Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQDIzN/7TiboNOxU8ABkt8/Hv++8DgG6n35o/fWlCMcgYiUN 3wRSPN9WpZU4ky/8CEKOis/4ez5OYTY2TsvUtbu39faL0W6/16unD4d3+y/NdCRBzPfz1LDiSI8K /nojq3PO5Y38mq+yWwgZWTyZz56l9RG5kT1eqVmJWzZiv9fofXLE8q9+JLMU4H2rELslcak2u8OG HJkZRqi9cOku2o5xvXlmWN8xQdeEv9v2aYGVJHQxxetZbNE6gIFfzIsBXqKT+soQFnfqrgH5rRw8 xlNx7D1fOlz+N736Xh8K+fAeOROBy574wH/3Zt5Q3i0P/ji87bWmdAtFCqggkouRusUr Fingerprint: 31:79:c9:1d:64:78:3c:ba:c6:de:d7:d7:0d:b1:3e:ed Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 kex-strict-s-v00@openssh.com Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved