182.77.62.165
{
"scan_id": 1764431206,
"ip": "182.77.62.165",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.77.60.0/22",
"postal_code": "110091",
"coordinates": {
"latitude": "28.5759",
"longitude": "77.3345"
},
"geo_point": "28.5759, 77.3345",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "Noida"
},
"location_updated_at": "2025-11-28T12:42:26Z",
"asn": {
"number": "AS24560",
"organization": "Bharti Airtel Ltd., Telemedia Services",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.77.0.0/18",
"organization": "BNLD-NewDelhi",
"descr": "BNLD-NewDelhi,\nBHARTI TELENET LTD. NEW DELHI,\nClass A ISP in INDIA .,\n234 , OKHLA PHASE III ,,\nNEW DELHI,\nINDIA",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:58Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-11-28T12:42:26Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-11-28T15:18:24Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-11-28T12:42:26Z"
}
],
"hostnames": [
{
"name": "abts-del-dynamic-165.62.77.182.airtelbroadband.in",
"last_updated_at": "2025-12-01T18:15:17.303121849Z"
}
],
"services": [
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "OpenWrt uHTTPd",
"extra_info": "TP-LINK router http config",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:openwrt:uhttpd",
"part": "a",
"vendor": "openwrt",
"product": "uhttpd",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.1//EN\" \"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n<head>\n<meta http-equiv=\"refresh\" content=\"0; URL=/webpages/login.html\" />\n</head>\n</html>\n",
"body_murmur": -1556307622,
"body_sha256": "48a03d34cd054af67789e11a78f00c49e25c32b34295748b2058622a56e77883",
"content_length": -1,
"headers": {
"connection": [
"Keep-Alive"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 01 Dec 2025 07:37:11 GMT"
],
"etag": [
"\"dd4-110-6078085f\""
],
"last_modified": [
"Thu, 15 Apr 2021 09:33:19 GMT"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=20"
]
}
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.77.62.165",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"fingerprint_md5": "F7B856E2BF2AFB0873EC83AA399FD6AD",
"fingerprint_sha1": "B22D22B0724DB69CF4A6A90198E48AE5E6CA1328",
"fingerprint_sha256": "E8694C7A9BCF70E532CA8A37991C434F5832BB3780DFEBFEDDAA9F7E514AF32D",
"issuer": {
"common_name": [
"TP-Link"
],
"country": [
"CN"
],
"locality": [
"ShenZhen"
],
"province": [
"ShenZhen"
]
},
"issuer_dn": "/C=CN/ST=ShenZhen/L=ShenZhen/CN=TP-Link",
"jarm": "04d02d00004d04d00004d02d04d04d6b64279c20472e17718ddea38ab610fa",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "-1171876855",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "Njc5ZmYwNzc4MWQ2Nzg4ZDM4ODdhY2MyNGVjNTExNDZmNGFlNTBiYmRmNWY4NjkwNjdjOGIxMTlmYzlmYTA2OTdhZjRlMGE1NTM2M2RmZWZkNmU0MDQ4MWViMDVhNzlhZDZlNDZlMWI2MDFiNWM3OTRkMDk5ZjM3NGJjYmEwMmE2MmMxNjczNmJiNWRiZmY0MGE1YmU2NTlkMTMzZGNkZDU3NGRkMmYzMGVmMTk5OTIxNTNjMjlkOGNlMTE2OGQyZWI0ZmJlYzVkZjI1NjIxMjcyNzY1ZmE5MWQ3MjM4OGM1NTNkNGQwNWNlMjg2ZmEwZGVlYWU2YjUzYzUwODIzOA=="
},
"subject": {
"common_name": [
"TP-Link"
],
"country": [
"CN"
],
"locality": [
"ShenZhen"
],
"province": [
"ShenZhen"
]
},
"subject_alt_name": {
"dns_names": [
"TP-Link"
],
"extended_dns_names": []
},
"subject_dn": "/C=CN/ST=ShenZhen/L=ShenZhen/CN=TP-Link",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "af7081e4a2870ac74789a2cf2f6860265fe57ab79b91d793aade8ba139df1c8a",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 1024,
"modulus": "MHhiY2QwNmU0MDhiZDNiNDRkNDJlY2EyM2E3NDJhZjk0Njk3ZmU1ZWY3MzJhZGFiODk5ZDhkZmY0ZjIzY2MxYWE1Mjg0N2QxNGM2MTliMDVmYWYwOTA0MTg4MmYyMTVmZmYyM2JjOGM1NDViZmY5ZTBjY2NmODM1NmI5NDM5MmRjM2QxMzQ1MWQzMjIzMzBjNTNkN2ZkYTdiNjcxZGI5YjZkZjczNDI2MjUxYjQ2YmQ1YzhkZGQxZjJiYjc4ZTNiNzU1OTc3NjkzZGQyYzg4NDU1NWY4NzdiNjFkOWRlMmZkMjc2MjAyMzY1NjU0NTIwNTI4YjA4YTlmNGIxYmM3YTI3"
}
},
"tbs_fingerprint": "1ff456c2b85e50b23b2ee7282ed8a8b98130bbc8cac7f46a8d819f38dba09f84",
"validation_level": "OV",
"validity": {
"length_seconds": 622080000,
"not_after": "2037-09-18T08:00:24",
"not_before": "2018-01-01T08:00:24"
},
"version": 2
},
"fingerprint_sha256": "E8694C7A9BCF70E532CA8A37991C434F5832BB3780DFEBFEDDAA9F7E514AF32D",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"url": "https://182.77.62.165/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-01T17:47:56.707Z"
},
{
"port": 8000,
"protocol": "tcp",
"name": "ipcam",
"version": "",
"product": "Hikvision IPCam control port",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-01T14:40:12.923Z"
},
{
"port": 8080,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-26T06:29:37.093Z"
}
],
"services_hash": "0d52269a4939a6f27bf561e32bf6d84ef807f64f1e9b0dc4e31fdb17a2dfebde",
"last_updated_at": "2025-12-01T17:47:56.707Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"443/http"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"443/http"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"443/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"443/http"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"443/http"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"443/http"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}