Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1820581310 | 2024-05-22T21:29:45.018818
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQC2vncK1KUuRabp68e2YrnprPe8nDhTa7dqfiBWxy9LzcCg TLxQaMhrLCSfXBqpTP8S1Fxmn3bNWRoYFiRkRy3HrdIrwqhn5t3jYyt1Yhfbpst8jVaulQ24I6X/ nQRtTbGAnDaxmyi/S0FsMgwt15HbKkwGGxJgU6+Pmvgud/F6JrBBhP32j4YLmh65zloewP1QNVY8 3fSXo2/QT0GGDKyzygjGaOXi/aOptXkR5l+bhyJn/w+j9+Ns+y353hVUeMUipS7wRSgYPUeV8etx U8N7+oWKq26fNyq1rglG5A3tSlNvaTKwMebWdJEgTD99s8WOIV0Zfw4BjQTSP/o7nhpbEv5C1RNl CZ0h8jGL+Na6tey5TKKrqnujOlG5m5jkvKQFpcohNN/TINQ6tIeuzjmURBmF3B/3Zy4GSzmpfw7J Cb9dnbNOUuh4WfxrERso1pFLNbg2RJFwgVi70o5rGNgk7+C0S7ms++FpmCxwI/MHhBtLns6k3qEZ 5D4WjzU51Q0= Fingerprint: 34:a6:07:75:6e:0f:71:09:d6:48:5f:58:b9:df:b4:4b Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved