1745438380 | 2024-05-18T15:41:29.269172
22 /
tcp
SSH-1.99-Cisco-1.25
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAAAgQDR4PeQWTy4iOpVLJooToY+u82WeMiD8LRKJ2+hDco9ZHK/
0dX2tbMre5a44gNMOSLTvBk+jfSD33Shz8uVTHw4FHeNUCd2rz3/Hd1kjok8yCdqTRv7YUWnMcuL
crYBBLQEPnhP8GJMALH1gEgZU7k9yGCQvbg0wi4oogbMw1H74w==
Fingerprint: a7:03:4e:29:59:10:52:f4:3c:fc:a1:7e:ab:91:5b:9b
Kex Algorithms:
diffie-hellman-group-exchange-sha1
diffie-hellman-group14-sha1
Server Host Key Algorithms:
ssh-rsa
Encryption Algorithms:
aes128-ctr
aes192-ctr
aes256-ctr
MAC Algorithms:
hmac-sha2-256
hmac-sha2-512
hmac-sha1
hmac-sha1-96
Compression Algorithms:
none
-1337008328 | 2024-05-21T19:17:27.923096
23 /
tcp
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE
PUBLICLY-KNOWN CREDENTIALS
Here are the Cisco IOS commands.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL
NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
User Access Verification
Username:
819126370 | 2024-05-14T05:40:16.153725
80 /
tcp
HTTP/1.1 401 Unauthorized
Date: Tue, 14 May 2024 06:11:56 GMT
Server: cisco-IOS
Connection: close
Accept-Ranges: none
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
WWW-Authenticate: Basic realm="level_15 or view_access"
819126370 | 2024-05-26T17:20:15.671958
443 /
tcp
HTTP/1.1 401 Unauthorized
Date: Sun, 26 May 2024 17:53:17 GMT
Server: cisco-IOS
Connection: close
Accept-Ranges: none
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=7884000
WWW-Authenticate: Basic realm="level_15 or view_access"
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=IOS-Self-Signed-Certificate-3690298568
Validity
Not Before: May 11 10:35:31 2023 GMT
Not After : Jan 1 00:00:00 2030 GMT
Subject: CN=IOS-Self-Signed-Certificate-3690298568
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:d1:e0:f7:90:59:3c:b8:88:ea:55:2c:9a:28:4e:
86:3e:bb:cd:96:78:c8:83:f0:b4:4a:27:6f:a1:0d:
ca:3d:64:72:bf:d1:d5:f6:b5:b3:2b:7b:96:b8:e2:
03:4c:39:22:d3:bc:19:3e:8d:f4:83:df:74:a1:cf:
cb:95:4c:7c:38:14:77:8d:50:27:76:af:3d:ff:1d:
dd:64:8e:89:3c:c8:27:6a:4d:1b:fb:61:45:a7:31:
cb:8b:72:b6:01:04:b4:04:3e:78:4f:f0:62:4c:00:
b1:f5:80:48:19:53:b9:3d:c8:60:90:bd:b8:34:c2:
2e:28:a2:06:cc:c3:51:fb:e3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Authority Key Identifier:
A4:6F:25:2F:7F:AE:72:B2:F0:AC:C1:3F:4E:0B:A2:27:0E:90:9D:34
X509v3 Subject Key Identifier:
A4:6F:25:2F:7F:AE:72:B2:F0:AC:C1:3F:4E:0B:A2:27:0E:90:9D:34
Signature Algorithm: sha1WithRSAEncryption
Signature Value:
6e:f4:86:74:94:03:a7:d5:fd:51:9a:f1:b1:28:88:ac:b4:1c:
2e:88:79:dc:f0:30:f6:26:59:c6:22:8c:d2:77:46:c0:b1:0c:
26:45:85:81:c3:ed:e4:07:a1:db:ee:37:9d:0d:11:f9:7e:cc:
a4:dc:0f:be:dd:32:ad:1c:bd:7c:96:62:7d:5f:c8:a4:38:4a:
24:40:31:7a:25:54:71:d9:90:e9:76:c2:61:fe:7b:eb:11:f8:
0e:f0:0d:8c:8e:b1:31:7b:a5:1e:b5:32:5e:2f:47:ad:43:0c:
11:b5:5c:a3:1d:25:bd:92:2e:9b:bd:35:4c:af:9e:8e:d1:4b:
d6:90