Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-173313914 | 2024-10-12T12:24:23.533012
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDyFPi/jCkm4gpZjqX6guebnuHyE8v5JU68bpSLPl0ikLTI EJ8Ja+nLMHaqWxj6G2YbSsUMkxdrJeF2NXktoNmEG9+lBkcIa1dkqwkvzLPwRsZUWQxUF0rE9/rr ZwSbiBixPPPP2SGNzfvw262ex6jUQAaKK5Pd37EtMJLu6yyo9Qwl5b5Bz2zDw9k5YcaMFlbeVgcm a1CoRUi6ofBMZg04XgHMoQYWRnrLsRfvdJbFJ/dJGCy7A2Yd9saH5RzVMnQsW7bxRp8/1AU2Cwje cdI2ltX7PyBNz7TORpvXllkLaY0Ar7ce2Z30gk5FrEzJtCOczczzYfpnpYvNeGm2OQ9Eb1xx1rKx BgQqffZxQwntMx+iqmExpMoZgynl3p+cZ9sBmXobTq2RURuAB9BTZflwf7EXIqtpdFMXwBMHi1Al +qD1EsUssvzhrLPznC2tr+7kP1E9r1RnOjr0NYZ1D63ngYXtnV7D+ajLfxmuRdK4RqOuWikbbp3o Ok+zVna4cSc= Fingerprint: 1a:33:eb:c6:4e:53:f6:65:7e:f2:17:29:fa:1a:37:7b Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved