Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.78.64.194

SummaryCVE DetailsRaw Data
07 Dec 2025, 09:05:29 UTC
{
  "scan_id": 1764908879,
  "ip": "182.78.64.194",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.78.64.0/21",
    "postal_code": "110001",
    "coordinates": {
      "latitude": "28.6542",
      "longitude": "77.2373"
    },
    "geo_point": "28.6542, 77.2373",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "IN",
    "country_name": "India",
    "city": "Delhi"
  },
  "location_updated_at": "2025-12-07T00:43:07Z",
  "asn": {
    "number": "AS9498",
    "organization": "BHARTI Airtel Ltd.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.78.64.0/22",
    "organization": "Bharti Airtel Limited",
    "descr": "Bharti Airtel Limited,\nTransport Network Group,\n234, Okhla Phase III",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:27:59Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-12-07T00:43:07Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-12-07T01:26:23Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-12-07T00:43:07Z"
    }
  ],
  "services": [
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "",
      "product": "Cisco IOS http config",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/o:cisco:ios",
          "part": "o",
          "vendor": "cisco",
          "product": "ios",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 819126370,
          "body_sha256": "86490d6ba848555b8970a0871a4da11a0dc43efa3492fb0902f65d52247712b9",
          "content_length": -1,
          "headers": {
            "accept_ranges": [
              "none"
            ],
            "date": [
              "Sun, 07 Dec 2025 09:05:50 GMT"
            ],
            "server": [
              "cisco-IOS"
            ],
            "strict_transport_security": [
              "max-age=7884000"
            ],
            "www_authenticate": [
              "Basic realm=\"level_15 or view_access\""
            ],
            "x_content_type_options": [
              "nosniff"
            ],
            "x_frame_options": [
              "SAMEORIGIN"
            ],
            "x_xss_protection": [
              "1; mode=block"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 401
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_key_id": "7c4edd21fc994d1bfca4febe960fdf4b0186355c",
              "basic_constraints": {
                "is_ca": true
              },
              "subject_key_id": "7c4edd21fc994d1bfca4febe960fdf4b0186355c"
            },
            "fingerprint_md5": "8D671D6B5C65A0548C8BCFB359A9BA77",
            "fingerprint_sha1": "7CFCF6C0827978E6596E0D54AB97EE7751AB9032",
            "fingerprint_sha256": "A934B48DA2A1188839032F88C870218074AED740AB94120A1C253F49443A2286",
            "issuer": {
              "common_name": [
                "IOS-Self-Signed-Certificate-1164537710"
              ]
            },
            "jarm": "07d14d16d21d21d07c07d14d07d21df81841108a56803289beb36a0dd595dc",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1",
            "signature": {
              "algorithm": {
                "name": "SHA1-RSA",
                "oid": "1.2.840.113549.1.1.5"
              },
              "self_signed": true
            },
            "subject": {
              "common_name": [
                "IOS-Self-Signed-Certificate-1164537710"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "IOS-Self-Signed-Certificate-1164537710"
              ],
              "extended_dns_names": []
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "fe6cad4b36b3edd76eb6f22197b6ff08781840da4b1c50fbb78022bc7e29d317",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 1024
              }
            },
            "tbs_fingerprint": "adb6bb06e4d92d76f7a8abbd70d70fe6ae0a96449c0343cdd9c4888850fbed45",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 205511800,
              "not_after": "2030-01-01T00:00:00",
              "not_before": "2023-06-28T09:23:15"
            },
            "version": 2
          },
          "fingerprint_sha256": "A934B48DA2A1188839032F88C870218074AED740AB94120A1C253F49443A2286",
          "precert": false,
          "tags": [
            "dv",
            "trusted",
            "self_signed",
            "root"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-1999-1306",
          "severity": "high"
        }
      ],
      "url": "https://182.78.64.194/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-12-07T09:05:29.945Z"
    }
  ],
  "services_hash": "aac2f30f7bbb62df3c28edd562ac459c9138ce3f0c8aee8e0b1d923c9ec946fa",
  "last_updated_at": "2025-12-07T09:05:29.945Z",
  "banner": [
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-1999-1306": {
      "id": "CVE-1999-1306",
      "references": [
        "http://www.cert.org/advisories/CA-1992-20.html"
      ],
      "score": 7.5,
      "services": [
        "443/http"
      ],
      "severity": "high",
      "summary": "Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-Other"
    }
  }
}