Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-885011985 | 2024-12-09T05:15:09.473357
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDHeX4+/LLEGo6Z+kXjtbs5/iXZt8xSwJbtepOsw7Jdhp+i 6rfSFlWDtgh6s0Fy1n9kNPqHhUpd1mQ+fk1/eDy6TIFHLaayIcbGOip52cIY3WAQp9GX8rFhLWeL KizLdP+T/BVzduU9GXIGMJGAcpHj4nvV7ajucgUiKqV4KA8LcJmWYRg+FZe4hyCowhmn4u2wdGEn 4Fy+bfLxMSTeJ5gi8CU0j4uvg90hcaSDtX0rpbrbM7FGsprGvQZ4hUqTcSnBGioxnx0MG2ICNNUc 477CKuw1JxkcOHmVgb4h7NmvhfGafl/+kpN+h/sxxxcgplk4F74ZX0/JI+yli6YiMR2cUHKAXV08 7mw8ox5O2JEFWxftBIQPjHbD5sUfvLZBBiyVOxXiMev0uM8VzttoSbXsH7kVoZ4aOlJIJeQKznmK P6ZY6NGe9oNfp38kYeSD4iM+fLdmLIMjeA5BxOJ6zLDrGbe62K0VBNcCGOWa2jZ2aCPXfFdIJg0B fNzPke/WI70= Fingerprint: d4:c8:9f:ae:e2:8f:ba:66:10:86:d2:5b:1c:d4:9a:85 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved