Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAABIwAAAQEA0ef+7OEM+8cu63otJ1NNnwrcNcQdovr7uJyyj+kgSsGUutkz L/F+jHimOt+EylxhweIiiH6d7wXNL7OFvunli4R7m7IST2hbaUb8RHMnrx9GTat7hBPobzo9HZ4s gGb3D79OudkMhEDOSGLLy3gVXitMeg/IKU31cVbMgsn7H6iV4tWiQFwAWScN5oQ6azsz/ZiChAIU PvmajJ3IReJ8sQGgScnoVoicy3N8Qx3xxw7onDzqGtyoTeWwCaX7+SLaUP5Q2CXOrl6TyZG8z5bj Sih55LRxzbP+5eskdA1trD7cx9GHcKZ9JFHI82Hl6w4IIMEPGJXEgtet62ZKUF6/2Q== Fingerprint: 59:e7:10:b2:aa:49:97:b5:4c:41:6a:49:91:2f:14:7f Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 kex-strict-s-v00@openssh.com Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved