72.240.67.226
{
"scan_id": 1767797164,
"ip": "72.240.67.226",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "72.240.66.0/23",
"postal_code": "43528",
"coordinates": {
"latitude": "41.6197",
"longitude": "-83.7282"
},
"geo_point": "41.6197, -83.7282",
"locale_code": "en",
"continent": "North America",
"country_code": "US",
"country_name": "United States",
"city": "Holland"
},
"location_updated_at": "2026-01-06T12:36:03Z",
"asn": {
"number": "AS13490",
"organization": "BUCKEYECABLEVISION",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "72.240.0.0/15",
"organization": "Buckeye Cablevision, Inc.",
"descr": "Buckeye Cablevision, Inc.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2025-02-04T15:07:07Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-01-06T12:36:03Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-01-06T12:51:43Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-01-06T12:36:03Z"
}
],
"hostnames": [
{
"name": "cm-72-240-67-226.buckeyecom.net",
"last_updated_at": "2026-01-06T12:51:43Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Versa Director",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "\n<HEAD>\n<meta HTTP-EQUIV=\"REFRESH\" content=\"0; url=/versa/\">\n</HEAD>\n",
"body_murmur": 1031638075,
"body_sha256": "4bed30cc3ea94e0c2e2bff2f56b1a8d02f0d4c59d99207da058170b54bd245e3",
"content_length": 69,
"favicon": {
"md5_hash": "4644f2d45601037b8423d45e13194c93",
"murmur_hash": -297069493,
"path": "http://72.240.67.226:80/favicon.ico",
"size": 21630
},
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate"
],
"content_length": [
"69"
],
"content_security_policy": [
"default-src 'self';font-src 'self' data: https://fonts.googleapis.com/ https://fonts.gstatic.com; script-src 'self' 'unsafe-eval' https://maps.google apis.com/maps/api/geocode/json https://maps.googleapis.com/* https://*.tile.openstreetmap.org/*;img-src 'self' data: https://maps.googleapis.com/maps/api/geocode/json https://maps.gstatic.com/ https:/ /maps.googleapis.com/ https://*.tile.openstreetmap.org https://chart.apis.google.com/; style-src 'self' 'unsafe-inline' data: https://maps.googleapis.com/maps/api/geocode/json https://*.tile.openstree tmap.org https://fonts.googleapis.com/;form-action 'self'; connect-src 'self' data: https://maps.googleapis.com https://*.tile.openstreetmap.org/ https://ipapi.co;"
],
"content_type": [
"text/html;charset=ISO-8859-1"
],
"date": [
"Thu, 08 Jan 2026 09:35:38 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Versa Director"
],
"set_cookie": [
"JSESSIONID=C3833C84D817F431F123B94A3E5B0475; Path=/; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=31536000; includeSubdomains; preload"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"DENY"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "72.240.67.226",
"path": "",
"scheme": "http"
}
},
"status_code": 200
}
},
"url": "http://72.240.67.226/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-08T09:35:39.342Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache Tomcat",
"extra_info": "language: en",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:tomcat",
"part": "a",
"vendor": "apache",
"product": "tomcat",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "\n<HEAD>\n<meta HTTP-EQUIV=\"REFRESH\" content=\"0; url=/versa/\">\n</HEAD>\n",
"body_murmur": 1031638075,
"body_sha256": "4bed30cc3ea94e0c2e2bff2f56b1a8d02f0d4c59d99207da058170b54bd245e3",
"content_length": 69,
"favicon": {
"md5_hash": "4644f2d45601037b8423d45e13194c93",
"murmur_hash": -297069493,
"path": "https://72.240.67.226:443/favicon.ico",
"size": 21630
},
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate"
],
"content_length": [
"69"
],
"content_security_policy": [
"default-src 'self';font-src 'self' data: https://fonts.googleapis.com/ https://fonts.gstatic.com; script-src 'self' 'unsafe-eval' https://maps.google apis.com/maps/api/geocode/json https://maps.googleapis.com/* https://*.tile.openstreetmap.org/*;img-src 'self' data: https://maps.googleapis.com/maps/api/geocode/json https://maps.gstatic.com/ https:/ /maps.googleapis.com/ https://*.tile.openstreetmap.org https://chart.apis.google.com/; style-src 'self' 'unsafe-inline' data: https://maps.googleapis.com/maps/api/geocode/json https://*.tile.openstree tmap.org https://fonts.googleapis.com/;form-action 'self'; connect-src 'self' data: https://maps.googleapis.com https://*.tile.openstreetmap.org/ https://ipapi.co;"
],
"content_type": [
"text/html;charset=ISO-8859-1"
],
"date": [
"Thu, 08 Jan 2026 01:45:18 GMT"
],
"pragma": [
"no-cache"
],
"set_cookie": [
"JSESSIONID=2E0D07A5B1380F2E3B9D8294ABD57067; Path=/; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=31536000; includeSubdomains; preload"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"DENY"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "72.240.67.226",
"path": "",
"scheme": "https"
}
},
"status_code": 200
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt"
],
"ocsp_urls": [
"http://ocsp.sectigo.com"
]
},
"authority_key_id": "8d8c5ec454ad8ae177e99bf99b05e1b8018d61e1",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"https://sectigo.com/CPS"
],
"id": "1.3.6.1.4.1.6449.1.2.2.7"
},
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n Timestamp : Mar 5 16:17:03.914 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:A6:DC:0B:8D:98:2B:5C:D6:BC:EB:12:\n 1E:36:84:05:00:B6:A0:17:A0:EA:2D:9A:53:B9:DD:1A:\n 9C:33:85:39:D1:02:20:44:1D:45:BB:AC:51:0F:38:F7:\n DE:E3:2F:71:37:31:37:0E:8E:FE:74:1F:E7:6D:BC:00:\n DA:C2:B7:1E:A4:68:66\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:\n AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4\n Timestamp : Mar 5 16:17:03.809 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:FB:88:0D:C6:4D:33:26:AA:73:9A:10:\n 32:75:A6:5A:9F:E8:BF:E1:AC:1B:40:BB:EC:AE:F3:16:\n AB:BD:51:87:8F:02:21:00:CF:CC:10:EE:EB:E6:9B:FF:\n CF:1D:86:D7:62:66:52:B3:7D:42:5B:82:00:61:62:A4:\n D4:26:6D:48:FC:DB:B5:99\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:\n F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7\n Timestamp : Mar 5 16:17:03.849 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:66:0B:B7:47:8C:85:5F:F0:B9:BA:D7:55:\n 95:B7:76:58:CB:72:8C:1C:B3:B2:39:09:52:B9:18:A2:\n 02:54:C3:06:02:21:00:F3:91:CC:1F:D1:B3:91:69:CE:\n BA:AF:70:61:A0:91:99:C9:31:97:73:50:5B:93:19:66:\n 31:8A:67:75:7E:29:01",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"managedservices.telesystem.us",
"www.managedservices.telesystem.us"
]
},
"subject_key_id": "016883169652dbfbefc57055008403d63155130e"
},
"fingerprint_md5": "B125836900B6F04415BD82DB98E749AF",
"fingerprint_sha1": "1F9597F19B969C3B228541D72CF8F1C95D20BFFF",
"fingerprint_sha256": "BF84840003CBE18B373EFC90EED3075C5723305E4CE3C1FA9BCD7E403528855F",
"issuer": {
"common_name": [
"Sectigo RSA Domain Validation Secure Server CA"
],
"country": [
"GB"
],
"locality": [
"Salford"
],
"organization": [
"Sectigo Limited"
],
"province": [
"Greater Manchester"
]
},
"issuer_dn": "/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA",
"jarm": "15d3fd16d29d29d00042d43d00041d596dbf6b69dea2f10bfbf38593c6bb6c",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2026-01-14T04:59:47",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "159068779498408974522869401661725420162",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "Y2EyZDFiMTdiMmZkYzQ3NjkwMzZiNTQ1OTI3NzcyY2FjYzI4NzUxZGJjN2U0NmM0NDRlN2MxMzRjMjk3ZGM1ZGY2YjBhMjJkMGY5ZmMwNGNiYzIwN2FlZWVkOGJjNDczZGUzZmUxNjcxMWFlNTY5Nzk2NWQyOTZlMjQ5ZDI3ODNiMjUwOTlhMmViYmJlMDg2MDIzNDA5ZTYwYWQwODIyMzI5YzBmNzU2MTBkOTk1MGRjN2ZhYTkyMGNmZDRkZTYwMDc4NmI0ZDIyNzI3MjZmNGIzMjJmODQyMTM5NTkyNzc0NDQ0OWQwMGIxZTdjZDAzOTgxMTFjYTgwNGZhNWRmYzdiNGNjOTNmYjk1MGQ2MWM5ZDAxMTA0YzBiOTdiOTIyNDgzMTM0NDMzZGM0YjZmM2QwNzNhMTQ0ZGIyMDUyOTkzZWE4YTVlZjNhNTU2Y2ZjOTgzOTlhOTJhYmU2MjE3NzU1NWUwYjEyNjIzYzI0OGRmMDdmZTViZDFlZDJjNGM0NTUzMjk5Nzc4MDY2NmNmZjhiY2EzZGYyOThkMWJhYTA3MGQ4YTEyZGZlMmNmMDhiZDZjNjRlODRiMjM5MzY2M2Q0MjU3N2QxNzVmMDg3YzgyODU3ZDNhYTExNjEwN2JiMjc5NTI1N2Y4OGU3NTIwOTRmMmRjNWEyODAzM2E5YTk="
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100a6dc0b8d982b5cd6bceb121e36840500b6a017a0ea2d9a53b9dd1a9c338539d10220441d45bbac510f38f7dee32f713731370e8efe741fe76dbc00dac2b71ea46866"
},
"timestamp": "2025-03-05T16:17:03.914000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100fb880dc64d3326aa739a103275a65a9fe8bfe1ac1b40bbecaef316abbd51878f022100cfcc10eeebe69bffcf1d86d7626652b37d425b82006162a4d4266d48fcdbb599"
},
"timestamp": "2025-03-05T16:17:03.809000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "cb38f715897c84a1445f5bc1ddfbc96ef29a59cd470a690585b0cb14c31458e7",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30450220660bb7478c855ff0b9bad75595b77658cb728c1cb3b2390952b918a20254c306022100f391cc1fd1b39169cebaaf7061a09199c9319773505b931966318a67757e2901"
},
"timestamp": "2025-03-05T16:17:03.849000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"managedservices.telesystem.us"
]
},
"subject_alt_name": {
"dns_names": [
"managedservices.telesystem.us",
"www.managedservices.telesystem.us"
],
"extended_dns_names": [
{
"domain": "telesystem",
"fld": "telesystem.us",
"subdomain": "managedservices",
"tld": "us"
},
{
"domain": "telesystem",
"fld": "telesystem.us",
"subdomain": "www.managedservices",
"tld": "us"
}
]
},
"subject_dn": "/CN=managedservices.telesystem.us",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "22b3a9cab1959046ed9fbf370941614ef2baf023fe86db801f57ffc7265a5552",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "567d716aaf4eb772fbdde7976b15032fbcd3a3c9c56a9ff9a9d7806b3891bd8d",
"tbs_noct_fingerprint": "27b947129813034a06c63a6ebabee64eb3119c0f4b2be099a6508c0f67d81dd1",
"validation_level": "DV",
"validity": {
"length_seconds": 34300800,
"not_after": "2026-04-05T23:59:59",
"not_before": "2025-03-05T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "BF84840003CBE18B373EFC90EED3075C5723305E4CE3C1FA9BCD7E403528855F",
"precert": false,
"raw": "MIIGZzCCBU+gAwIBAgIQd6uIVjNEbQQH7G/5fO8qgjANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTcwNQYDVQQDEy5TZWN0aWdvIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENBMB4XDTI1MDMwNTAwMDAwMFoXDTI2MDQwNTIzNTk1OVowKDEmMCQGA1UEAxMdbWFuYWdlZHNlcnZpY2VzLnRlbGVzeXN0ZW0udXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCs4EVhvU4U+gZ15btI0yjeKAD6rNk5pcVNE9P0VVfzu0rLiDTo9h2dVqPcf4ahWz3ZgWvNkVk/YEAQBqaNOSjy6434LkcHqJkyWFdgQZaJFsIj1e1ooUzcG693IWPcBlnuPlzF4a3wSWggjVgYaUMd24VwJHBztpF2CuYkUaE8rDhf5kmpgNq3EHxTih0HJhay1rbGIDxfl2xx7g+dHE37x2qx/mahdihUjNxrT2DTL0EaSjp++PE3EQML3FH7iRhJ7O1NvyQP5WBJ2cjzR9rf69QFgQzTFiuE4N6iV2fYnKXMEG08Ie7Dtmvp73xLge63hysGhziDwiLaHQqp/RrbAgMBAAGjggMjMIIDHzAfBgNVHSMEGDAWgBSNjF7EVK2K4Xfpm/mbBeG4AY1h4TAdBgNVHQ4EFgQUAWiDFpZS2/vvxXBVAIQD1jFVEw4wDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMEkGA1UdIARCMEAwNAYLKwYBBAGyMQECAgcwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQIBMIGEBggrBgEFBQcBAQR4MHYwTwYIKwYBBQUHMAKGQ2h0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNlY3RpZ28uY29tMEsGA1UdEQREMEKCHW1hbmFnZWRzZXJ2aWNlcy50ZWxlc3lzdGVtLnVzgiF3d3cubWFuYWdlZHNlcnZpY2VzLnRlbGVzeXN0ZW0udXMwggF/BgorBgEEAdZ5AgQCBIIBbwSCAWsBaQB2AJaXZL9VWJet90OHaDcIQnfp8DrV9qTzNm5GpD8PyqnGAAABlWcYp6oAAAQDAEcwRQIhAKbcC42YK1zWvOsSHjaEBQC2oBeg6i2aU7ndGpwzhTnRAiBEHUW7rFEPOPfe4y9xNzE3Do7+dB/nbbwA2sK3HqRoZgB3ABmG1Mcoqm/+ugNveCpNAZGqzi1yMQ+uzl1wQS0lTMfUAAABlWcYp0EAAAQDAEgwRgIhAPuIDcZNMyaqc5oQMnWmWp/ov+GsG0C77K7zFqu9UYePAiEAz8wQ7uvmm//PHYbXYmZSs31CW4IAYWKk1CZtSPzbtZkAdgDLOPcViXyEoURfW8Hd+8lu8ppZzUcKaQWFsMsUwxRY5wAAAZVnGKdpAAAEAwBHMEUCIGYLt0eMhV/wubrXVZW3dljLcowcs7I5CVK5GKICVMMGAiEA85HMH9GzkWnOuq9wYaCRmckxl3NQW5MZZjGKZ3V+KQEwDQYJKoZIhvcNAQELBQADggEBAMotGxey/cR2kDa1RZJ3csrMKHUdvH5GxETnwTTCl9xd9rCiLQ+fwEy8IHru7YvEc94/4WcRrlaXll0pbiSdJ4OyUJmi67vghgI0CeYK0IIjKcD3VhDZlQ3H+qkgz9TeYAeGtNInJyb0syL4QhOVkndERJ0AsefNA5gRHKgE+l38e0zJP7lQ1hydARBMC5e5IkgxNEM9xLbz0HOhRNsgUpk+qKXvOlVs/Jg5mpKr5iF3VV4LEmI8JI3wf+W9HtLExFUymXeAZmz/i8o98pjRuqBw2KEt/izwi9bGToSyOTZj1CV30XXwh8goV9OqEWEHuyeVJX+I51IJTy3FooAzqak=",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://72.240.67.226/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-08T04:25:41.294Z"
},
{
"port": 5432,
"protocol": "tcp",
"name": "postgresql",
"version": "11.19 - 11.22",
"product": "PostgreSQL DB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:postgresql:postgresql:11",
"part": "a",
"vendor": "postgresql",
"product": "postgresql",
"version": "11",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"postgres": {
"errors": [
{
"code": "0A000",
"file": "postmaster.c",
"line": "2057",
"message": "unsupported frontend protocol 255.255: server supports 2.0 to 3.0",
"routine": "ProcessStartupPacket",
"severity": "FATAL"
},
{
"code": "",
"file": "ATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
"line": "",
"message": "",
"routine": "",
"severity": ""
},
{
"code": "",
"file": "ATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0\n",
"line": "",
"message": "",
"routine": "",
"severity": ""
}
],
"is_ssl": false,
"supported_versions": "FATAL: unsupported frontend protocol 0.0: server supports 2.0 to 3.0"
}
},
"cve": [
{
"id": "CVE-2019-9193",
"score": 7.2,
"severity": "high"
},
{
"id": "CVE-2021-3393",
"score": 4.3,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-09T01:36:59.013Z"
}
],
"services_hash": "cbe94ccb66addf8c6ef33eb44faded8c5d96e5acae55181511a27cedeb93272c",
"last_updated_at": "2026-01-09T01:36:59.013Z",
"banner": [
"postgres",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-2019-9193": {
"id": "CVE-2019-9193",
"references": [
"http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html",
"http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html",
"http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html",
"https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/",
"https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5",
"https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/",
"https://security.netapp.com/advisory/ntap-20190502-0003/",
"https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/"
],
"score": 7.2,
"services": [
"5432/postgresql"
],
"severity": "high",
"summary": "In PostgreSQL 9.3 through 11.2, the \"COPY TO/FROM PROGRAM\" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-78"
},
"CVE-2021-3393": {
"id": "CVE-2021-3393",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
"https://security.gentoo.org/glsa/202105-32",
"https://security.netapp.com/advisory/ntap-20210507-0006/"
],
"score": 4.3,
"services": [
"5432/postgresql"
],
"severity": "medium",
"summary": "An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-209"
}
}
}