Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1463708661 | 2024-12-25T01:24:20.194929
SSH-2.0-OpenSSH_8.1 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQC75icCJ3lEWkcQvRvoPe5cGZUYf5wIZ+8RHbk4+LBg9sZ1 6V9QbGKuPTWDHu4d/lm2bZYiMc/FaiNV+eABQ/YifpfUX45voUUzCbNc4g0ipaRQJYn91DbR5np7 d4XKm5E+sWthX7+5LY04yUkK1wRxojXW6wPpAc/+Umn5jlucjJcj+D1vD4RKWzN1pZKGyTn4blKm p0OhBYNG5eepeYSN6xS5rq3NBu90VeDkjpq3f0eGUzfTsh6GkCzBwQfQytU896+oZg/BABK7sjDM ln+PLcgY2AGoYjrNVMTl8lYgJYuCnBVgDpcTpx21NBA5RuhcQvjUs3kVClbQFUmyBj5GVeZ96nVc J9sB6ja4yz12h6xrBYZBFiLS9E31f+pkwUrbXcHwxg/UR8K0BCuGP1KqiPi3+LQudgYL19NcJxmt oQi/QMHTZL/JeBmV84vDXJguZ2tjGMVpMYq3lv3KAeV4ci0yv5wIT1m/jIz8Y0az/D7aUED7lfPT E59rbuN/f5U= Fingerprint: a6:a7:a8:eb:76:d6:4f:a6:6d:0b:0f:b7:c7:76:15:8b Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group14-sha256 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved