Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_7.4 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQDDkC6JWbYjORIbSK+r3mHw7l0TJbEczZt5CxDDp+W5XTnU Nch33p/NBQOOxUJFzDX9j0magKsisGwAXzCcY7hBmJxHprY/c+5htgC6xYRLKixli19378SB82mX 2kwscgL++QORfMCsbguwlA4ExEV0b4JJcGjaaNhQjQwD4FRMm2fwGDyYuouy5/FbCjulOOnSrZ9f 3kboBkrPb6fQJLEaqlZTUVM6yP8uXomk6tuhHppTegd07RxPI2OYEyQDgUe7rICYr5D3rMbJRb/L vsNnK10kUdUaiqKHGa0WtMBwbFp3nbIxU8m3J0JMrqkw/F+RGOMHyt5eVB6ryQA3t6Zh Fingerprint: 8d:c8:f8:0f:57:e5:75:d2:69:84:36:cc:cb:51:0a:71 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 Server Host Key Algorithms: ssh-rsa rsa-sha2-512 rsa-sha2-256 ecdsa-sha2-nistp256 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc 3des-cbc MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
you need to be more creative than that :-) Resolver name: none
NTP protocolversion: 3 stratum: 3 leap: 0 precision: -24 rootdelay: 0.0112762451172 rootdisp: 0.0414123535156 refid: 3587271981 reftime: 3946448989.12 poll: 3
Shodan ® - All rights reserved