182.74.21.29
| ip | 182.74.21.29 |
| is_ipv4 | true |
| is_ipv6 | false |
| location.network | 182.74.21.0/24 |
| location.postal_code | 122016 |
| location.coordinates.latitude | 28.4597 |
| location.coordinates.longitude | 77.0282 |
| location.geo_point | 28.4597, 77.0282 |
| location.locale_code | en |
| location.continent | Asia |
| location.country_code | IN |
| location.country_name | India |
| location.city | Gurugram |
| location_updated_at | 2025-12-08T00:43:35Z |
| asn.number | AS9498 |
| asn.organization | BHARTI Airtel Ltd. |
| asn_updated_at | 0001-01-01T00:00:00Z |
| whois_updated_at | 2024-12-09T11:26:56Z |
| last_updated_at | 2025-12-08T12:14:50.962Z |
| is_vuln | true |
| whois.network | 182.74.21.0/24 |
| whois.organization | BHARTI-IN |
| whois.descr | BHARTI-IN, Bharti Airtel Limited, Class A ISP in INDIA ., Plot No. CP-5,sector-8,, IMT Manesar, INDIA |
| tags.name | is_anonymous_proxy |
| tags.pretty_name | Anonymous Proxy |
| tags.value | false |
| tags.last_updated_at | 2025-12-08T00:43:35Z |
| tags.name | is_cdn |
| tags.pretty_name | CDN |
| tags.value | false |
| tags.last_updated_at | 2025-12-08T03:17:22Z |
| tags.name | is_satellite_provider |
| tags.pretty_name | Satellite Provider |
| tags.value | false |
| tags.last_updated_at | 2025-12-08T00:43:35Z |
| services.port | 80 |
| services.protocol | tcp |
| services.name | http |
| services.version | 2.4.41 |
| services.product | Apache httpd |
| services.extra_info | (Ubuntu) |
| services.url | http://182.74.21.29/ |
| services.last_updated_at | 2025-12-08T12:14:50.962Z |
| services.port | 443 |
| services.protocol | tcp |
| services.name | http |
| services.version | 2.4.41 |
| services.product | Apache httpd |
| services.extra_info | (Ubuntu) |
| services.tunnel | ssl |
| services.url | https://182.74.21.29/ |
| services.last_updated_at | 2025-12-08T03:00:53.084Z |
| services.port | 5060 |
| services.protocol | tcp |
| services.name | unknown |
| services.last_updated_at | 2025-12-06T23:53:16.389Z |
| services.softwares.uri | cpe:/a:apache:http_server:2.4.41 |
| services.softwares.part | a |
| services.softwares.vendor | apache |
| services.softwares.product | http_server |
| services.softwares.version | 2\.4\.41 |
| services.softwares.language | ANY |
| services.softwares.edition | ANY |
| services.softwares.update | ANY |
| services.cve.id | CVE-2006-20001 |
| services.cve.score | 7.5 |
| services.cve.severity | high |
| services.cve.id | CVE-2019-17567 |
| services.cve.score | 5.3 |
| services.cve.severity | medium |
| services.cve.id | CVE-2020-11984 |
| services.cve.score | 9.8 |
| services.cve.severity | critical |
| services.modules.tls.certificate.extensions.basic_constraints.is_ca | true |
| services.modules.tls.certificate.fingerprint_md5 | FA1D8FD9EA42A356DA2128F4CFE48C24 |
| services.modules.tls.certificate.fingerprint_sha1 | DB91F03CEBE0655F97CF25CE9CCBEA5BB51ECF0A |
| services.modules.tls.certificate.fingerprint_sha256 | C9702741CDCAAEEC73C7D85C22028623D7E2D3FE24457455FA6299B1367D20A1 |
| services.modules.tls.certificate.issuer_dn | /CN=ftpnew |
| services.modules.tls.certificate.jarm | 07d19d1ad21d21d00042d43d00000076e5b3c488a88e5790970b78ffb8afc2 |
| services.modules.tls.certificate.redacted | false |
| services.modules.tls.certificate.revocation.ocsp.reason | UNKNOWN |
| services.modules.tls.certificate.revocation.ocsp.revoked | false |
| services.modules.tls.certificate.serial_number | 14196354170811159582522433839464119205685431689 |
| services.modules.tls.certificate.signature.algorithm.name | SHA256-RSA |
| services.modules.tls.certificate.signature.algorithm.oid | 1.2.840.113549.1.1.11 |
| services.modules.tls.certificate.signature.self_signed | true |
| services.modules.tls.certificate.signature.value | MmZmMzAzYWMwOWNiMDUyOTQxNmQxZjdlZGZkODA4MTQ5NDQ1YWI1MzAwMzVjMDhkMzY3ZWZiOGQ3NmM2YzQ1MmQxNTA3YWEzNDFmNDhiN2RmMzNlNGYwYWQxMTdjMjc4OTMyYmU4OGNkYmQ4Y2MwMzBlOGYyYzhkYjk1MjJmMmExNmU4ZDYyNzFhODVmNjU5ZGVmMDg3MDU4M2U3Yjk2NmQ4Mjk5NDJmMzU4ZjExZTZiZTA3ZGVlN2Y4NTIxYWRkMThjYWIwNjNkYjhkMzEyYzI0NjZkNmFhYTcwMTMxZGFkOTk5MmVjMzIwNGY2Y2JjYjNkOTBhN2NmNzQ4ZmIzNDViYzQzZTQxMzZjODRhZmE2YTQ4ZjQ4Y2Y2MjZmZmM3MjIyMzFhMzM2NWZiZWYyZWM0NWYyZDY1OGM4YTNjY2JkODVlOTExMWQwZjU5OTYyOTA3NDc3ZmVhNTQwNzNkOGQ2MWZkMWIwZTQ2ZDYyYzg2MmNiYTdhZDBhOTYwYmVjZWE0YTgwZGUwNjQzOTM0ZmQ2M2U5NDc4MjZhOGY2N2M4NThiYzU3YzY2N2Y2MjE4ZjUzZDJmMDYzM2UyZjBlNDJiNjU4MGQ2YTViNDRhY2FkMDllMDdiMDFjNzgyOTUwMGI0NDNjN2JjZDYzYjkzMjQ2M2JkNzQ4OTFiOTkyNmE= |
| services.modules.tls.certificate.subject_dn | /CN=ftpnew |
| services.modules.tls.certificate.subject_key_info._key | rsa |
| services.modules.tls.certificate.subject_key_info.fingerprint_sha256 | 5bc952e6cb08e81695f63bde8cd2590449db43895a208f1182791970770a707c |
| services.modules.tls.certificate.subject_key_info.key_algorithm | RSA |
| services.modules.tls.certificate.subject_key_info.rsa.exponent | 65537 |
| services.modules.tls.certificate.subject_key_info.rsa.length | 2048 |
| services.modules.tls.certificate.subject_key_info.rsa.modulus | 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 |
| services.modules.tls.certificate.tbs_fingerprint | 7cbe79ad875b640872c5dc1d84ed3877df85d54fe93bba78195a69cc23894447 |
| services.modules.tls.certificate.validation_level | DV |
| services.modules.tls.certificate.validity.length_seconds | 315360000 |
| services.modules.tls.certificate.validity.not_after | 2034-05-09T12:28:21 |
| services.modules.tls.certificate.validity.not_before | 2024-05-11T12:28:21 |
| services.modules.tls.certificate.version | 2 |
| services.modules.tls.fingerprint_sha256 | C9702741CDCAAEEC73C7D85C22028623D7E2D3FE24457455FA6299B1367D20A1 |
| services.modules.tls.precert | false |
| services.modules.tls.raw | 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 |
| services.softwares.uri | cpe:/a:apache:http_server:2.4.41 |
| services.softwares.part | a |
| services.softwares.vendor | apache |
| services.softwares.product | http_server |
| services.softwares.version | 2\.4\.41 |
| services.softwares.language | ANY |
| services.softwares.edition | ANY |
| services.softwares.update | ANY |
| services.cve.id | CVE-2006-20001 |
| services.cve.score | 7.5 |
| services.cve.severity | high |
| services.cve.id | CVE-2019-17567 |
| services.cve.score | 5.3 |
| services.cve.severity | medium |
| services.cve.id | CVE-2020-11984 |
| services.cve.score | 9.8 |
| services.cve.severity | critical |
| services.modules.http.body | <!DOCTYPE html> <html> <head> <script> window.location.href="index.php"; </script> <meta http-equiv="refresh" content="0; URL=index.php"> </head> </html> |
| services.modules.http.body_murmur | 823453261 |
| services.modules.http.body_sha256 | 4160646227dae822daaef50e84289e8b9b9b3b8ea6f3bed68cd3fb36ea3469bc |
| services.modules.http.content_length | -1 |
| services.modules.http.protocol | HTTP/1.1 |
| services.modules.http.request.method | GET |
| services.modules.http.request.url.host | 182.74.21.29 |
| services.modules.http.request.url.scheme | http |
| services.modules.http.status_code | 200 |
| services.modules.http.body | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <!-- Modified from the Debian original for Ubuntu Last updated: 2016-11-16 See: https://launchpad.net/bugs/1288690 --> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>Apac... |
| services.modules.http.body_murmur | 1845118841 |
| services.modules.http.body_sha256 | b663321ab439cc53a329ee352c1b855d9998d3af95524a05795a88b42a9acf07 |
| services.modules.http.content_length | -1 |
| services.modules.http.protocol | HTTP/1.1 |
| services.modules.http.request.method | GET |
| services.modules.http.request.url.host | 182.74.21.29 |
| services.modules.http.request.url.scheme | https |
| services.modules.http.status_code | 200 |
| services.modules.http.title | Apache2 Ubuntu Default Page: It works |