Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
SSH-2.0-OpenSSH_7.4 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQDF/e+aqxgCTLIYz4Y7K5X9LIXa84MeDuc7DZu0XCmtqEL2 6APKgLyiYwOD2p5D9xIcFUJ3WGk9VSOVzvIzqJzr/bsoPwuy1020+CMmwVBAA2ChgDlzyKnAsL9G 0pQ+JXI6AnNk9eHrYR37YJYhKZMIlevgluQzovhMG4SlE9pLqCTNCYt//WOTCMupv5aJg2hC9Pp6 qR6UqxTVlaWrLAj7BBay9RyncRiROp3HD3yuLbLZas93iinZmmIjtaKrhYA9mMbU9v05aHE/vKo7 Jl8D5dwu5u5Gnd/sIf39sV8pYhuVcvojhIbry36ywy1WcajMugcvY+KPHpui8TB1Z1o3 Fingerprint: ad:f3:40:cd:c2:90:a1:fc:f9:5d:5c:c0:0c:b3:41:fb Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha256 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 Server Host Key Algorithms: ssh-rsa rsa-sha2-512 rsa-sha2-256 ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc 3des-cbc MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.14 Resolver name: node2.anycasthub.com
9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.14 Resolver name: node4.anycasthub.com
Shodan ® - All rights reserved