Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQCbClMHbHXBz3m6AsebKAA1TJ5p4DCYabo40llK2FN8oCoI vKhO23JcaliwGSeQnHO6PAiY8z7c9X2a4S9g+dZmaPj8SGp1DECcUg4BzNY320qSXKIsQKo4fumt azzr+Ngnb0ek6qMkY12tI10i5qCiro5/umDWy7sMQxYPSFxWO/s0eFepExxOxXq5jSohQHLjWFtr cZdsqH5YS+ufK5W8QPet14siB3GS3xkHItq/8rnr7fJ6NEPoRPP7S2G6ZrgdoA5ufk3/ODFW04Cy p5wOtoBvQf8QNS4qsIRx4G5q16tXs8ZxDbbj7GHSuN11GaOg+niPXSKfIpWPUILD9B4j Fingerprint: 9d:62:ce:9b:a8:c7:52:ce:7b:18:ed:1e:a0:dd:9e:b2 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group14-sha256 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
HTTP/1.1 200 OK Date: Wed, 12 Mar 2025 18:10:43 GMT Server: Apache/2.4.38 (Debian) Last-Modified: Thu, 19 Dec 2024 12:40:41 GMT ETag: "7828-6299ed686e440" Accept-Ranges: bytes Content-Length: 30760 Vary: Accept-Encoding Content-Type: text/html
SIP/2.0 404 Not Found Via: SIP/2.0/UDP nm;branch=foo;received=224.35.22.133;rport=26810 From: <sip:nm@nm>;tag=root To: <sip:nm2@nm2>;tag=as14159297 Call-ID: 50000 CSeq: 42 OPTIONS Server: MagnusBilling Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Accept: application/sdp Content-Length: 0
Shodan ® - All rights reserved