Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_8.7 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDRSe9fBPmpuMlVtp1PHSelUg1gI9n5qmmCU2peDj9m+2gz ZLTj33N0IzmG6OnD5LRuR4Jbcx5XosTmp/QvhffAbVGQeMxG4+aUEh+ccXhEW4pU/pkk9x2qVGjc IMvVwi1GQ0WZTa+hhCi56VByko/a4RH1qgGR+MWXfd83rs+jpnmM2et0gOLVR2z5VKI1J9IWmTkJ C6+/S09wRnIVqasQ/L6rfife7zZuzUFnjDe5u4QUduNTFEa0MOvubZg8Nw08y1nsnw/E0iR4oas1 qOVFpGWYaHi0+Z+ZEpROHQjilU1yJd4Uy3nUcsXElfqlBY0pcbftFIdYdqfMc5zUi/AksPbsMjXw 39zFGSSVz9A+K+sCwxIpeO8t5Hlom9INT+vCqVFSL+mTaPFJZqzj0HXjpUIbabyo1FGFlpBJ1s9Z Bg/qiLeo/FpQUwkn/UhRqBPiJZxac4vnjefaOY/OKKEohsYqMDTGopH2h5W4tCKF4J/oh/n0Yw5U 9m1AWKNI7m8= Fingerprint: 47:05:3a:ab:de:26:21:34:15:47:8b:19:64:32:2f:13 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
9.16.23-RH Resolver name: ns2
Portmap Program Version Protocol Port portmapper 4 tcp 111 portmapper 3 tcp 111 portmapper 2 tcp 111 portmapper 4 udp 111 portmapper 3 udp 111 portmapper 2 udp 111
Shodan ® - All rights reserved