Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_8.6 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAACAQDNvdED+ZuDDk89XmX75WScYvsIOA7ZjTcqjYCeuHp6TJI3 jkrCTB0hQCERAp7LTZ/4DBCaiLO71Y+B5kEJnFTWMHOvrxZBaD4qOBSO3/aDW0ZmGv+R+1pJsob0 X+ChcH0ZsskFGzy/8tT+pssSJXmekzmij1Fz06ezmJW7fVvtqqquuYMqpgvcAQefYc+HOrFWZyxq RS+DdG1Q09aOd/YFX2zGJME3UAXFVYu1dBLuvO+8SOqhDvOVACEnPGGJcNJMy0PBZNfoiC5ykrpL o/9aUyre93RoZb95kkk3dGp69WczfmiCatIA84E5K0PTaEYA9PAnkyZRzYnR/U0CQsTg9IVX3/kC gEdTtPwLdffRrwbEne29rP9qhIjtSMXPCeB5r8Rb3kTxVz3JzoQxE0RNIkQ5UxHeUrd5EQSyE4fV c/HYF8aZzuwvAWWFC4ytvwev+AQ7oX3wx/TTs12CokKua2QP9ngMm/Ly4NT7wOq9CeKomXL1a3EN 1+X51IE1cITW8mk92V5vghkAeDc3Zw8S8WKhi78hk7IR4p73/6Umcvk6Qe6e6vFKVjq1hp8wBwvA T/kdspqT80iN7K4IMq87IObnecNzuSP+aXvBvM8r41WpmwLYvBd/cxWWn6eyib8+7XYAWL79UyaD rcWnmnj86zZSlCXaJBw+Xf4KGy/1/Q== Fingerprint: eb:0c:5c:3d:95:58:c9:4c:b0:b6:d9:8a:19:c2:30:ac Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group-exchange-sha256 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes256-gcm@openssh.com aes128-gcm@openssh.com aes256-ctr aes192-ctr aes128-ctr MAC Algorithms: hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512 hmac-sha2-256 umac-128@openssh.com Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved