182.78.205.134
{
"scan_id": 1764431206,
"ip": "182.78.205.134",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.78.204.0/22",
"postal_code": "110020",
"coordinates": {
"latitude": "28.6327",
"longitude": "77.2198"
},
"geo_point": "28.6327, 77.2198",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "New Delhi"
},
"location_updated_at": "2025-12-02T16:48:27Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.78.204.0/23",
"organization": "Bharti Airtel Limited",
"descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-12-02T16:48:27Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-12-02T23:43:32Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-12-02T16:48:27Z"
}
],
"services": [
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Linux telnetd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"telnet": {
"banner": "\r\n****************************************************************************\r\nTHIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY\r\n USERS HAVE NO EXPLICT OR IMPLICIT EXPECTATIONS OF PRIVACY.\r\n ANY OR ALL USE OF THIS SYSTEM AND ALL FILES ON THIS SYSTEM\r\nMAY BE INTERCEPTED,MONITORED, RECORDED, COPIED, AUDITED,\r\nINSPECTED, AND DISCLOSED TO THE NECESSARY AUTHORITIES. BY\r\nUSING THIS SYSTEM, THE USER CONSENTS TO SUCH INTERCEPTION.\r\nUNAUTHORIZED OR IMPROPER USE, OR ATTEMPTED USE, OF THIS\r\nSYSTEM MAY RESULT IN ADMINISTRATIVE DISCIPLINARY ACTION AND\r\nCIVIL AND CRIMINAL PENALTIES. BY CONTINUING TO USE THIS SYSTEM\r\nYOU INDICATE YOUR AWARENESS OF, AND CONSENT TO THESE TERMS\r\nAND CONDITIONS OF USE. LOG OFF IMMEDIATELY IF YOU DO NOT AGREE\r\nTO THE CONDITIONS THAT ARE STATED IN THIS WARNING.\r\n************************************************************************* \r\n(Press 'a' to accept):"
}
},
"cve": [
{
"id": "CVE-1999-0431",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-0656",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1285",
"score": 2.1,
"severity": "low"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-29T01:06:51.618Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html lang=\"en\" class=\"main-app\">\n <head>\n <meta charset=\"UTF-8\">\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=8; IE=EDGE\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <meta name=\"apple-itunes-app\" content=\"app-id=1157004084, app-argument={{::host_addr}}\">\n <base href=\"/ng/\">\n <title ng-bind=\"::state.model_name + ' - ' + state.hostname\"></title>\n\n <script>\n function login_redirect() {\n 'use strict';\n var url = window.location.pathname + window.location.search + window.location.hash;\n window.location.href = '/logout?redir=' + encodeURIComponent(url);\n }\n\n /**\n * Install a global error handler which can be used to report JS errors back to the\n * FortiGate for inclusion in the httpsd debug log.\n *\n * The global error handler is loaded here because:\n * - It needs to be set prior to the other scripts loading.\n * - If it's installed in the context of another script, the error reporting only\n * applies to script errors in that script file (i.e. fweb_all.js).\n */\n window.onerror = function(message, source, lineno, colno, error) {\n 'use strict';\n if (fweb && fweb.log && fweb.log.error) {\n fweb.log.error(error);\n }\n };\n window.onunhandledrejection = function(rejectionEvent) {\n 'use strict';\n if (fweb && fweb.log && fweb.log.warn) {\n fweb.log.warn(`Unhandled promise rejection: \"${rejectionEvent.reason}\"`);\n }\n }\n </script>\n\n <!-- If we fail to load any of these scripts then redirect to the login page. Note that\n these checks alone are not sufficient as they may be cached. Similiar logic exists\n in requireJS, $http interceptor, and jQuery.ajax -->\n\n <script src=\"/dd195f29174a2468987ae5df86784c3d/ng/ng.bundle.js\" onerror=\"login_redirect()\"></script>\n </head>\n <body class=\"ng-cloak\" ng-controller=\"App\">\n <f-header haSync=\"haSync\" currentVdom=\"currentVdom\"\n ng-if=\"!guestAdmin && !structure.isViewOnly && !structure.isFullscreen\"></f-header>\n <f-guest-header ng-if=\"guestAdmin && !structure.isViewOnly && !structure.isFullscreen\"></f-guest-header>\n\n <f-disconnection-notice></f-disconnection-notice>\n <f-shortcuts-help></f-shortcuts-help>\n <f-firmware-upgrade></f-firmware-upgrade>\n <f-terminal></f-terminal>\n <f-release-overview></f-release-overview>\n <f-debugger-capture-notice></f-debugger-capture-notice>\n\n <f-navbar-view-section id=\"navbar-view-section\">\n </f-navbar-view-section>\n </body>\n</html>\n",
"body_murmur": 390931134,
"body_sha256": "139dcb3dd29b1727eb6ee73f90dcc674ec148c2f09d009411aaa94a13fdabde5",
"content_length": -1,
"favicon": {
"md5_hash": "e462005902f81094ab3de44e4381de19",
"murmur_hash": 945408572,
"path": "https://182.78.205.134:443/favicon.ico",
"size": 318
},
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-cache"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Dec 2025 17:15:58 GMT"
],
"last_modified": [
"Thu, 29 Jul 2021 23:34:56 GMT"
],
"strict_transport_security": [
"max-age=15552000"
],
"vary": [
"Accept-encoding"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>302 Found</title>\n</head><body>\n<h1>Found</h1>\n<p>The document has moved <a href=\"https://182.78.205.134/ng\">here</a>.</p>\n</body></html>\n",
"body_murmur": -1879077708,
"body_sha256": "89306f21402dc097ca87712f77b877f14e38aa0f44b84871dfedf7dd03dc4912",
"content_length": 209,
"headers": {
"content_length": [
"209"
],
"content_security_policy": [
"frame-ancestors 'self'"
],
"content_type": [
"text/html; charset=iso-8859-1"
],
"date": [
"Tue, 02 Dec 2025 17:15:57 GMT"
],
"location": [
"https://182.78.205.134/ng"
],
"strict_transport_security": [
"max-age=15552000"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "https://182.78.205.134/ng",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Found"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://182.78.205.134"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.78.205.134",
"path": "/ng",
"scheme": "https"
}
},
"status_code": 200
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
}
},
"fingerprint_md5": "6AAA601BBE0EB82725CB68430AD1E4F8",
"fingerprint_sha1": "4FA6907E74DF04B5E0AF6CDE8BE502F9E2B1B586",
"fingerprint_sha256": "E75131858C1057282F6F25AABFDE81C7665E4C92D7D8EA5214F38AF45F46DA60",
"issuer": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"issuer_dn": "/O=Fortinet Ltd./CN=FortiGate",
"jarm": "07d0bd0fd21d21d07c42d43d0000009424803a662b126a748cf4f90707a33c",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1316109919358470785",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"FortiGate"
],
"organization": [
"Fortinet Ltd."
]
},
"subject_alt_name": {
"dns_names": [
"FortiGate"
],
"extended_dns_names": []
},
"subject_dn": "/O=Fortinet Ltd./CN=FortiGate",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "28ea15b8b2f4248fbf688702f77244aa0ab2083e9bd707efead2b1a444346874",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "6e57bd8146e415902336fcb13676c68a2906c8c3d609e94114b659e76f013936",
"validation_level": "OV",
"validity": {
"length_seconds": 71280000,
"not_after": "2027-11-18T13:40:47",
"not_before": "2025-08-15T13:40:47"
},
"version": 2
},
"fingerprint_sha256": "E75131858C1057282F6F25AABFDE81C7665E4C92D7D8EA5214F38AF45F46DA60",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"url": "https://182.78.205.134/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-03T05:17:06.415Z"
}
],
"services_hash": "88f913cd86036c1bb9cd68b399a23000622d07634c61670a42f797f725686377",
"last_updated_at": "2025-12-03T05:17:06.415Z",
"banner": [
"http",
"tls",
"telnet"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"23/telnet"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"23/telnet"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"23/telnet"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
}
}
}