Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
52683165 | 2024-10-29T08:28:08.972762
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDKY4+Tbp8BqtIAOMG6KclIywvIF9ZizzF4O9M52LA699IM snM8G+C6CedZnnnvY2/Xnrycrf5/qvh5aBNirQP05CiqWyY+YsskKdv0XgmVbKmd6UoSHsu0iOrP AqTGFCJ4/exOTCCd/NHfCoJ9yUig2xYSgAzt2dgTc4bUi92Lf9Qdn7L1O7kuy2l1H6tgu6NsXX3Y hkSfkYcTl/9td0PzJYjRGkYQzTCc6GUHptIyUZjxGSqhVdoNlR9cEZS2T7ksXsBZ1nfYcA9kRXIH BeIN4tS/JGLib9JfRJKZR6MJpdNnQhd+RFqLeMVh0m8TgSl6Y4W80AgQQoubKZiZGP+MJS5hnJLo 1Srj7ZJWgWmjE31nqFE476AFfwnVcUCIHZ0r/HGwh6Yr/Q2thtC1rfL+GCRo1HN80TXwJN+U2VOB wsWCpNHHoGLW7xn6+/kdKCB5fTFCpbRjQJi8KMVvg32Zh0nS8n262+uRIYyTmukr+pyY3oulMAoy 1TashQTKzts= Fingerprint: b0:04:37:0c:8d:68:cc:d6:a4:92:1b:bb:9a:f5:37:11 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved