182.78.64.194
{
"scan_id": 1764908879,
"ip": "182.78.64.194",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "182.78.64.0/21",
"postal_code": "110001",
"coordinates": {
"latitude": "28.6542",
"longitude": "77.2373"
},
"geo_point": "28.6542, 77.2373",
"locale_code": "en",
"continent": "Asia",
"country_code": "IN",
"country_name": "India",
"city": "Delhi"
},
"location_updated_at": "2025-12-07T00:43:07Z",
"asn": {
"number": "AS9498",
"organization": "BHARTI Airtel Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "182.78.64.0/22",
"organization": "Bharti Airtel Limited",
"descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:27:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-12-07T00:43:07Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-12-07T01:26:23Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-12-07T00:43:07Z"
}
],
"services": [
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Cisco IOS http config",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/o:cisco:ios",
"part": "o",
"vendor": "cisco",
"product": "ios",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body_murmur": 819126370,
"body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
"content_length": -1,
"headers": {
"accept_ranges": [
"none"
],
"date": [
"Sun, 07 Dec 2025 09:05:50 GMT"
],
"server": [
"cisco-IOS"
],
"strict_transport_security": [
"max-age=7884000"
],
"www_authenticate": [
"Basic realm=\"level_15 or view_access\""
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"status_code": 401
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "7c4edd21fc994d1bfca4febe960fdf4b0186355c",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "7c4edd21fc994d1bfca4febe960fdf4b0186355c"
},
"fingerprint_md5": "8D671D6B5C65A0548C8BCFB359A9BA77",
"fingerprint_sha1": "7CFCF6C0827978E6596E0D54AB97EE7751AB9032",
"fingerprint_sha256": "A934B48DA2A1188839032F88C870218074AED740AB94120A1C253F49443A2286",
"issuer": {
"common_name": [
"IOS-Self-Signed-Certificate-1164537710"
]
},
"jarm": "07d14d16d21d21d07c07d14d07d21df81841108a56803289beb36a0dd595dc",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1",
"signature": {
"algorithm": {
"name": "SHA1-RSA",
"oid": "1.2.840.113549.1.1.5"
},
"self_signed": true
},
"subject": {
"common_name": [
"IOS-Self-Signed-Certificate-1164537710"
]
},
"subject_alt_name": {
"dns_names": [
"IOS-Self-Signed-Certificate-1164537710"
],
"extended_dns_names": []
},
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "fe6cad4b36b3edd76eb6f22197b6ff08781840da4b1c50fbb78022bc7e29d317",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 1024
}
},
"tbs_fingerprint": "adb6bb06e4d92d76f7a8abbd70d70fe6ae0a96449c0343cdd9c4888850fbed45",
"validation_level": "DV",
"validity": {
"length_seconds": 205511800,
"not_after": "2030-01-01T00:00:00",
"not_before": "2023-06-28T09:23:15"
},
"version": 2
},
"fingerprint_sha256": "A934B48DA2A1188839032F88C870218074AED740AB94120A1C253F49443A2286",
"precert": false,
"tags": [
"dv",
"trusted",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-1306",
"severity": "high"
}
],
"url": "https://182.78.64.194/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-12-07T09:05:29.945Z"
}
],
"services_hash": "aac2f30f7bbb62df3c28edd562ac459c9138ce3f0c8aee8e0b1d923c9ec946fa",
"last_updated_at": "2025-12-07T09:05:29.945Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-1306": {
"id": "CVE-1999-1306",
"references": [
"http://www.cert.org/advisories/CA-1992-20.html"
],
"score": 7.5,
"services": [
"443/http"
],
"severity": "high",
"summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-Other"
}
}
}