at2024-12-09T11:26:56Z
last_updated_at2025-12-08T12:14:50.962Z
is_vulntrue
whois.network182.74.21.0/24
whois.organizationBHARTI-IN
whois.descrBHARTI-IN, Bharti Airtel Limited, Class A ISP in INDIA ., Plot No. CP-5,sector-8,, IMT Manesar, INDIA
tags.nameis_anonymous_proxy
tags.pretty_nameAnonymous Proxy
tags.valuefalse
tags.last_updated_at2025-12-08T00:43:35Z
tags.nameis_cdn
tags.pretty_nameCDN
tags.valuefalse
tags.last_updated_at2025-12-08T03:17:22Z
tags.nameis_satellite_provider
tags.pretty_nameSatellite Provider
tags.valuefalse
tags.last_updated_at2025-12-08T00:43:35Z

80/httpTCP

services.port80
services.protocoltcp
services.namehttp
services.version2.4.41
services.productApache httpd
services.extra_info(Ubuntu)
services.urlhttp://182.74.21.29/
services.last_updated_at2025-12-08T12:14:50.962Z

443/httpTCP

services.port443
services.protocoltcp
services.namehttp
services.version2.4.41
services.productApache httpd
services.extra_info(Ubuntu)
services.tunnelssl
services.urlhttps://182.74.21.29/
services.last_updated_at2025-12-08T03:00:53.084Z

