-1255572003 | 2024-06-05T10:56:02.562432
22 /
tcp
SSH-1.99-Cisco-1.25
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAAAgQDF8DJCvuvkVqBVDjf8TvPR6nawTyeEf/YM49OjtA0n9y3P
YrlSYcEV1QIwW/3XmsukPnFasf0ERTIQ1fbVl8R0B/mphEs61dHbBWjr3K8pISO2Tqg65jGk0+2X
5suKrTNXln0cSEScacq4J7NycZ1IFuUSC/0aH1OVoMBriWudHw==
Fingerprint: 48:95:bf:32:80:ea:79:ea:1b:73:2c:21:eb:3a:56:e7
Kex Algorithms:
diffie-hellman-group-exchange-sha1
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
Server Host Key Algorithms:
ssh-rsa
Encryption Algorithms:
aes128-ctr
aes192-ctr
aes256-ctr
aes128-cbc
3des-cbc
aes192-cbc
aes256-cbc
MAC Algorithms:
hmac-sha1
hmac-sha1-96
Compression Algorithms:
none
-1337008328 | 2024-06-10T01:56:32.177646
23 /
tcp
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE
PUBLICLY-KNOWN CREDENTIALS
Here are the Cisco IOS commands.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL
NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
User Access Verification
Username:
-553166942 | 2024-05-30T22:54:04.909306
53 /
udp
819126370 | 2024-06-09T02:24:44.970742
80 /
tcp
HTTP/1.1 401 Unauthorized
Date: Sun, 09 Jun 2024 02:14:21 GMT
Server: cisco-IOS
Connection: close
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15 or view_access"
-749663518 | 2024-06-10T05:39:08.020181
123 /
udp
NTP
version: "4"
processor: "unknown"
system: "UNIX"
leap: 3
stratum: 16
precision: -21
refid: INIT
reftime: 0x00000000.00000000
clock: 0xEA110D94.3AB6BA22
peer: 0
tc: 3
mintc: 3
clk_wander:
819126370 | 2024-06-09T05:10:53.256707
443 /
tcp
HTTP/1.1 401 Unauthorized
Date: Sun, 09 Jun 2024 05:00:37 GMT
Server: cisco-IOS
Connection: close
Accept-Ranges: none
WWW-Authenticate: Basic realm="level_15 or view_access"
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=IOS-Self-Signed-Certificate-1464978367
Validity
Not Before: Sep 30 22:10:52 2017 GMT
Not After : Jan 1 00:00:00 2020 GMT
Subject: CN=IOS-Self-Signed-Certificate-1464978367
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:c5:f0:32:42:be:eb:e4:56:a0:55:0e:37:fc:4e:
f3:d1:ea:76:b0:4f:27:84:7f:f6:0c:e3:d3:a3:b4:
0d:27:f7:2d:cf:62:b9:52:61:c1:15:d5:02:30:5b:
fd:d7:9a:cb:a4:3e:71:5a:b1:fd:04:45:32:10:d5:
f6:d5:97:c4:74:07:f9:a9:84:4b:3a:d5:d1:db:05:
68:eb:dc:af:29:21:23:b6:4e:a8:3a:e6:31:a4:d3:
ed:97:e6:cb:8a:ad:33:57:96:7d:1c:48:44:9c:69:
ca:b8:27:b3:72:71:9d:48:16:e5:12:0b:fd:1a:1f:
53:95:a0:c0:6b:89:6b:9d:1f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Authority Key Identifier:
3F:09:65:03:12:AA:11:51:29:BB:D8:B8:EF:D6:F2:E6:D2:CE:2D:68
X509v3 Subject Key Identifier:
3F:09:65:03:12:AA:11:51:29:BB:D8:B8:EF:D6:F2:E6:D2:CE:2D:68
Signature Algorithm: sha1WithRSAEncryption
Signature Value:
5a:8c:44:26:c6:75:bb:f6:18:6d:0b:0d:c6:26:fc:26:96:ce:
9b:91:8d:1b:55:68:4d:bf:22:38:5c:06:53:ea:17:c5:68:4c:
1b:16:1a:48:01:0b:ca:27:41:f8:ae:bf:1a:e3:b4:2f:4e:d3:
d7:2f:f2:b5:7a:08:ae:4d:38:c7:55:96:c0:f0:31:a5:07:ea:
53:6a:74:04:46:3c:4d:5a:b0:46:b2:99:32:ca:33:26:5c:33:
4c:f2:ad:ce:9a:c1:33:f5:c4:ec:fa:7f:ef:1d:1c:aa:8c:29:
46:e5:a6:80:83:c8:e4:a5:a2:05:fa:02:89:93:7f:42:a0:9c:
bd:75