182.78.209.254
{
"scan_id": 1751324060,
"ip": "182.78.209.254",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.78.208.0/22",
"postal_code": "122018",
"coordinates": {
"latitude": "28.4597",
"longitude": "77.0282"
},
"geo_point": "28.4597, 77.0282",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "Gurugram"
},
"location_updated_at": "2025-07-02T00:43:55Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.78.208.0/22",
"organization": "Bharti Airtel Limited",
"descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-07-02T00:43:55Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-07-02T01:47:54Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-07-02T00:43:55Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "1.25",
"product": "Cisco SSH",
"extra_info": "protocol 1.99",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:cisco:ssh:1.25",
"part": "a",
"vendor": "cisco",
"product": "ssh",
"version": "1\\.25",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-1.99-Cisco-1.25",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"client_to_server_compression": [
"none"
],
"client_to_server_macs": [
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"host_key_algorithms": [
"ssh-rsa"
],
"kex_algorithms": [
"diffie-hellman-group-exchange-sha1",
"diffie-hellman-group14-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "0a6c01bf933162a5ecb333e1d78e6c8bf36aeb301c38b1e068052fcf33269750",
"raw": "AAAAB3NzaC1yc2EAAAADAQABAAAAgQC5p8CrRW7u4JIfe9gBoQDGWUmNzXccYumblbIlCik8ON8S7IqWNg9FIhKL1hGOwKwecDXlhVmzPw9eSuBdimOzirkxwSbHj/KCGkt5yVtvwnaBh/NNeaNymjYw4y7zUKOblwlkYBHXK0qitrbp70vTIeDs8hudmTzsL4pPEyinxQ=="
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr"
],
"server_to_client_compression": [
"none"
],
"server_to_client_macs": [
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1",
"hmac-sha1-96"
],
"software": "Cisco-1.25",
"version": "1.99"
}
},
"cve": [
{
"id": "CVE-1999-1306",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-03T14:31:12.743Z"
},
{
"port": 23,
"protocol": "tcp",
"name": "telnet",
"version": "",
"product": "Cisco router telnetd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:cisco:telnet",
"part": "a",
"vendor": "cisco",
"product": "telnet",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"telnet": {
"banner": "\r\n *****************************************************************************\r\n THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY.\r\n\r\n USERS HAVE NO EXPLICT OR IMPLICIT EXPECTATIONS OF PRIVACY.\r\n ANY OR ALL USE OF THIS SYSTEM AND ALL FILES ON THIS SYSTEM\r\n MAY BE INTERCEPTED,MONITORED, RECORDED, COPIED, AUDITED,\r\n INSPECTED, AND DISCLOSED TO THE NECESSARY AUTHORITIES. BY\r\n USING THIS SYSTEM, THE USER CONSENTS TO SUCH INTERCEPTION.\r\n UNAUTHORIZED OR IMPROPER USE, OR ATTEMPTED USE, OF THIS\r\n SYSTEM MAY RESULT IN ADMINISTRATIVE DISCIPLINARY ACTION AND\r\n CIVIL AND CRIMINAL PENALTIES. BY CONTINUING TO USE THIS SYSTEM\r\n YOU INDICATE YOUR AWARENESS OF, AND CONSENT TO THESE TERMS\r\n AND CONDITIONS OF USE. LOG OFF IMMEDIATELY IF YOU DO NOT AGREE\r\n TO THE CONDITIONS THAT ARE STATED IN THIS WARNING.\r\n\r\n ****************************************************************************\r\n\r\n-----------------------------------------------------------------------\r\nCisco Configuration Professional (Cisco CP) is installed on this device.\r\nThis feature requires the one-time use of the username \"cisco\" with the \r\npassword \"cisco\". These default credentials have a privilege level of 15.\r\n \r\nYOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE\r\nPUBLICLY-KNOWN CREDENTIALS\r\n\r\nHere are the Cisco IOS commands.\r\n\r\nusername <myuser> privilege 15 secret 0 <mypassword>\r\nno username cisco\r\n\r\nReplace <myuser> and <mypassword> with the username and password you want \r\nto use. \r\n\r\nIF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL \r\nNOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.\r\n \r\nFor more information about Cisco CP please follow the instructions in the\r\nQUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp \r\n-----------------------------------------------------------------------\r\n\r\nusername: "
}
},
"cve": [
{
"id": "CVE-1999-1306",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-01T17:15:57.467Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Cisco IOS http config",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "401 Unauthorized\r\n",
"body_murmur": 819126370,
"body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
"content_length": -1,
"headers": {
"accept_ranges": [
"none"
],
"date": [
"Tue, 01 Jul 2025 06:09:51 GMT"
],
"server": [
"cisco-IOS"
],
"strict_transport_security": [
"max-age=7884000"
],
"www_authenticate": [
"Basic realm=\"level_15 or view_access\""
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "182.78.209.254",
"path": "",
"scheme": "https"
}
},
"status_code": 401
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "2ba727efc3272048361ddf1f173ea41de18352ac",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "2ba727efc3272048361ddf1f173ea41de18352ac"
},
"fingerprint_md5": "6528E7C8724847BABD390D2F71AAF36B",
"fingerprint_sha1": "8621EEA5088850DFE4C8A74827A56745852C9C16",
"fingerprint_sha256": "4888DA8609CB155F19D39FF0E0D1C790907C5C8A0E9731A6E15A856B7EC9E7EB",
"issuer": {
"common_name": [
"IOS-Self-Signed-Certificate-2494331153"
]
},
"issuer_dn": "/CN=IOS-Self-Signed-Certificate-2494331153",
"jarm": "07d14d16d21d21d07c07d14d07d21df81841108a56803289beb36a0dd595dc",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true,
"value": "NjAxZDQ1NmE0NGRhOGNjMDI0ODkyNDJlMjU4MDQ3OGEzMGNmMTNlMDRkNTMzNmM3YzFkNWRlN2I5NzIxM2Y3YmU4ZThmYjdiZDViNDc2ZjI4NGM2OTYyMjNkYjY3MWUxMjJhZmYwYjdhMzJjMzJmOWU1N2E3ZDE5NDYwYTE2Zjg0NjM3MjgyMzA2OWQxOWQxMWFmMzBiMGQ4MTAxMDYxZGY1M2EwOTJlMThlMGY4M2YwNjhhYzAzNGU3OTU1YTM2ZmZiYzM3NGZlYzY3YzJiOTNiMTQxZDJjNmZjN2UxYTU5Mjc0N2E4MGUwZTRkZmE2ZTlkOTRkMzIzYjAyMjY4MA=="
},
"subject": {
"common_name": [
"IOS-Self-Signed-Certificate-2494331153"
]
},
"subject_alt_name": {
"dns_names": [
"IOS-Self-Signed-Certificate-2494331153"
],
"extended_dns_names": []
},
"subject_dn": "/CN=IOS-Self-Signed-Certificate-2494331153",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e46a46c64025f34898fd60421faee7fbdc04084bed58bbba6ff38235f1a02d54",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 1024,
"modulus": "MHhiOWE3YzBhYjQ1NmVlZWUwOTIxZjdiZDgwMWExMDBjNjU5NDk4ZGNkNzcxYzYyZTk5Yjk1YjIyNTBhMjkzYzM4ZGYxMmVjOGE5NjM2MGY0NTIyMTI4YmQ2MTE4ZWMwYWMxZTcwMzVlNTg1NTliMzNmMGY1ZTRhZTA1ZDhhNjNiMzhhYjkzMWMxMjZjNzhmZjI4MjFhNGI3OWM5NWI2ZmMyNzY4MTg3ZjM0ZDc5YTM3MjlhMzYzMGUzMmVmMzUwYTM5Yjk3MDk2NDYwMTFkNzJiNGFhMmI2YjZlOWVmNGJkMzIxZTBlY2YyMWI5ZDk5M2NlYzJmOGE0ZjEzMjhhN2M1"
}
},
"tbs_fingerprint": "04db3484b0a1cfd12a8be2b17b7b77e6d73f4e1fffe2460d6da0352c9e91f953",
"validation_level": "DV",
"validity": {
"length_seconds": 225644450,
"not_after": "2030-01-01T00:00:00",
"not_before": "2022-11-07T08:59:17"
},
"version": 2
},
"fingerprint_sha256": "4888DA8609CB155F19D39FF0E0D1C790907C5C8A0E9731A6E15A856B7EC9E7EB",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-1306",
"score": 7.5,
"severity": "high"
}
],
"url": "https://182.78.209.254/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-07-01T06:09:56.498Z"
}
],
"services_hash": "133f5bc92afdcdad841856dbc161d70d2eb8192c7c0bd4115e420912ce3a2d61",
"last_updated_at": "2025-07-03T14:31:12.743Z",
"banner": [
"ssh",
"telnet",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-1306": {
"id": "CVE-1999-1306",
"references": [
"http://www.cert.org/advisories/CA-1992-20.html"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
}
}
}