5060/unknownTCP

services.port5060
services.protocoltcp
services.nameunknown
services.last_updated_at2025-12-06T23:53:16.389Z
services.softwares.uricpe:/a:apache:http_server:2.4.41
services.softwares.parta
services.softwares.vendorapache
services.softwares.producthttp_server
services.softwares.version2\.4\.41
services.softwares.languageANY
services.softwares.editionANY
services.softwares.updateANY
services.cve.idCVE-2006-20001
services.cve.score7.5
services.cve.severityhigh
services.cve.idCVE-2019-17567
services.cve.score5.3
services.cve.severitymedium
services.cve.idCVE-2020-11984
services.cve.score9.8
services.cve.severitycritical
services.modules.tls.certificate.extensions.basic_constraints.is_catrue
services.modules.tls.certificate.fingerprint_md5FA1D8FD9EA42A356DA2128F4CFE48C24
services.modules.tls.certificate.fingerprint_sha1DB91F03CEBE0655F97CF25CE9CCBEA5BB51ECF0A
services.modules.tls.certificate.fingerprint_sha256C9702741CDCAAEEC73C7D85C22028623D7E2D3FE24457455FA6299B1367D20A1
services.modules.tls.certificate.issuer_dn/CN=ftpnew
services.modules.tls.certificate.jarm07d19d1ad21d21d00042d43d00000076e5b3c488a88e5790970b78ffb8afc2
services.modules.tls.certificate.redactedfalse
services.modules.tls.certificate.revocation.ocsp.reasonUNKNOWN
services.modules.tls.certificate.revocation.ocsp.revokedfalse
services.modules.tls.certificate.serial_number14196354170811159582522433839464119205685431689
services.modules.tls.certificate.signature.algorithm.nameSHA256-RSA
services.modules.tls.certificate.signature.algorithm.oid1.2.840.113549.1.1.11
services.modules.tls.certificate.signature.self_signedtrue
services.modules.tls.certificate.signature.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
services.modules.tls.certificate.subject_dn/CN=ftpnew
services.modules.tls.certificate.subject_key_info._keyrsa
services.modules.tls.certificate.subject_key_info.fingerprint_sha2565bc952e6cb08e81695f63bde8cd2590449db43895a208f1182791970770a707c
services.modules.tls.certificate.subject_key_info.key_algorithmRSA
services.modules.tls.certificate.subject_key_info.rsa.exponent65537
services.modules.tls.certificate.subject_key_info.rsa.length2048
services.modules.tls.certificate.subject_key_info.rsa.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
services.modules.tls.certificate.tbs_fingerprint7cbe79ad875b640872c5dc1d84ed3877df85d54fe93bba78195a69cc23894447
services.modules.tls.certificate.validation_levelDV
services.modules.tls.certificate.validity.length_seconds315360000
services.modules.tls.certificate.validity.not_after2034-05-09T12:28:21
services.modules.tls.certificate.validity.not_before2024-05-11T12:28:21
services.modules.tls.certificate.version2
services.modules.tls.fingerprint_sha256C9702741CDCAAEEC73C7D85C22028623D7E2D3FE24457455FA6299B1367D20A1
services.modules.tls.precertfalse
services.modules.tls.rawMIIC0DCCAbigAwIBAgIUAnyWJ1M9LxzES0rCG/O2OgOtDYkwDQYJKoZIhvcNAQELBQAwETEPMA0GA1UEAwwGZnRwbmV3MB4XDTI0MDUxMTEyMjgyMVoXDTM0MDUwOTEyMjgyMVowETEPMA0GA1UEAwwGZnRwbmV3MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyrh/+5H5lbcLJL+7gtwpwm33JtOpBI31i4rsioHJOrh+fJ4XAKqGFfBxRCiz3ZH55Xr2A+cm/6PRuYsBQRhZGs1Rl8VCeSW9b9W15xUN0OskXOkdWGFWRLv/nmyIDCeGA/QZx6e3fwYh/PGtTVyiKaGaN7PW0CtqtybIMyB7uzYTL0K3ihUFZimhrD5IXndNdmA9u7RL1NDeOZ8CmJCxxIWG2XjSWKlh9jpObdGE54llzaNMdFUo+pIzmpwiCh52yeigCM7lqcebtLPzYuuZ8mFuCPy9na8VGnkicwZSf1UYSASg7+wbXjkUpl70wLah8mvByEB7Ai7yfA8wSXCMAwIDAQABoyAwHjAJBgNVHRMEAjAAMBEGA1UdEQQKMAiCBmZ0cG5ldzANBgkqhkiG9w0BAQsFAAOCAQEAL/MDrAnLBSlBbR9+39gIFJRFq1MANcCNNn77jXbGxFLRUHqjQfSLffM+TwrRF8J4kyvojNvYzAMOjyyNuVIvKhbo1icahfZZ3vCHBYPnuWbYKZQvNY8R5r4H3uf4UhrdGMqwY9uNMSwkZtaqpwEx2tmZLsMgT2y8s9kKfPdI+zRbxD5BNshK+mpI9Iz2Jv/HIiMaM2X77y7EXy1ljIo8y9hekRHQ9ZlikHR3/qVAc9jWH9Gw5G1iyGLLp60Klgvs6kqA3gZDk0/WPpR4Jqj2fIWLxXxmf2IY9T0vBjPi8OQrZYDWpbRKytCeB7AceClQC0Q8e81juTJGO9dIkbmSag==
services.softwares.uricpe:/a:apache:http_server:2.4.41
services.softwares.parta
services.softwares.vendorapache
services.softwares.producthttp_server
services.softwares.version2\.4\.41
services.softwares.languageANY
services.softwares.editionANY
services.softwares.updateANY
services.cve.idCVE-2006-20001
services.cve.score7.5
services.cve.severityhigh
services.cve.idCVE-2019-17567
services.cve.score5.3
services.cve.severitymedium
services.cve.idCVE-2020-11984
services.cve.score9.8
services.cve.severitycritical
services.modules.http.body<!DOCTYPE html> <html> <head> <script> window.location.href="index.php"; </script> <meta http-equiv="refresh" content="0; URL=index.php"> </head> </html>
services.modules.http.body_murmur823453261
services.modules.http.body_sha2564160646227dae822daaef50e84289e8b9b9b3b8ea6f3bed68cd3fb36ea3469bc
services.modules.http.content_length-1
services.modules.http.protocolHTTP/1.1
services.modules.http.request.methodGET
services.modules.http.request.url.host182.74.21.29
services.modules.http.request.url.schemehttp
services.modules.http.status_code200
services.modules.http.body <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <!-- Modified from the Debian original for Ubuntu Last updated: 2016-11-16 See: https://launchpad.net/bugs/1288690 --> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>Apac...
services.modules.http.body_murmur1845118841
services.modules.http.body_sha256b663321ab439cc53a329ee352c1b855d9998d3af95524a05795a88b42a9acf07
services.modules.http.content_length-1
services.modules.http.protocolHTTP/1.1
services.modules.http.request.methodGET
services.modules.http.request.url.host182.74.21.29
services.modules.http.request.url.schemehttps
services.modules.http.status_code200
services.modules.http.titleApache2 Ubuntu Default Page: It works