Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
1307209350 | 2024-09-14T22:37:19.559210
SSH-2.0-OpenSSH_8.7 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQC7TOYluhJaDCgUMXwOXivy44KejQBDaTHaJZxI3rFv+nt6 CN9P76kKvRw70zqAWM7ShRE0jXMh/dJBwI9LVjgC82/eTN9RQvh22S9hhipTtwRQ+g1qv7RlyAPL kq6bYTHiM+TJE9tgXnGEXWjb9G9i73HSMbFiLG5hRMSMnslyHaJOPTWs/MzDeArRbTy3XMJ1kF8+ S5+u8P83wkJzX6JedWsFEQ7gK4VT2A/fNsvORBq+3ZoKEngeF8FuFLamHaL9hFJ6TF/ETYDZHsM6 8Pv+UaYSe4XvtxNwxHLCoWcJYh3Ax7eroeoaBsfgTvdq9UotI4ttmEeeXcFOPq4JkE4MaPjh9uF5 UYGTRREEjhVnrDqIEKErkGTTyIhKJPKs68d3Nd1jHW0t0NGwxnXgTskCq4Jh6E8/yNB+aA48DDgb 4zBai2EFaIn/LSwQlMrN7HST+KXgwQdG0pVKnIypFM+oBWtMLEgVZLLCiBRNd7WFsZj7JWjF1Hkn gOcUMt0wds8= Fingerprint: 53:ea:24:a9:79:5c:64:74:98:6f:be:4c:fe:a0:e6:22 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group14-sha256 kex-strict-s-v00@openssh.com Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved