Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 (vsFTPd 3.0.3) 530 Login incorrect. 530 Please login with USER and PASS. 211-Features: EPRT EPSV MDTM PASV REST STREAM SIZE TVFS 211 End
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.7 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQCunD4spK0ATip+e26CgQEY6/s4vUmO6PLZvV7u+oA8K2hf NYx61VnKGdTo8VeMr/8cw8FnuFV/W7T68rluzoC4HJQzqeHDCjHmCxhbR9JOlurC/+BecryS4URR +0P612rYQio3BahuW5/FA/nHAYbw7uLZ17KYJ/UxW5rcCcZqooFMFpMHrWkY754ekTAm8LSO36+V MCvic1gBWbap7r9vAXq5P4MYZn3SwR+XATEYY1UPxlTTMcZlIeE+s4HgAu1KpiPX0XVbmqzihniy KmQAI29hDkXkdqa7BHkW5rNKX9F7cjlfI7ogVd5mkG4MxyisZ06zbhBem73e0WS+kXc9 Fingerprint: b5:d0:48:35:82:fa:87:11:51:61:5e:49:ae:d2:7f:3b Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group14-sha256 diffie-hellman-group14-sha1 Server Host Key Algorithms: ssh-rsa rsa-sha2-512 rsa-sha2-256 ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
HTTP/1.1 200 OK X-Powered-By: PHP/5.5.9-1ubuntu4.29 Set-Cookie: PHPSESSID=rkdpupb8tfudt07ml05d20n9q4; path=/ Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-type: text/html Content-Length: 5836 Date: Tue, 25 Feb 2025 07:25:14 GMT Server: lighttpd/1.4.45
Shodan ® - All rights reserved