Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
687515933 | 2024-10-06T18:24:11.187925
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQCntn3EYTNNH7DEzxfoEDT6jmj4jFnWqW1nSOmpH0EBc6Ou 7WyBUSa3b1hofCjaUUy3XoOViBdhxgsO1Y9mgg7jevsVLvDe1mFA+1AueSgKLQG89AtR3pjscPz/ NYtbnJF875RL+HXCyMaFxbyQJDvg1CBn72yk0WvI9oe98DOXUuys5mO7aJF2Za2+zRKGpSdFy3aX RM/hR/NidVn2QAdXlJTaBIztdvF4iItB6oJ5q2SDyXznVwSbuNmsDdRD8xDfkg6iT+cLBOFZvW5r UApIbp1EpSXgQKlzMS6W7Y5BrbF0j/G+ZPAP7VaSWtM4/LrQjKMINb5JcXfIUTsoq5hLb5EaDntJ 6Zd2b9JztQ9vDOI3cPHYY3m6IP2Xox1RAHWS6FJyFo3W0XnmE/uOrTXE7XNPecWj7Pb5EtcGno+A eWzrpwFAoUdBhMkBqOk0oX+xpYdKcTR1ipuAUElnazGlK8ylnX/ImQI80xvkWIouPxPS6mJKADHP JNOIAz69sKc= Fingerprint: c4:b3:f5:df:ea:6b:9b:62:c1:c9:fc:67:17:7e:e5:23 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved