Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
NTP protocolversion: 3 stratum: 2 leap: 0 precision: -24 rootdelay: 0.0314025878906 rootdisp: 0.00106811523438 refid: 3639550732 reftime: 3947525094.02 poll: 0
SSH-2.0-OpenSSH_8.2 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDjdm5v9dAL2DdXrqOO22Ux5QQXabtUUUM151l4khO0/XDF nVTMFVdVUAXoGi55n66if5hE15XiKxupB76zMZdKML4a1YkBYZqk1Hbez9C5n5T43mzIB0AysclV OUqnAwdWfVU1XRAkRcXwPF3/tf7MQw98Z+Weq5gdleOCk/fQc82CKWXgXFaUY5ESzZV8e3SzkMGF vtQfpISC9/pyTtpuD8oKJMqKN4n3wCx5+lPqOwCTUKdzSaKlaWzSgZ9uZxYOv9s8XXmkRyyc17du ax0oAbZl19OYZ2X53omXE+gmsgt2fWKHMoGkoaGGfabWlQ1a+Miy5w6ECy5N8lTkGa7wd934lbpu /BVgFB9Nf9nxsKMo1rdTurCOYjNKN8rET+8qPdBHixXGnePCaKkeI1pbi34nV4AUwUOB0GFfzOXL E5QUzzxuZnYxj9bJy7y7wmydnrm+xXbTJDpo5F9jo+ZRAZmPTiDHe8NlmEq7zi7ygs0qYJeVfqNV V7+JzteyA98= Fingerprint: 51:80:e3:b8:fa:09:6c:ed:a9:1c:7d:47:47:21:31:c3 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group14-sha256 kex-strict-s-v00@openssh.com Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved