Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_8.7 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQC+93bYdqd3zVRDAL4dzKYDcZij1Ws20GQjdtyfRLdJyUF/ oOj+cA5yjPeAoLpyXQzZj16wqfQmTSv/sT7LehJvXEEBYLaANtx1WlCHr0/hHoxvthQIiE5bWlVr StiZMLIxxGIRVn0GDvhSYvxUU129ns/11E4hPtXi53ti4T0VyWukLwmEyvSLAMh7xeJOjfmBbeU5 gHzYNUYmbM4ow9EcqgEDRYMWIdscoe638AYZguZZ+rmrCLGQnE+OqPVjTPNfNd0MPd6PGXAvBBkl aKd9AFzAF+HFdrqg1miJkBU8uyod+EAfc91dKihLcigi6Bu1GdwNeh+gIO+YjqdJRBEpyp3UN6Pr +LjqANn/buAFcNQ0db5LknV6at6VhS0zHLo2xCDt25B1+bld4Iy/Pai6PXA/IX4RAQAFdcPS5okl CLDV4YjUSOvVnktGPadwOERCMEaQJXjfw4Ojg/oRdn4dDDj6OSjcifCUtxmjA/UfwwUJu9dRgcSA WbeW4ukkQG0= Fingerprint: 33:ce:a7:39:6a:ec:7b:99:7f:69:3a:78:d0:d3:51:45 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Portmap Program Version Protocol Port portmapper 4 tcp 111 portmapper 3 tcp 111 portmapper 2 tcp 111 portmapper 4 udp 111 portmapper 3 udp 111 portmapper 2 udp 111
Shodan ® - All rights reserved