Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1556719251 | 2024-06-10T10:42:54.305385
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDfL7p4h2+gFSoKSoIVnxinU0BIe6OHxGjbIQT+GwGIbi6N noKym4jYXhRGh7m8kxHjpZzaulTl99ykc+MhjghF8w/fUY9NtgW+3gTP2QpAOBMWqYv6jGYUixdr yZVjtxS7Nvef4Lh0oS/N01qdBLa4dgGPt6s1rxWEEhQx1YaHsUBxXoL3QFAPfNrvTEUk7r1E2CVx YX4ALG2RSfrBs3IaaxSgEF9bE1yO8b9MvmTr1uUcB+uvR+sWteK5zL1ZREXWhWB2uOkrseWkSfWW dIICqTgQuYrogd/82fZQLNRqSLMgVNULK0d/XagerWs9zjEO32jomOGKkFX4S7d0TLYBX6FyGkqd c3eTMwjkQg0dDAQRvbeDL9TdH2wg8vX4Mr6xU0ToC8WMTzT6PeLdtedOYUBGt1rK8cp+caPx3wNx lOkSVV2F3JVSbV9uP4zZDsANrGdS2P7z5Y1bJB7t56qBsu2u87B7pm6Xmp59KYhTGHgINUHbY/Ks /swrde+d5AM= Fingerprint: 73:ae:87:11:34:c9:43:b0:3b:5a:a3:14:0d:1d:ac:c9 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved