Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_7.2 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAACAQDA6IbHOut8Wh8P6txltQ2zios62D0ZC0yMJlVGuDBV89bk WYnMuG6Qiwozw7QRnfKfsl0oIKKGwWiOTgI4tIMnpvIFM4zNTNssGcuUQKwfzLH+nA9C+zzs0lCN T1xQHsNoND8/mzge0sLKhspQotalJoucZlqb+oNC7wL++hLqhi2esqVliOlm+I+W4rfj/auswevF d2ndjXbwe1dzAw3LgJRNxlyAomgZvX9nwgM7I37h6ZoWjiDiu/94X0t+8yQYQPkXK/W+PdV3YewE mipbfl85OYFbBaOnM+6dHPDvLJDLzdJP1hNVLQ4eiO+LR5wopTELgQCVXCwYNPNQlj7N4bq+rObJ 2iLQ71ye3InCwNr1DOjW+x3mAT4oXF/pce47oSVTaVjhVKhSAcnZX+VV8QGrwoT0u1GuIj3tqsFq l6pOm42jZmLOz6453VpwE99cKtuuZPI/kLllpUd1uqjWosL+RvSHrLbO+E52MlkgBuf6mcfP0XUy 60x1mfHjrQ4Jhp0Asl89pRQbNkMYMF9FbLTk7FkDHLyJD008BLuZDqdiawk4sy6bH3zB8412UozZ Ov2mNp/a8QBO5b0P1QjNzxr3oG5I98r2oU/4K3FBjwgaIrwYXFDnnI+l6oQTzTmOtulzEccLnM/o bh8LbWiiWFWmFeYOojztLDXiNnVD3w== Fingerprint: 7d:fc:a0:54:9a:32:7b:66:47:0e:ee:8f:6f:5a:32:7d Kex Algorithms: curve25519-sha256@libssh.org diffie-hellman-group-exchange-sha256 Server Host Key Algorithms: ssh-rsa rsa-sha2-512 rsa-sha2-256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes256-gcm@openssh.com aes128-gcm@openssh.com aes256-ctr aes192-ctr aes128-ctr MAC Algorithms: hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-ripemd160-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512 hmac-sha2-256 hmac-ripemd160 umac-128@openssh.com Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved