Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-820515108 | 2024-07-05T21:46:01.646014
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDJtMiCvr91Ab2JQOKV3v8mzRy5RhU1slUACpuSNzVLZIHS O8636Z5H3bYFdGNxU7R4jD5Cx2ev9qnHpUwcsfR/Y08A3ASwN6K/AY0I86wIn2prU2NbUBt0XhMI dKWtDrjczuzB17DIAZpLdT4f5Wn15zKkWIFi/PKro7vKE4zP6CsdUmFxLeP1gXlLEQkxd8pvkcad 2TsTyM8IvZr0upHgdDbCWvSARiA9SzGC295VI+4SanZ8cVM1t/KLXgiqabuXkLRW0MoWcEnIs5fs gaG+W7iKO5zllxGXGqGrN9s6DwBNxHURiQ3JLRj2rkQMofoRsezTJ+VXlhPld056HjozBb9w+5p7 v5z8hUFK8LZIX1ecXpM2hIwLk9qM34GoOajLVUq+Ue3wzv4OlPyFnq4jqsU30DUambeQe5n8qgkq loHp7AORtKEL9tK0XdBhHp5VQMYZ8L2GAhrun7NCD/LCZ1U/Ow96gBy41bNKWLZ9vGc7eYw2/i5k iCS6Jxxk/z8= Fingerprint: 85:c8:63:6a:f9:37:6a:54:36:81:f3:66:a8:d0:40:c8 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved