Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
-1643241590 | 2024-06-12T04:42:18.183890
SSH-2.0-OpenSSH_8.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDO7I+4EB3KABOvqMMjVz3+hBkcvfXcIrSw5dtX8uHzTZvO a8O8W/okxps16KmzQ8Y6wFKmVufYegUwhdCcsBeahVmXgeEZn3a6FaL/8LQBrs/U8B5NADB/k81t g3Xt9FFUyMINx8khpHXqgSlalEtp05/FOoGbL6PhDAFCy+jVpTQLxdYE5ZiATzmy4gA6fmPZx1iK CYLDT6zG9L7eAlqoCcHu5jQkrmKIXC50HtAXXmNEwzCL74n/t5j7d1QtXGJ7JjbEZS3GjvWMe5IW wpI4OspvI+eWWK5cWbJRB0X1uFyQp7RSlWOSvQLBmhKjSUrdvIUIB4Wb6ayGfsPm2euje3eZxdqq wEd0CsLxYtc3ssRG3mFcU+CcW2H//AK1s520rpZ5lXG6QskXSAm44x9oBLENiknQFk1zhsFuFX/s /DazP5mMvf1n4Bw0lKU0QuDcaz9X85D0u98p9heX3JQ5R7VnpLUaQKYIWLKdVnbeBOPHp75z3cK0 5PJaSfsWCz0= Fingerprint: 23:83:ef:39:6d:12:be:d8:c2:6c:11:7f:ea:cf:17:34 Kex Algorithms: curve25519-sha256 curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 Server Host Key Algorithms: rsa-sha2-512 rsa-sha2-256 ssh-rsa ecdsa-sha2-nistp256 ssh-ed25519 Encryption Algorithms: aes256-gcm@openssh.com chacha20-poly1305@openssh.com aes256-ctr aes256-cbc aes128-gcm@openssh.com aes128-ctr aes128-cbc MAC Algorithms: hmac-sha2-256-etm@openssh.com hmac-sha1-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha2-256 hmac-sha1 umac-128@openssh.com hmac-sha2-512 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved