Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-22563318 | 2024-10-21T02:56:35.438149
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQCtZIGT+LQKUA+Qvf2BDe+QfPBaPnQrmt08bsvRhZwc+HPO H8XItJU2FJP1OX9g0Ls9dIIHL1MnHvh4HZy8mYnM7Xps4naajxeBVYZnu83Afz0GGHUzVVrLbP+P d+c8Kw+o5m5Dia2nlnR0wh3yRIG2/WIY3QejhEfYU1wFGEGbPxFhQh8x48rG0WcUATrabmNQUslh PjrfxBlakV3k/ZeRBvjY7fuQhZp07/IfL2E3H9AzM6wxWAu1vgwJLGfTWD4ZjfoGvxDZnE9sZGzt o3cgcbzDW5GJm93gZuJ97Va7M/s1SQWvTV72dIfDQthYVb/atyJ+w9j+bAuotXs4EjFUzoSlPL07 E3RkrHvT8IxJnBCHTeHxw6xe80Pe2Pe2Zq6Jb5RQiOw7Oo961bqpDDschbvOSEQ9RWaBLnrI42hP ve65tzahCW0B3EAARJiPzIB4tjUoQ4tV5hfznTohJOo27W68QBqA9krdMWbf3EcZv4B8VRQxvAuw GUCBX6XqwpE= Fingerprint: 46:cf:ae:c1:ae:6b:47:a1:65:b1:09:ba:d6:50:23:e5 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 kex-strict-s-v00@openssh.com Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved