Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1226186197 | 2024-10-18T22:53:06.349612
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDh/nWZeA9m8fdkRSN2u3w2YrAEvkSNEGrTMO/gYrSMzLVm KnmW0virdGxNFHjIKmGsS7WmLUjUZnv+FrHpwf8ppH1IzffbiLHLSiNjOMUU/UOWTxl1Xj0AQhrU ESr4Q7zcMmX1RFWUhXDReIKBwbIWPAzZgVWlu5OL72+uXekLeu8ptqI3PnFPwl68KtO+3oLu2DdY 1ln2axtSDeqD1idNym4QkztljfHKhGbkSn8igODjG6+ySTjEameijF+z5hg6XbyL5JsK/K4l8+L8 ZpgUb8mtg2f9x+novJCPSpBUCQ0/qAXGukoJdBEh8T7nLfkPX46h1TLbboK1U3EU5efc+fYio04C wJaczUWvDwNQHtRjcaKbDY5ZPr2abLimEYCQvBWYRYbrsj4Abovr3jr1PW9bFRk4tpfLCr7n4vdc UoDwY2wB+rr6S0OnhYPz+jurP8CyZcH3IOZ2gRsF0DCIbaiHvBr9bjb5HL2PJBgueF65BHwZ8gYG 4ECEkOYb56k= Fingerprint: 4c:b2:8d:1b:71:a5:31:2a:e2:df:22:0d:a1:c3:7d:7f Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved