Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 ProFTPD 1.3.4b Server (Main FTP Server) [::ffff:194.54.89.197] 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD XRMD MKD XMKD PWD XPWD SIZE SYST HELP NOOP FEAT OPTS AUTH* CCC* CONF* ENC* MIC* PBSZ* PROT* TYPE STRU MODE RETR STOR STOU APPE REST ABOR USER PASS ACCT* REIN* LIST NLST STAT SITE MLSD MLST 214 Direct comments to root@127.0.0.1 211-Features: MDTM MFMT TVFS MFF modify;UNIX.group;UNIX.mode; MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*; REST STREAM SIZE 211 End
SSH-2.0-OpenSSH_4.3 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAABIwAAAQEAySsPAY00xqmfdgqNzb1CjkIF1N+SVfHo0RTMj4KBWmc2EIKq oVJdSRumIEwlKYGMadYGPwCj7g9mhyQ/xoZ4eKN7EsgagMKJtJAwlygaUqtipcEJWVdYo4ownfUj wPgN371n5Zw7XSkr4X97wCvFOPYMfkF2pOBw/B1KpEsujloj1t/RLNdcOWpGSdRzi665pz1YRK9q ubh569YWxsfPZFfgv+YKdMCJQUMq5abxPyGPuuke29vi/1mZraRmCCCjFUQ8d58mcskPuPVA+Cqc Fo5ByWZNxIYsWUb2hbwYYIIbEjr/lAGsEug3uZApGJ/ztHP4v6TYyctXfO9rri+A2w== Fingerprint: 2c:7c:4b:b9:e3:68:43:92:97:7f:0b:ce:90:01:9f:53 Kex Algorithms: diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 Server Host Key Algorithms: ssh-rsa ssh-dss Encryption Algorithms: aes128-ctr aes192-ctr aes256-ctr arcfour256 arcfour128 aes128-cbc 3des-cbc blowfish-cbc cast128-cbc aes192-cbc aes256-cbc arcfour rijndael-cbc@lysator.liu.se MAC Algorithms: hmac-md5 hmac-sha1 hmac-ripemd160 hmac-ripemd160@openssh.com hmac-sha1-96 hmac-md5-96 Compression Algorithms: none zlib@openssh.com
HTTP/1.1 200 OK Server: nginx Date: Tue, 28 Jan 2025 11:56:40 GMT Content-Type: text/html Content-Length: 4081 Connection: keep-alive Last-Modified: Tue, 28 Jan 2025 10:19:04 GMT ETag: "8caa24-ff1-62cc185b7f600" Accept-Ranges: bytes Strict-Transport-Security: max-age=15768000
Shodan ® - All rights reserved