Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-2057448339 | 2024-10-28T06:17:38.938457
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDeqN+hujCqGdHABOTre9EAoa1xIdn+ByKQ+DS3cApDemgG qI+qsPf3vr2IxAOpDFgLtm5zE7XJ70y1TvYyEJAvFtV6vtWN478qzLZpz/rZfNKdbOE08PHqTi+D PTw1fFxpSyVGiEtJOvQ4bGsBZkabppiqzDPE3jzKIXKpG9XkfoDDi0Cd1iycEiy+wqzKjcoUc293 3zselj6h8C/gwi9sJNQw7Lnm0Z3YNKBVyN4/G+P6xrP7NRM47OlzaBbwOYL9+NQGaP/8Z7DWVkfq xZSlRgaZ+ELF2+N0iVc7NdtizUzFjqPzL8aSk5Qh/QnCqMsW9ATMMyEPAcCkLoX8k3+zIuGe8a68 t47fSi1xD9+Sdfw30zgCrrD3aD78iEIeqoU/bs/YWDPlhlyEJ1GfjwufFecL/X8ls/8jGRwB9/1o GN+R1/W/i3OpdavL6myAYluZBV7vk13rQaqi6JcZh9KCtEwyPSchYtrt6Vo54OjYUmAsjHAsbfKo OUy9Edw861k= Fingerprint: d8:ca:ef:a5:05:d1:80:0a:38:b8:28:8c:ea:92:f1:b5 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved