Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1669098617 | 2024-05-14T22:44:45.510921
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDeCN4rI+qnS8Rypx02te4Pm93hQbAJ1i2XF7SYZV5iPsqP rtjZrM2OKbyxisf4rTtYqwvb8WLVkLDsT/wuE3GJLqfwEWDW4XeOWFWQNgrfP3bHFGbQZ0UwRDid 3bmWqNrgG+bEofv1L2270UZquU36yk+ZIf+ECAcae7R1u+89siAQtOwYgCIlG+1OxhbAFndYzimR 1D5i+x3vlsK+SXD6vdKHrW/+ScrruW8aTKwnCRFMka3QqrCvec+8PzS7r9sDfWTPOd2X1+lSBmyO f7BBZ4SMgJjmDbxCnc5NQJGTg/un6ZOX8sWyOrORbXQE8iRtr5xw3WyGv1LjJ7BAjVZbrMfXQcKv KBdLBbmkRph68JIKCo+FqXGwiXk9V1NUyn/BRjUM0p3qgrX9tOYQ62EL3QeLwxst0RZxLCAL3ufq /SnDoj01hTX3dqjaNnMr3fVyqYqmPK9d7/aJVLhc+oDEx2TtujN2vQxnb1MncHqwW5BP8ghR51VK 3nG4z90cMJc= Fingerprint: e8:1d:80:87:b4:b3:76:d1:c3:93:23:62:a7:25:e2:57 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved