Repository: sdnewhop/sdwannewhope
Branch: master
Commit: 8e36c348b7ff
Files: 6
Total size: 81.5 KB
Directory structure:
gitextract_4gck7wen/
├── README.md
├── checklists/
│ └── sd-wan-security-assessment-the-first-hours.md
├── data/
│ ├── tcp2156.json
│ └── viptela_banners.json
└── docs/
├── census.md
└── leakage.md
================================================
FILE CONTENTS
================================================
================================================
FILE: README.md
================================================

# SD-WAN New Hope
Software-defined networking in a wide area network (SD-WAN) quickly becomes very popular in Enterprises. Vendors promise "on-the-fly agility, simplicity, security and automation" and many other benefits.
What do you know about SD-WAN? What "security" means from a hands-on perspective? Are present SD-WAN products really secure?
The goal of this project is to give answers to these questions by exploring implementation security of real SD-WAN solutions from a practical point of view.
## Papers
* [SD-WAN Internet Census (preprint)](https://arxiv.org/abs/1808.09027)
* [SD-WAN Threat Landscape (preprint)](https://arxiv.org/abs/1811.04583)
* [Practical Security Assessment of SD-WAN Implementations](https://medium.com/hackingodyssey/practical-security-assessment-of-sd-wan-implementations-c8aa51441c68)
* [SD-WAN Security: A Product Liability Insurance Law Would Certainly Help](https://blog.ipspace.net/2020/06/sdwan-silver-peak-security.html)
* [SD-WAN TLS Scanning (draft)](https://docs.google.com/document/d/1TCCGWkFKp07Bg7hEeKeqkwogi5UaArbJ_OpEJsyiuy8/)
## Knowledge Base
* [SD-WAN Census Queries List](docs/census.md)
* [SD-WAN Version Leakage List](docs/leakage.md)
* [Silver Peak VXOA 8.1 Vulnerabilities](docs/silverpeak-vxoa-8.1.pdf)
## Public Reports
### SilvePeak
* [Malicious Portal Can Access REST API on EdgeConnect](reports/SDWAN-New-Hop-2020-31-01.pdf)
* [Malicious or Untrusted Orchestrator Can Access REST API on EdgeConnect](reports/SDWAN-New-Hop-2020-30-01.pdf)
* [SilverPeak’s IPsec UDP protocol implementation fails to provide forward secrecy](reports/SDWAN-New-Hop-2020-17-01.pdf)
* [Silverpeak EdgeConnect Multiple Vulnerabilities](reports/Silverpeak%20EdgeConnect%20Multiple%20Vulnerabilities%20-%20032018.pdf)
### Citrix
* [Citrix SD-WAN Center Security Findings](reports/Citrix%20SD-WAN%20Security%20Findings.pdf)
* [Citrix NetScaler SD-WAN Security Findings](reports/Citrix%20NetScaler%20SD-WAN%20Security%20Findings%20-%2011082018.pdf)
### Riverbed
* [Riverbed SteelConnect Vulnerabilities](reports/Riverbed%20SteelConnect%20Vulnerabilities.pdf)
### Viprinet
* [Viprinet Virtual VPN Hub Stored XSS](reports/Viprinet%20Stored%20XSS.pdf)
### Versa
* [Versa Analytics Security Assessment](reports/Versa%20Analytics%20Security%20Assessment%20-%2009112019.pdf)
## Checklists
* [SD-WAN Security Assessment: The First Hours](checklists/sd-wan-security-assessment-the-first-hours.md)
## Tools
* [Grinder Framework](https://github.com/sdnewhop/grinder)
* [SD-WAN Harvester](https://github.com/sdnewhop/sdwan-harvester)
* [SD-WAN Infiltrator](https://github.com/sdnewhop/sdwan-infiltrator)
## Slides
* [SD-WAN Secure Communication Designs and Vulnerabilities. DeepSec 2019](slides/DeepSec-2019.pdf)
* [One Framework to Rule Them All: A framework for Internet-connected Device Census. OFFZONE 2019](/slides/offzone-grinder-2019.pdf)
* [A dive in to SD-WAN Insecure Designs and Vulnerabilities. SecurityFest 2019](slides/securityfest-2019.pdf)
* [SD-WAN New Hope. PHDays 2019](slides/phdays-2019.pdf)
* [SD-WAN Secure Communications. Yandex OSN Meetup 2019](slides/yandex-osn-2019.pdf)
* [SD-WAN: Yet Another Way to Unsafe Internet. InsomniHack 2019](slides/insomnihack-2019.pdf)
* [SD-WAN Internet Census. Zero Nights 2018](slides/zn-2018.pdf)
* ["WebGoat.SDWAN.Net" in Depth. Power of Community 2018](slides/poc-2018.pdf)
* [Practical Threat Modeling for SD-WAN. Area 41 2018](slides/area41-2018.pdf)
* [Too Soft[ware Defined] Networks: SD-WAN Vulnerability Assessment. Black Hat USA 2018](slides/blackhat-2018.pdf)
## Talks
* [SD-WAN Secure Communications Design and Vulnerabilities. DeepSec 2019](https://vimeo.com/390850895)
* [SD-WAN Secure Communications. Yandex OSN Meetup 2019 (Russian)](https://www.youtube.com/watch?v=gHRustiUdKY)
* [SD-WAN a New Hop. How to hack software defined network and keep your sanity? CCC 2018](https://media.ccc.de/v/35c3-9446-sd-wan_a_new_hop)
* [How To Hack SD-WAN And Keep Your Sanity? Ekoparty 2018](https://www.youtube.com/watch?v=8jY0yPlW7xg)
## Contributors
- [Sergey Gordeychik](https://twitter.com/scadasl)
- [Alex Timorin](https://twitter.com/atimorin)
- [Denis Kolegov](https://twitter.com/dnkolegov)
- Maxim Gorbunov
- [Christoph Jaggi](https://uebermeister.com/about.html)
- [Nikolay Tkachenko](https://twitter.com/afr1ka_)
- [Nikita Oleksov](https://twitter.com/neoleksov)
- [Oleg Broslavsky](https://twitter.com/yalegko)
- [Anton Nikolaev](https://github.com/manmolecular)
- [Maria Nedyak](https://twitter.com/msh_smlv)
================================================
FILE: checklists/sd-wan-security-assessment-the-first-hours.md
================================================
# SD-WAN Security Assessment: The First Hours
## Introduction
Suppose you need to perform a security assessment of an SD-WAN solution.
There are several reasons for this and one of them is selecting an SD-WAN provider or product.
A traditional SD-WAN system involves many planes, technologies, mechanisms, services, protocols and features.
It has distributed and multilayered architecture. So where should you start?
This document follows JP Aumasson's approach described in a series of auditing crypto articles
([[1](https://research.kudelskisecurity.com/2019/02/07/auditing-rust-crypto-the-first-hours/)],
[[2](https://research.kudelskisecurity.com/2017/04/24/auditing-code-for-crypto-flaws-the-first-30-minutes/)]).
The main goal of this document is to list basic sanity checks that can be used when investigating SD-WAN.
We will consider general checks that can be applied to any SD-WAN system.
## SD-WAN Security Assessment Checklist
### Common
1. What third-party components and libraries are used? How secure are these? Are the components using their latest versions?
2. Run [lynis](https://github.com/CISOfy/lynis) tool on each node and assess hardening level.
3. Run a host-based vulnerability scanner ([vulners](https://github.com/videns/vulners-scanner), [LibScanner](https://github.com/DanBeard/LibScanner), etc.) and assess patch management level.
4. Run a web vulnerability scanner (e.g., `Burp Suite`, `Acunetix`, etc.) against a web management interface.
### Architecture
1. Is a vendor-controlled cloud management interface used within the architecture?
### Zero Touch Provisioning
1. How does a network device get its initial configuration?
2. How does a network device discover a controller, orchestrator and other entities?
3. How do network devices, the controller and the orchestrator authenticate each other?
4. How trust is provisioned and what mechanisms are used? One-time tokens, X.509 certificates, login and password, pre-shared keys?
5. How do re-discovering or re-joining mechanisms work?
### Cryptography
1. Which cryptographic protocols and implementations are used on the dataplane?
2. Which cryptographic protocols and implementations are used on the controlplane?
3. Are AEAD ciphers supported?
4. How key management is implemented?
5. How consistent are the security levels of the various protocols and primitives?
6. Look for legacy primitives like DES, TripleDES, RC4, MD5, SHA1 or custom primitives.
7. Is it possible to control cryptographic mechanisms (e.g., enable TLS 1.3 only, disable unwanted ciphers, etc.)?
8. Run a TLS scanner (e.g., `testssl.sh`, SSL Labs server scanner, `sslyze`, etc.) against TLS-enabled interfaces and assess the results.
9. Run an SSH scanner (e.g., `ssh_scan`) against SSH-enabled interfaces.
10. Which type of PKI is used? Public or private?
### Secure Communications
1. Which protocols are used between orchestrator, controller, and edge devices? Are they secured?
2. How SD-WAN entities do authenticate each other?
3. Run WireShark on each node (orchestrator, controller, edge router), review traffic and check whether unencrypted sensitive packets are sent.
4. Do the chosen protocols and primitives provide the security required by your threat model?
5. Is RSA key exchange used?
6. Where and how secrets (e.g., private keys, pre-shared keys, tokens) are stored?
7. Check whether the same hardcoded certificate is used on different deployments.
8. Is a key renewal mechanism supported on control channels?
### Web Management Interface
1. Check protection mechanisms against CSRF attacks.
2. Check HTTPS supporting and web hardening mechanisms: secure headers, content-security policy, CORS headers.
3. Test all HTTP services against Slow HTTP DoS attacks.
4. Are cryptography secrets accessible via the Web interface?
================================================
FILE: data/tcp2156.json
================================================
[
{ "ip": "13.71.84.216", "timestamp": "1540077658", "ports": [ {"port": 2156, "proto": "tcp", "service": {"name": "X509", "banner": "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"} } ] }
]
================================================
FILE: data/viptela_banners.json
================================================
{"ip":"151.181.50.132","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.2","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"a67It00vj1enPRhKb88dZA==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"KuElKRglEc1h6DCz/PZyDfzHowUUMxFThLjgjV2y7DM=","length":256},"y":{"value":"+9ynLEfhTH8ehj8K2b70ix1/ozMjYrS3FbVI6iAAt0A=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDD9fVpQWYqD9GfCEW747VbWcJwwHQRwmqHa2erAhPs5AAAACAgxyb7Oz88ioCl5HJ5PN4EHBJsMTC61kZLxzCCMObRiA=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQDD9fVpQWYqD9GfCEW747VbWcJwwHQRwmqHa2erAhPs5AAAACAgxyb7Oz88ioCl5HJ5PN4EHBJsMTC61kZLxzCCMObRiA==","h":"QTRoO8vK0s5/o8A9iGma3rfbfEZXiNtBsa8e/QN4hY8="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"u7X9FPqw8AsFTehwDbhD5m8PRNcK1U3Nt+YO7/kpSPA=","y":"IF4mt32b1Zzdc0TDzStS7e4g9MzQJryp8HWWdPAgMHg="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLu1/RT6sPALBU3ocA24Q+ZvD0TXCtVNzbfmDu/5KUjwIF4mt32b1Zzdc0TDzStS7e4g9MzQJryp8HWWdPAgMHg=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"7025c0989ac73a90a25fd666ea05736585980060b09af81ba13f750559df7e63"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T17:46:00+03:00"}}}
{"ip":"155.239.244.214","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 16.2.10","server_id":{"raw":"SSH-2.0-OpenSSH_7.1","version":"2.0","software":"OpenSSH_7.1"},"server_key_exchange":{"cookie":"xYQtwkXRbncQKCQNiJ70ug==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"5X+PxLT7JZXGeugvRsZxXFbgYHA0ZsjPZ5/s5vOHwj8="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCxWiaqNUbqdV3Kl14HNZ/X+m+z3bO2kPFsNtflismvwAAAACEA4BA1kvjP3Ej8ZNkIn9maJp8Kmdq9OCPPujzQ8M6AcA4="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCxWiaqNUbqdV3Kl14HNZ/X+m+z3bO2kPFsNtflismvwAAAACEA4BA1kvjP3Ej8ZNkIn9maJp8Kmdq9OCPPujzQ8M6AcA4=","h":"00+hB2m+dukHfBNpieaaoZrKgXESVj01YOMJzB2uwVc="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"uoujkFS5ENOVyBcx0r659DIcfHjWeUaBMF05UW6CRBo=","y":"B5mWoKuzaL7JVs86w8TWBgc2m4stQbBxJ08MgvCocwE="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLqLo5BUuRDTlcgXMdK+ufQyHHx41nlGgTBdOVFugkQaB5mWoKuzaL7JVs86w8TWBgc2m4stQbBxJ08MgvCocwE=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"bd816a592658061292ef0154cd6bab872fdead05b0f4ee24bebb627a3bdb297c"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T18:26:14+03:00"}}}
{"ip":"104.42.62.206","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 99.99.999-1206","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"zof61sK5YZw/YW6yqpz7Vg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"freQZGd/2e6Uj45ZzFVz3NT2B1OUN8XKW+EdkD7kspI=","length":256},"y":{"value":"kzsYCYaxd+LinS8GLRsgNGJUs8k1n9lOURt/jd/YJTc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDlkfpv1+ZdMh/1Bnmtsxr1J1kCaII7ryarXuPt2U0MSQAAACEAqz3KNGK31Tv2Bpz5iKW5ao10VXmzT2PMxj/kQIl5s/M="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDlkfpv1+ZdMh/1Bnmtsxr1J1kCaII7ryarXuPt2U0MSQAAACEAqz3KNGK31Tv2Bpz5iKW5ao10VXmzT2PMxj/kQIl5s/M=","h":"QKLgVx0rHnEcRaz85pIE17yzNvP0s89yZjbhIgbAWRk="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"ThK5y69DY5AC/yKsmrDbdBv1qSjI15sswVDUHuleYjY=","y":"nFb3sRXQfI5Sv7/eml3/e7WjEx9f4cfNvia/4Jcll2A="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBE4SucuvQ2OQAv8irJqw23Qb9akoyNebLMFQ1B7pXmI2nFb3sRXQfI5Sv7/eml3/e7WjEx9f4cfNvia/4Jcll2A=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a2c9f8956e51348f03c6534cb88a1109a660b4ae871783d447984f74ae6f91bd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T18:43:04+03:00"}}}
{"ip":"70.34.62.17","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.7","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"EMpDdtY3LV885MPlzWD3kQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"EtMbppc8bQMnQzVYM/KNrYiKoYU30Ib+1x70HsUPnjE=","length":256},"y":{"value":"s4U8ydeXCUMU2Ugc0V/heW33UAhaLFgsKOu7TZAnc1o=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIFA9ce1EBJyfc+/C+uJVLGEGLp669+5NblQSvrGtL3T0AAAAIHfdlPwUxxX06UwdFkxDvgEz3if3dHBjFTy24rQe33Rm"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIFA9ce1EBJyfc+/C+uJVLGEGLp669+5NblQSvrGtL3T0AAAAIHfdlPwUxxX06UwdFkxDvgEz3if3dHBjFTy24rQe33Rm","h":"Sob56eoCCwGm+wOXBWmXkW7ECbaFaH8o2RNKW7YiuIA="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"PA/6vWrUYmA+8LRpNPQsCgM65qij1dJhqgF8HZipE58=","y":"P7zmdwdj4jtBQW8YAY+3o3+luTIe75CqXm/d9I9K0yQ="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDwP+r1q1GJgPvC0aTT0LAoDOuaoo9XSYaoBfB2YqROfP7zmdwdj4jtBQW8YAY+3o3+luTIe75CqXm/d9I9K0yQ=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"4b4bb75fe46b42331d9dee45ab0ae78efb6814ce0cc7953fc5416b469c808990"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T19:36:47+03:00"}}}
{"ip":"174.64.55.162","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.8","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"8gK9UtASmFpOG1QuZuAUfQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"O36nPaw+Xl2n/itJ3J1/ddznIVErvRJ4eyKsNNYHmo8=","length":256},"y":{"value":"HR4UeB4fXemo/AkNV9byBtgPJhSPznqdFqtWbtEYZQE=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIGeAMJgOK9V4oHCcYJ62Xeo084tjDSh+gatbdilpmUS/AAAAIH1O/oQKQf6yHHKEpO7nRh5vXIog+eFZx9+Aqe56qOUO"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIGeAMJgOK9V4oHCcYJ62Xeo084tjDSh+gatbdilpmUS/AAAAIH1O/oQKQf6yHHKEpO7nRh5vXIog+eFZx9+Aqe56qOUO","h":"mtnBBAJhnm6xgOQGuqpNgHYzp2+q3WlI+X9RXkN3AgQ="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"5tUzzskfAH+d5OaFrHzyfv2hnPlmgL0BNIjOdrqMdvg=","y":"2ljd2FGWDQn2rPYHYyYa19HK3L75uQXqQWV48MR/0Jw="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBObVM87JHwB/neTmhax88n79oZz5ZoC9ATSIzna6jHb42ljd2FGWDQn2rPYHYyYa19HK3L75uQXqQWV48MR/0Jw=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"ee05d5a0fc4950d7184fa955ca47973e5e57fe6b29726852e5a8bdf8ce7a6bef"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T19:47:51+03:00"}}}
{"ip":"75.96.163.163","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"3qZKRekX47yKv8Ojy5FA4w==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"bH0W7Qg0YhXvq5vqGYTJKBY+NNRson2QkB1MOqLjC3w=","length":256},"y":{"value":"f+h+pCtqPYx0P2x01zI3zNz2+jzIflAnw3kjVwJ7BvU=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIHtiFXJW0v1SCP6apy/a3Zro1XW7nxeiADmUX8IxL9wjAAAAIFGv/rK8/kDUEXBEQ2Wruajy7mCP2JFf239HZ26Z5nJ2"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIHtiFXJW0v1SCP6apy/a3Zro1XW7nxeiADmUX8IxL9wjAAAAIFGv/rK8/kDUEXBEQ2Wruajy7mCP2JFf239HZ26Z5nJ2","h":"j+HMKjutO/Jv2Hx3kZNVgk+0lmpH4D4tWXbPLV+quCs="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"i7e3Xjp4aVPCUPMdlDf93Q4f58IuvZIKdTyRMCwGHog=","y":"8efwMfisr1wpzy3Ml7iacXwMPmsc1NV4mz02PhiGM9A="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIu3t146eGlTwlDzHZQ3/d0OH+fCLr2SCnU8kTAsBh6I8efwMfisr1wpzy3Ml7iacXwMPmsc1NV4mz02PhiGM9A=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a963b5bd10fe0e619a6b7a531f0f5a17f28c20a9ddfbe2eaf19672e8ea3b36c5"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T22:46:24+03:00"}}}
{"ip":"112.87.40.254","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"wWVR8uMJXNNYKijOyk7ikQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"ZqKChq9rY26TQJp3tOy0lpEEULW0L2jX2Q9HUj/wj6c=","length":256},"y":{"value":"PxHLMo7IYRNjv5gk00G1Fwc4sSfltoXnNSx0TsTkonA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIBuVJgjBZp4wKYM2HTT0M5+xrA9kn40sLJhGhf30EJr1AAAAIQDFMKHboTExDxJg8dl279DOG2TSQutvQTIy+IZT3D7PYA=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIBuVJgjBZp4wKYM2HTT0M5+xrA9kn40sLJhGhf30EJr1AAAAIQDFMKHboTExDxJg8dl279DOG2TSQutvQTIy+IZT3D7PYA==","h":"SNHBiteYTjA+ZvYQZzpUGJOWUG4Euxe1hU57oFpI0/4="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"JfInZ5o2XLf2VTCPyQomQb8Rv3AXIJXGyWGSxW5YAkc=","y":"c4aJ8D9REm9iMNAqDlSCWMY7z9xluGUO4nTbpNX1ak4="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCXyJ2eaNly39lUwj8kKJkG/Eb9wFyCVxslhksVuWAJHc4aJ8D9REm9iMNAqDlSCWMY7z9xluGUO4nTbpNX1ak4=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"06382d922ab980e0027cdfdaaef9157b95303cbc5f9a9e13aea3167eec25e794"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T23:18:06+03:00"}}}
{"ip":"124.7.227.123","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.1","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"6CrcFeNzl7rNSvxDAUi6PQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"ppxekjdKbbRp9mW+LL4cz1fl84CKrw5Nlf8zwZnP/10=","length":256},"y":{"value":"JU0Q6ukEWKYOejJFkbamcCtwceE1Achq1K8wn7KAvBc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCig3Lo7lsxScnDP4UWAv5Sgwip8szeslgqLG2vFClyBAAAACEAsrxINWk1y1GRcY5RigBehHjHjPJoF1b+31XBVNzDIEQ="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCig3Lo7lsxScnDP4UWAv5Sgwip8szeslgqLG2vFClyBAAAACEAsrxINWk1y1GRcY5RigBehHjHjPJoF1b+31XBVNzDIEQ=","h":"uJZuWwPcqExgfyk1pN1NCkCErLej6QTxJWVrm8YIO6o="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"fTuEainJhEU95o3oGmjf4nyOZAhqaZVVPZZeRWsVeos=","y":"BBsGuOGRfEZ4XiECzL86W2FOVb90jmNZEgUjp1j18gs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBH07hGopyYRFPeaN6Bpo3+J8jmQIammVVT2WXkVrFXqLBBsGuOGRfEZ4XiECzL86W2FOVb90jmNZEgUjp1j18gs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"6926a33e7780eaf38597f58b50571942ff1340e6940f0e3d1ee48edad0140faa"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T23:49:23+03:00"}}}
{"ip":"54.241.63.230","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"MWMje8aVfH4f06kzm4KuUg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"1CwEKZ86EKEp+gsiWHSsdhkGtPjrZjWYGRRmd5r0zYs=","length":256},"y":{"value":"IHGsztGby8A2+h50H6xUMn1B9CZQxHvIGd9pdXYJGas=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIB79DXAXh4K9b99XE44tIiTlTyggyX3eHxgrrqtEyh3XAAAAIQDq2iTOoKwEcgwk88+RZ93oiSoy6fix7pu+Hq5D+DAn0w=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIB79DXAXh4K9b99XE44tIiTlTyggyX3eHxgrrqtEyh3XAAAAIQDq2iTOoKwEcgwk88+RZ93oiSoy6fix7pu+Hq5D+DAn0w==","h":"aGJ3jcT70DDYelaYfYPt1S0wd0WIzIjqPbFYUJOtlPU="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"5QvakK7q0iLstcYkeuBBjzWCu1jSoQlgOAgCV1ohP3w=","y":"rWK3tjbwYtUPKWgYTLZmBhNeFwRrbIYM/4w35100pmA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBOUL2pCu6tIi7LXGJHrgQY81grtY0qEJYDgIAldaIT98rWK3tjbwYtUPKWgYTLZmBhNeFwRrbIYM/4w35100pmA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"49f2515834ec214ef66c24a1a1ba3a5d4898f002477b212776c0e5b647991b02"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T00:02:35+03:00"}}}
{"ip":"51.140.7.18","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.1.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"61o3dv2qTCura0jrVvj0PQ==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"ZzKeBWnKGC5OHLzP4TmgKWlt3zkA6YsIQ5rAtif+zmU="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQC1q5C8IZ0Go+U/ppBvMYnc2VeiU1xSoVgDH4vc6aXwkQAAACBR8r1/R40VwwEldoBBXgsfN5hanhBcqdGiA8JMgVz35g=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQC1q5C8IZ0Go+U/ppBvMYnc2VeiU1xSoVgDH4vc6aXwkQAAACBR8r1/R40VwwEldoBBXgsfN5hanhBcqdGiA8JMgVz35g==","h":"hh8XxYwqCX3ZUqd3/K7fGDyGRtXN9E9PgzP+2aJtb0I="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"bePZSXLsTuXsx6lqtsxFjX/hChj4/1/E6frRS20+aOo=","y":"T9K/a5NTIAmIPZggJ7x1KchLxVBqUi94jOMGEkBDJtw="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBG3j2Uly7E7l7MeparbMRY1/4QoY+P9fxOn60UttPmjqT9K/a5NTIAmIPZggJ7x1KchLxVBqUi94jOMGEkBDJtw=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"ce49ce829a9ff41680b264b75a50c24fa415b8204089d885dc4ae83c4ce9e2ad"}},"userauth":["publickey","password","keyboard-interactive"]},"timestamp":"2018-10-22T00:42:02+03:00"}}}
{"ip":"54.226.246.213","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"91fkogJkmfd/IdzpeNcBdw==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"4fqa+GmhU/wpO77yq8p7k/kWeqvhB7BY0qYVTz2Smlw=","length":256},"y":{"value":"XAsLOrRHVoufbElEj0ftOPuT2AGvEJMQO5adq+IIKXA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQD2xLW2jUHifrlxFpfdliQIlA15qM5lFEf1BllY0NgbqAAAACASkXFXTQC1CEl/Osz3MVWxYx78/6iam5WG6fZD7Gxp5A=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQD2xLW2jUHifrlxFpfdliQIlA15qM5lFEf1BllY0NgbqAAAACASkXFXTQC1CEl/Osz3MVWxYx78/6iam5WG6fZD7Gxp5A==","h":"EHIoRJeNJDDpXrOy8unTmyAIHqanHtu6A/nIfb0nY3Q="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"HoeqXvZNYYtTujXItOk3H1sxmSPl2Autuzduvlnl5RI=","y":"YmUNIubUrs9ZuYU6EDtjx/rUT2NdH/FIOgfjC6Wz7uA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBB6Hql72TWGLU7o1yLTpNx9bMZkj5dgLrbs3br5Z5eUSYmUNIubUrs9ZuYU6EDtjx/rUT2NdH/FIOgfjC6Wz7uA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"8a83ecf7c09372d6aa6a1108b98491a58577dbede0796d476ce164754feeaa48"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T01:19:41+03:00"}}}
{"ip":"85.245.105.159","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"2iI6hTvvSFO3o8TtmLGogg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"IqpiV+ZiLz26htioWSqhBZAeeWxrFCHFBMj8vDDX1qw=","length":256},"y":{"value":"cwgSugSNSFH+21rk6+pPtpN3E92MNegYIxqQgVFgXJA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCNq+2y6NaIcCkBy/wdSReFFd09bQx+6RSOFI5uNsYwNQAAACEAjbVM5XNJQmnPX8+48fOXu9voXgwhEZ5kKxfcyfpWPmY="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCNq+2y6NaIcCkBy/wdSReFFd09bQx+6RSOFI5uNsYwNQAAACEAjbVM5XNJQmnPX8+48fOXu9voXgwhEZ5kKxfcyfpWPmY=","h":"FbCb69KNcNnwleP/+HLKwEsDMOyjw/wxWYu88ElhGJw="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"DyareNS6uDhmXQbxl8neht7L3Jey+m9I712hmeJcbcw=","y":"B7l0UaYM4UvmqOfL/3s38HrOFx6WNgP74uN/YFrx9HA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA8mq3jUurg4Zl0G8ZfJ3obey9yXsvpvSO9doZniXG3MB7l0UaYM4UvmqOfL/3s38HrOFx6WNgP74uN/YFrx9HA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a851b6ae60adf5b3450cd2bbe10a44586ea71ceef0676e32ee38b5a6b0335395"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T02:20:29+03:00"}}}
{"ip":"205.252.8.66","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.3","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"l0qHro1fYizQjSHRRpmu2A==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"NkZwMsBuUgGlORXdBJnx9OgKDoOpXLFEpS1019nZd/U=","length":256},"y":{"value":"3cpjNB0vjFl+HM9a/e1Qey7v0opG8fI4GRrZpyI4yrQ=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIFhJa+RaYpA/1AK5TBX9YjK5W1f2Hdd6Wc0J0RMb5KNhAAAAIQCKn25cDLpgGG1/b+PUxvsoapfiED+qoclKQKJ4SHaDjw=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIFhJa+RaYpA/1AK5TBX9YjK5W1f2Hdd6Wc0J0RMb5KNhAAAAIQCKn25cDLpgGG1/b+PUxvsoapfiED+qoclKQKJ4SHaDjw==","h":"gjxIR18yKlI8PC/7OzBGCzNfoSnq2fnDbdv3V0cuF20="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"zB4QAMLbFEUWxOWmC3jRb8p/YZu4bo6q4BW800rR67w=","y":"P20tTyZW8P35h2VtcUfBh/ymsuTAn1NGWda31p56JsA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMweEADC2xRFFsTlpgt40W/Kf2GbuG6OquAVvNNK0eu8P20tTyZW8P35h2VtcUfBh/ymsuTAn1NGWda31p56JsA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"c894301b68163f3a44fc4cc8ce4aadc866d80f8b0fd44ec09d13acfae23cfe57"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T02:22:12+03:00"}}}
{"ip":"185.11.3.15","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 16.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"EsZEcUfoms88aC236oedLQ==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"2SksfDyheWAZOrKpd0XPx1+C0PtNG5y+SUYlenZ1UHs="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDapb28C31O/5Z3VLzgW3hBCKEzAUKdo94ZN0OcN53NDQAAACEA1kpn0m8foKGk9zM7XD4h8dfoacB4Ho6RqfqR2EIp5lA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDapb28C31O/5Z3VLzgW3hBCKEzAUKdo94ZN0OcN53NDQAAACEA1kpn0m8foKGk9zM7XD4h8dfoacB4Ho6RqfqR2EIp5lA=","h":"4oWbVNGQidl8GKq8KV+TxR+2CsCjhFi+O7yXkq+sEL4="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"paBNxFujwrMCiE0fX4H40rZSIrvamU/DzBo3a+DJXp4=","y":"+0UWgdSO+mfWvK6qFo6tNMsRrfYMymZzbDjwlw8Isfs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKWgTcRbo8KzAohNH1+B+NK2UiK72plPw8waN2vgyV6e+0UWgdSO+mfWvK6qFo6tNMsRrfYMymZzbDjwlw8Isfs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"026f5dce123021b53b98c85c0a56297f1af0e3d36ce20a9ce4880f8d76c16570"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T03:46:30+03:00"}}}
{"ip":"205.252.8.72","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.2","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"55KKkaAZRbT5cjmAVU5H3g==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"wGLmnUTdDkW/slruS/EqdmdqZJpcW5nv/1AlQKE8YZM=","length":256},"y":{"value":"XmT16+WjTftfXankU3nXigSenQaKnl9QaqtipIkOFFg=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIF2gHT+Fnkp20Q8OAdn5H7T9zGDWaKXsAIZelzbM6DCDAAAAIDkjXAAbqdhYsTEdPJ1z2s0Gz/kLOjIOl1C0ioUkzUeX"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIF2gHT+Fnkp20Q8OAdn5H7T9zGDWaKXsAIZelzbM6DCDAAAAIDkjXAAbqdhYsTEdPJ1z2s0Gz/kLOjIOl1C0ioUkzUeX","h":"vrw9qzDrwq0QZcroSthWQM4TPUQiCiqD8ztoj+jnrUU="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"BMAQ7pv+DlqbcBmZfs2JKi2iFCdI13apVK2RUMvpeAw=","y":"giwS6FHwlCofm6MVeC+35gZdd4u72ObydYGAzVqATaI="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBATAEO6b/g5am3AZmX7NiSotohQnSNd2qVStkVDL6XgMgiwS6FHwlCofm6MVeC+35gZdd4u72ObydYGAzVqATaI=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"519f5285490550d113fa8849ffee603738140f71e65d9f18362eb84d2e71d4bd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T04:37:06+03:00"}}}
{"ip":"195.166.122.130","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"m0gfNL6VnswWM1tX/mebLg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"LzmrJZOSkz/fRSht0xDyrDyyhaazJpMWEfDOoCZkrj0=","length":256},"y":{"value":"mBVWuuTXd0Wex9DP6spp1d/Z4U5tVLj0+QSM74LANDg=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDmVxkfOVEvxDgrr+1lpowAaP/oLEwhgHOpvmDHzx/eXgAAACEAi/HZ9nW5tMzt7CYNcGnPcrr4l9WP4S3Pdy0zhhwGxPE="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDmVxkfOVEvxDgrr+1lpowAaP/oLEwhgHOpvmDHzx/eXgAAACEAi/HZ9nW5tMzt7CYNcGnPcrr4l9WP4S3Pdy0zhhwGxPE=","h":"amm2UbppXcvX9wUoiEBNz6XJlzofklw8vTPZl+ImiWo="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"POLjnVdNiahpgafHksUGhB7VX1vrjEaPN/FKc2Iddoo=","y":"6wsC4h5sk+nqh6chgsznL0ZXBsKwsYcVl77Uc3tEoQM="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDzi451XTYmoaYGnx5LFBoQe1V9b64xGjzfxSnNiHXaK6wsC4h5sk+nqh6chgsznL0ZXBsKwsYcVl77Uc3tEoQM=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"4d883498466f34c562b0e3e617cf4abbae74e88bf2df504f80f4f50b4987bfbe"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T04:39:01+03:00"}}}
{"ip":"195.151.17.35","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.1","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"yBExcNvFhSfWhAi1wXS2vA==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"V2WDSHnv6U781Zta23+Ab/Q0X76O9OfUZ2pMyMeahaA=","length":256},"y":{"value":"bDcseWOteOzIfHWvwPfv1mNe2Q/gbK3d3fNIoGvDG0c=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQD/wrCjC1wcJPN6G7smARFFoN3b1ugCAfuaXWB8dLIdBgAAACBIeQoQUVP1rf0j0CQdL/jsKAdDtIKQD4qJh+KPOJn9hw=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQD/wrCjC1wcJPN6G7smARFFoN3b1ugCAfuaXWB8dLIdBgAAACBIeQoQUVP1rf0j0CQdL/jsKAdDtIKQD4qJh+KPOJn9hw==","h":"ftRJ9Zy1sDXzEfVoIc4Am7BWtR8gmeuM2ezeMvMPWtA="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"vTg1891rUwfuDfdfllmO+0HHPCuLiBYLBHep92z2RJ4=","y":"VuBXHqztkdp9hESyhOn36XDdnRDYvaFypSoUIvz0HAg="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL04NfPda1MH7g33X5ZZjvtBxzwri4gWCwR3qfds9kSeVuBXHqztkdp9hESyhOn36XDdnRDYvaFypSoUIvz0HAg=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"b969e5401bddeabe80633791a2f1bdc5b869e8500b311f4b0de5780af5eb16dd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T05:39:24+03:00"}}}
{"ip":"185.102.148.177","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"pk82gwMIP/SflYiTyfpaFg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"7vnzJNY4HvzRfsSM1UaKD4fPx+uchffNB4J3D6L57Sk=","length":256},"y":{"value":"WzAkqvoX8zU1lQotxPRhF1pRcvYjm8uFdwjTGU9cQb0=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAICRBq5OFiZDEGp1u/JFoyt14mnOx9lrkt8SerUiwBk9WAAAAIQCS7Jrop57WDP8kkHe6XB9Pp6xwUq7GhFkNS9AWr7C96A=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAICRBq5OFiZDEGp1u/JFoyt14mnOx9lrkt8SerUiwBk9WAAAAIQCS7Jrop57WDP8kkHe6XB9Pp6xwUq7GhFkNS9AWr7C96A==","h":"Eh25ZNYmbpBZ8/CDfvN6hM8VyGmp2tvc3nbfWuuTMRY="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"VO1S6PCm2YtlvN5khFB254qy/y+BC7yKWGLdgDcnguU=","y":"DKjJkEJg/k+1G3gWUoXkPYAcJdk3ySRvFIpJoVuKlW8="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFTtUujwptmLZbzeZIRQdueKsv8vgQu8ilhi3YA3J4LlDKjJkEJg/k+1G3gWUoXkPYAcJdk3ySRvFIpJoVuKlW8=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"1444453e75cf09c3daaa3a644e82c9c394aa698d4d40fc9ccc77de015d22f8c2"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T05:42:12+03:00"}}}
{"ip":"193.213.208.104","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.2.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"k/lhzrznKUl7qYxxwofyNQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"4zTMKvIYnkUa8rpxL0m4rRIWzaznFMxff+de6pPMKWM=","length":256},"y":{"value":"dgEKzVf7W+geXpYqtbgcHikd0QRLGlLMaT61Ipbgthc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCO31vESW4cLLQ2B+M4LkrcTvpVCMFpWd7InPsA7YjeKwAAACEAxGdyRmUyu+GQtqkSJS++myANqGzBA4JGM3rVw9NMsHM="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCO31vESW4cLLQ2B+M4LkrcTvpVCMFpWd7InPsA7YjeKwAAACEAxGdyRmUyu+GQtqkSJS++myANqGzBA4JGM3rVw9NMsHM=","h":"ztazrQeKI0ykk7930ISftWNkKkzk5igPcMrLkan34cM="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"I2NMY+lf3191uK28AQuLkZ6ytU0Ssa+AK0lVRgIOxoU=","y":"p/yW9Sh6RWQl36pkw+OeUAKgfHE7a8ycr5Mr3+MGOXs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCNjTGPpX99fdbitvAELi5GesrVNErGvgCtJVUYCDsaFp/yW9Sh6RWQl36pkw+OeUAKgfHE7a8ycr5Mr3+MGOXs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"b55ba0b401059b5e83b9d2ca132e5a6f115351306f48098cd505ea124afe01c9"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T06:00:22+03:00"}}}
================================================
FILE: docs/census.md
================================================
# SD-WAN Internet Census
## Overview
The most popular and known SD-WAN solutions are enumerated using search engines.
## Vendors
- [VMWare NSX SD-WAN](#vmware-nsx-sd-wan)
- [TELoIP VINO SD-WAN](#teloip-vino-sd-wan)
- [Fatpipe SYMPHONY SD-WAN](#fatpipe-symphony-sd-wan)
- [Cisco SD-WAN](#cisco-sd-wan)
- [Versa Networks](#versa-networks)
- [Riverbed SD-WAN](#riverbed-steelconnect)
- [Citrix NetScaler SD-WAN](#citrix-netscaler-sd-wan)
- [Silver Peak SD-WAN](#silver-peak)
- [CloudGenix SD-WAN](#cloudgenix-sd-wan)
- [Ecessa WANworX SD-WAN](#ecessa-wanworx-sd-wan)
- [Nuage Networks SD-WAN (VNS)](#nuage-networks-sd-wan-vns)
- [Juniper Networks Contrail SD-WAN](#juniper-networks-contrail-sd-wan)
- [Talari SD-WAN](#talari-sd-wan)
- [Aryaka SD-WAN](#aryaka-sd-wan)
- [InfoVista SD-WAN](#infovista-sd-wan)
- [Huawei SD-WAN](#huawei-sd-wan)
- [Sonus SD-WAN](#sonus-sd-wan)
- [Arista Networks EOS](#arista-networks-eos)
- [128 Technology](#128-technology)
- [Glue Networks](#glue-networks)
- [Barracuda Networks](#barracuda-networks)
- [Viprinet](#viprinet)
- [Cradlepoint](#cradlepoint)
- [Fortinet](#fortinet)
- [Brain4Net](#brain4net)
- [FlexiWAN](#flexiwan)
- [OpenDaylight](#opendaylight)
- [Tallac Networks](#tallac-networks)
- [Cato Networks](#cato-networks)
- [SimpleWAN](#simplewan)
- [Brocade Communications Systems](#brocade-communications-systems)
- [Ubiquiti Networks](#ubiquiti-networks)
- [Masergy](#masergy)
## VMWare NSX SD-WAN
Confidence: Certain
### Google
* intitle:"Welcome to VeloCloud Page"
* "2013-2017 VeloCloud Networks"
### Shodan
* title:"VeloCloud"
* title:"VeloCloud Orchestrator"
* http.html_hash:1218757368
* http.favicon.hash:-2062596654 title:"301 Moved Permanently"
### Censys
* 80.http.get.body:"VeloCloud Network Orchestrator"
* 80.http.get.body_sha256:ebaa382148c391357fa0976ccb8cf947a035e8be642190a4c9dff2c8a6ce1a0a
## TELoIP VINO SD-WAN
Confidence: Certain
### Google
* intitle:"Teloip Orchestrator API"
* "The following operations are supported. For a formal definition, please review the Service XSD."
### Shodan
* title:"Teloip Orchestrator API"
### Censys
* 80.http.get.body: "The following operations are supported. For a formal definition, please review the Service XSD." AND "Teloip Orchestrator API"
## Fatpipe SYMPHONY SD-WAN
Confidence: Certain
### Google
* inurl:/fpui/jsp/login.jsp
* intitle:"FatPipe WARP" "Log in"
### Shodan
* Linux Fatpipe
* title:"Fatpipe WARP" port:443
### Censys
* 80.http.get.title:"FatPipe WARP"
* 80.http.get.body_sha256: 81a46930a7041737c0c2b94299c14672e192ae4555fccd88cbc369755e84edc7
## Cisco SD-WAN
Confidence: Certain
### Google
* intitle:"Cisco vManage"
* intitle:"Viptela vManage"
### Shodan
* title:"Viptela vManage"
* title:"Cisco vManage"
* title:vManage
* http.favicon.hash:-904700687
* ssl:"O=Viptela Inc"
### Censys
* 80.http.get.title: "Viptela vManage"
* 80.http.get.title: "Cisco vManage"
* 80.http.get.body_sha256: 63575152efde5bec3ab2a28a502f7a15de7146e2b0fdce47ab0bb699676fb66f
* (443.https.tls.certificate.parsed.fingerprint_sha256: "ad4c8962d687837c54a3430e869aadfc359db7fd07d9b0630ec2f355aa7b896a" AND 443.https.tls.certificate.parsed.issuer.common_name: "vmanage") AND protocols.raw: "443/https"
## Versa Networks
Confidence: Certain
### Versa Analytics
#### Shodan
* versa-analytics port:161
* "van_analytics" port:9160
* ssl:"versa-analytics"
* "server:Versa-Analytics-Server"
#### Censys
* 443.https.tls.certificate.parsed.issuer.common_name:"versa-analytics"
### Versa Flex VNF
#### Google
* intitle:"Flex VNF Web-UI"
#### Shodan
* title:"Flex VNF Web-UI"
#### Censys
* 80.http.get.body_sha256: 1d10f43efe5e0da430042178c7c8040d011bd5461279c5006ddabf867aae96cf
* 80.http.get.title: "Flex VNF Web-UI"
### Versa Director
#### Google
* inurl:"versa/app/login"
* intitle:"Versa Director Login"
* "2016 Versa Networks" "All Rights Reserved"
* "2017 Versa Networks" "All Rights Reserved"
#### Shodan
* "server: Versa Director"
* ssl:"VersaDirector"
* ssl:"versa-director"
#### Censys
* 80.http.get.body_sha256:867f6fead63c8809f208c735b87101c85629e404c762631f4ee47f95c07b6184
* 443.https.tls.certificate.parsed.subject_dn:"C=US, ST=California, O=versa-networks, OU=VersaDirector, CN=Director01"
## Riverbed
Confidence: Certain
### Riverbed SteelConnect
### Google
* intitle:"SteelConnect Manager"
### Shodan
* title:"SteelConnect Manager"
* title:"Riverbed AWS Appliance"
### Censys
* 80.http.get.title:"Riverbed AWS Appliance"
### Riverbed SteelHead
### Google
* "Riverbed SteelHead" "Your browser may not be compatible."
### Shodan
* ssl:Riverbed Apache
* http.favicon.hash:-1338133217
* title:"amnesiac Sign in"
### Censys
* 80.http.get.body:"Riverbed SteelHead"
* "This SteelHead WAN optimization appliance is centrally managed as part of the AWS automation features within Riverbed SteelConnect."
## Citrix NetScaler SD-WAN
Confidence: Certain
### Citrix NetScaler SD-WAN VPX
### Google
* intitle:"Citrix NetScaler SD-WAN - Login"
### Shodan
* http.favicon.hash:-1272756243 title:"Citrix NetScaler SD-WAN - Login"
* title:"DC | Login" and ssl:"Citrix"
### Censys
* 443.https.tls.certificate.parsed.fingerprint_sha256:8199d53cf2832a133344559b09987b1d4830e643497f5f01d3178beb379ee7a5
### Citrix NetScaler SD-WAN Center
#### Google
* intitle:"SD-WAN Center | Login" -site:*.citrix.com
#### Shodan
* http.favicon.hash:-1272756243 title:"SD-WAN Center*Login"
* VWCSession
### Censys
* 80.http.get.title:"SD-WAN Center"
* 443.https.tls.certificate.parsed.names:mycitrixdemo.net AND `"<span>NetScaler</span>"`
## Silver Peak
Confidence: Certain
### Silver Peak Unity Orchestrator
### Google
* "Welcome to Unity Orchestrator"
### Shodan
* gmsSessionID
* SSL:"Silverpeak GMS"
### Censys
* 443.https.tls.certificate.parsed.subject.common_name: "Silverpeak GMS"
### Silver Peak Unity EdgeConnect
### Google
* "Silver Peak Appliance Management Console"
### Shodan
* vxoaSessionID
* ssl:"silver-peak"
### Censys
* 80.http.get.body: "By using this product, you agree to be bound by the terms of Silver Peak Systems Inc. " AND 443.https.tls.certificate.parsed.issuer.common_name: "silver-peak"
## CloudGenix SD-WAN
Confidence: Firm
### Shodan
* ssl:"O=CloudGenix Inc"
### Censys
* 443.https.tls.chain.parsed.issuer.organization:"CloudGenix Inc"
## Ecessa WANworX SD-WAN
Confidence: Tentative
### Google
* inurl:"/cgi-bin/pl_web.cgi/login1"
### Shodan
* http.html_hash:-1848258522 title:"Ecessa"
### Censys
* 80.http.get.body_sha256:7b9091bf0d0e65b6bcefa62a81dacc1d30fdf5344aa1d022865822a623aac987
## Nuage Networks SD-WAN (VNS)
Confidence: Certain
### Shodan
* title:"SD-WAN*Portal"
* http.favicon.hash:1069145589
* http.favicon.hash:1069145589 title:"SD-WAN*Portal"
* http.favicon.hash:1069145589 title:"Architect"
* http.favicon.hash:1069145589 title:"VNS portal"
### Censys
* 80.http.get.title:"SD-WAN Portal"
* 80.http.get.body_sha256:c0485f458c574e884168ba9fa07baf16ce86b761ac4dbf81dab9c0f87ed94ed2
## Juniper Networks Contrail SD-WAN
Confidence: Tentative
### Shodan
* title:"Log In - Juniper Networks Web Management"
* "Juniper Networks, Inc." junos srx
## Talari SD-WAN
Confidence: Certain
### Google
* inurl: "/cgi-bin/login.cgi"
### Shodan
* ssl:"emailAddress=support@talari.com"
* http.favicon.hash:269992656
### Censys
* 80.http.get.title:("AWS" AND "Login")
* 443.https.tls.certificate.parsed.issuer_dn:"C=US, ST=California, L=San Jose, O=Talari Networks, Inc., OU=Engineering, CN=Talari, emailAddress=support@talari.com"
* 443.https.tls.certificate.parsed.subject_key_info.fingerprint_sha256: f52b521dc30c3be76b9458f211eafd89fe63519678ff085f1c5c5cd7279a755d
* 80.http.get.body: "© 2017 Talari Networks"
## Aryaka SD-WAN
Confidence: Certain
### Aryaka Network Access Point
#### Google
* intitle:"Aryaka, Welcome"
#### Shodan
* title:"Aryaka"
* "Aryaka Networks"
* http.favicon.hash:-1423557501
* title:"Aryaka, Welcome"
#### Censys
* 443.https.tls.certificate.parsed.subject.organization:"Aryaka Networks, Inc."
## InfoVista SD-WAN
Confidence: Certain
### InfoVista SALSA
#### Google
* inurl:"/salsa/salsa_portal/"
#### Shodan
* ssl:"SALSA Portal"
* "Server: Apache"+title:"SALSA"*"Login" port:443
* title:"SALSA Login"
#### Censys
* 80.http.get.title: ("SALSA" AND "Login")
* 443.https.tls.certificate.parsed.subject.organization: "Ipanema Technologies"
* 80.http.get.body_sha256:0cb459544a3772af457d2538c8de21c3e287e1920b4cc3f472fcd7a85d0acb14
## Huawei SD-WAN
Confidence: Certain
### Shodan
* title:"Agile Controller"
### Censys
* 80.http.get.title:"agile controller"
* 80.http.get.body_sha256:07f90f2912ebcf26b4b372a79e7ac91a2ff5f426e9aabc6b81b30298e18f47f6
## Sonus SD-WAN
Confidence: Certain
### Sonus SBC Management Application
#### Shodan
* title:"SBC Management Application"
### Sonus SBC Edge
#### Shodan
* title:"Sonus SBC Edge Web Interface"
#### Censys
* 80.http.get.title: "Sonus SBC Edge Web Interface"
## Arista Networks
Confidence: Certain
### Arista Networks EOS
#### Shodan
* "Arista Networks EOS"
## 128 Technology
Confidence: Tentative
### 128 Technology Networking Platform
#### Shodan
* http.title:"128T Networking Platform"
* http.favicon.hash:-1556425248
#### Censys
* 80.http.get.title: "128T Networking Platform"
## Glue Networks
Confidence: Certain
### Gluware Control
#### Shodan
* title:"Gluware Control"
#### Censys
* 80.http.get.title: "Gluware Control"
## Barracuda Networks
Confidence: Certain
### Barracuda CloudGen Firewall
#### Shodan
* ssl:"Barracuda CloudGen Firewall" port:"443"
* "Barracuda CloudGen Firewall"
#### Censys
* "Barracuda Cloudgen Firewall"
## Viprinet
Confidence: Certain
### Viprinet Virtual VPN Hub
#### Shodan
* Server: "Viprinet"
* Server: "ViprinetHubReplacement"
* title:"Viprinet - AdminDesk - Login"
* http.favicon.hash:-1352019987
* ssl: "Viprinet" port:"161"
#### Censys
* 80.http.get.headers.server:Viprinet
* 80.http.get.headers.server:ViprinetHubReplacement
* 80.http.get.title:"Viprinet - AdminDesk - Login"
* 80.http.get.body_sha256:1755d863bd2fbab47c2476af102bb42e8ae58f49927af6844b57258e5aa8fe8e
### Viprinet Traffic Tools
#### Shodan
* title:"Viprinet traffic tools"
#### Censys
* 80.http.get.title:"Viprinet traffic tools"
## Cradlepoint
Confidence: Certain
### Cradlepoint SD-WAN
#### Shodan
* title:"Login :: CR4250"
* title:"Login :: AER2200"
#### Censys
* 80.http.get.title: "Login :: AER2200-600M"
* 80.http.get.title: "Login :: CR4250-PoE"
## Fortinet
Confidence: Certain
### Fortinet FortiGate
#### Shodan
* http.favicon.hash:945408572 http.title:"302*" port:8008
* ssl:"OU=FortiGate" ssl:"O=Fortinet" ssl:CN=FGT
#### Censys
* (443.https.tls.certificate.parsed.subject.organization: Fortinet) AND (443.https.tls.certificate.parsed.subject.common_name: FGT-*)
## Brain4Net
Confidence: Certain
### Brain4Net
#### Shodan
* title:"B4N ORC"
#### Censys
* 80.http.get.title: "B4N ORC"
## FlexiWAN
Confidence: Certain
### FlexiWAN Management
#### Shodan
* http.html:"flexiwan"
* http.title:"FlexiWAN Management"
#### Censys
* 443.https.get.body: "flexiwan"
* 443.https.get.title: "FlexiWAN Management"
## OpenDaylight
Confidence: Certain
### OpenDaylight SDN Controller
#### Shodan
* http.title:"OpenDaylight - Login"
#### Censys
* 8080.http.get.title: "OpenDaylight - Login"
## Tallac Networks
Confidence: Certain
### Tallac SDN Activity Manager
#### Shodan
* http.title:"SDN Activity Manager"
#### Censys
* 443.https.get.title: "SDN Activity Manager"
## Cato Networks
Confidence: Firm
### Cato Networks Edge SD-WAN (Cato Networks Socket)
#### Shodan
* http.title:"Cato Networks"
* http.title:"Cato Networks Socket"
#### Censys
* 443.https.get.title: "Cato Networks"
* 443.https.get.title: "Cato Networks Socket"
## SimpleWAN
Confidence: Certain
### SimpleWAN SD-WAN 2.0
#### Shodan
* http.title:"SimpleWAN Dashboard"
* http.favicon.hash:-517891188
#### Censys
* 443.https.get.title: "SimpleWAN Dashboard"
## Brocade Communications Systems
Confidence: Certain
### Brocade Services Director
#### Shodan
* http.favicon.hash:12809338
#### Censys
* 443.https.get.body: "Brocade Communications Systems, Inc. All rights reserved."
## Ubiquiti Networks
Confidence: Firm
### Unifi SDN Controller
#### Shodan
* http.title:"UniFi SDN"
#### Censys
* 443.https.get.title: "UniFi SDN"
## Masergy
Confidence: Firm
### Masergy Managed SD‑WAN
#### Shodan
* http.favicon.hash:-1188037111
================================================
FILE: docs/leakage.md
================================================
# SD-WAN Version Leakage
## Overview
The most popular and known SD-WAN products leaking software versions are enumerated using search engines.
## Vendors
- [VMWare NSX SD-WAN](#vmware-nsx-sd-wan)
- [TELoIP VINO SD-WAN](#teloip-vino-sd-wan)
- [Fatpipe SYMPHONY SD-WAN](#fatpipe-symphony-sd-wan)
- [Cisco Viptela SD-WAN](#cisco-viptela-sd-wan)
- [Versa Networks](#versa-networks)
- [Riverbed SD-WAN](#riverbed-sd-wan)
- [Citrix NetScaler SD-WAN](#citrix-netscaler-sd-wan)
- [Silver Peak SD-WAN](#silver-peak-sd-wan)
- [Talari SD-WAN](#talari-sd-wan)
- [Sonus SD-WAN](#sonus-sd-wan)
- [Arista Networks EOS](#arista-networks-eos)
- [Glue Networks](#glue-networks)
- [Cradlepoint](#cradlepoint)
- [Brain4Net](#brain4net)
- [Fortinet](#fortinet)
## VMWare NSX SD-WAN
### VeloCloud Network Orchestrator
Dislosure: UI info
Source: HTTP response
Example:
```
<link href="/css/vco-ui.3.0.0.1509625568730.common.css" rel="stylesheet">
```
## TELoIP VINO SD-WAN
### Teloip Orchestrator API
Dislosure: API version
Source: HTML
Example:
```
{"usage":"append '?debug=requestinfo' to any querystring. Optional params: virtualPathCount",
"host":"_v5.02_Teloip Orchestrator API","hostType":"SelfHost (AppHostBase)",...}
```
## Fatpipe SYMPHONY SD-WAN
### WARP
Dislosure: product version
Source: HTML
Example:
```
<h2 style="margin-top:5px;">FatPipe WARP</h2>
<h5>9.1.2r142</h5>
```
## Cisco Viptela SD-WAN
### Cisco vEdge
Dislosure: product version
Source: SSH MOTD
Example:
```
viptela 17.2.4
```
### Cisco vBond
Dislosure: product version
Source: SSH MOTD
Example:
```
viptela 17.2.4
```
## Versa Networks
### Versa Analytics
Dislosure: SSO
Source: JSON (`/versa/analytics/auth/sso/info`)
Example:
```
{"isSSOEnabled":false}
```
Dislosure: Full version
Source: JSON (`/versa/analytics/version`)
Example:
```
{"package":"Versa Analytics","releaseDate":"Fri Nov 16 16:46:54 PST 2018","release":"16.1R2S6","dbVersion":"3.8.10","appId":"f23f3c","packageId":"f0fb84f","uiPackageId":"59819c3"}
```
Disclosure: Analytics Driver
Source: HTML (port 5000)
Example:
```
<body>Versa Analytics Driver v2.1</body>
```
Dislosure: Indirect analytics version
Source: JavaScript (`/versa/app/js/common/constants.js`)
Example:
```
ANALYTICS_PATH : "/analytics/v1.0.0/",
REPORTING_PATH : "/analytics/v1.0.0/",
CLEANUP_PATH : "/analytics/v0.0.1/",
...
```
### Versa FlexVNF
Dislosure: product version
Source: JavaScript (`scripts/main-layout/main-layout-controller.js`)
Example:
```
{
"collection": {
"system:package-info": [
{
"package-id": "494bf5c",
"major": 16,
"minor": 1,
"date": "20161214",
"package-name": "versa-flexvnf-20161214-191033-494bf5c-16.1R2",
"reltype": "R2",
"build_type": "beta",
"branch": "16.1R2",
"creator": "manju"
}
]
}
}
```
## Riverbed SD-WAN
### Riverbed SteelHead
Dislosure: indirect version
Source: HTML
Example:
```
<meta name="application-name" content="web3 v0.15.8" />
```
## Citrix NetScaler SD-WAN
### Citrix NetScaler SD-WAN VPX
Dislosure: product version
Source: HTML
Example 1:
```
<link href="/br_ui/rdx/core/css/rdx.css?v=9.3.1.35" rel="stylesheet" type="text/css"/>
<link href="/br_ui/app/css/br.css?v=9.3.1.35" rel="stylesheet" type="text/css"/>
```
Example 2:
```
<meta http-equiv="Content-type" content="text/html; charset=utf-8" />
<title>DC | Login</title>
<link href="/vw/css/vw.css?R9_2_0_147_583054" rel="stylesheet" type="text/css" />
```
Example 3:
```
<meta http-equiv="Content-type" content="text/html; charset=utf-8" />
<title> | Login</title>
<link href="/vw/css/vw.css?R10_0_2_37_686956" rel="stylesheet" type="text/css" />
```
## Silver Peak SD-WAN
### Silver Peak Unity Orchestrator
Dislosure: product version
Source: URL
Example:
```
https://example.com/https:/8.1.4.11_66255/php/user_login.php
```
### Silver Peak Unity EdgeConnect
Dislosure: product version
Source: URL
Example:
```
{"usage":"append '?debug=requestinfo' to any querystring. Optional params: virtualPathCount",
"host":"_v5.02_Teloip Orchestrator API","hostType":"SelfHost (AppHostBase)",...}
```
## Talari SD-WAN
### Talari Appliance
Dislosure: product version
Source: URL
Example:
```
/css/talari.css?R7_3_QA_P1_D1_06152018
```
## SONUS SD-WAN
### SBC Edge
Dislosure: product version
Source: HTML
Example:
```
link rel="stylesheet" type="text/css" href="/style/6.1.2-471_rel_style_common.css">
<link rel="stylesheet" type="text/css" href="/style/6.1.2-471_rel_style.css">
```
### SBC Management Application
Dislosure: product version
Source: HTML
Example:
```
<div id="header_app_name">EMA 6.2 <span class="header_app_name_mode">[platform mode]</span></div>
```
## Arista Networks EOS
### Arista Switch
Dislosure: product version
Source: SNMP
Example:
```
Arista Networks EOS version 4.15.6M running on an Arista Networks DCS-7150S-24
```
## Glue Networks
### Gluware Control
Dislosure: product version
Source: websocket
Example 1:
```
© 2018 Gluware, Inc. v3.3.98 (July 10, 2018 6:27am)
```
Example 2:
```
<content-bar-item>v3.3.98 (July 10, 2018 6:27am)</content-bar-item>
```
## Cradlepoint
### Cradlepoint SD-WAN
Disclosure: product version
Source: HTML
Example (CR4250-PoE):
```
<div id="displayfield-1031-inputEl" role="textbox" class="x-form-display-field x-form-display-field-default">6.6.4 (Thu Sep 27 20:58:36 UTC 2018)</div>
```
Example (AER2200-600M):
```
<div id="displayfield-1031-inputEl" role="textbox" class="x-form-display-field x-form-display-field-default">6.4.3 (Wed Dec 13 13:01:33 MST 2017)</div>
```
## Brain4Net
### Brain4Net Orchestrator
Disclosure: product version
Source: JSON
Example:
```
{"api":"2.3.1","build":"2.4-FEATURE.ORC-2201","image":"orc-v2:4-FEATURE.ORC-2201"}
```
Example:
```
{
"REACT_APP_NG_PORT" : 81,
"REACT_APP_FRONTEND_WEB_PORT": 82,
"REACT_APP_FRONTEND_TERM_PORT": 83,
"REACT_APP_FRONTEND_STOMP_PORT": 84,
"REACT_APP_VERSION": "2.4.932-SNAPSHOT"
}
```
## Fortinet
### Fortinet FortiGate Secure SD-WAN
Disclosure: build version, model
Source: JavaScript (`fweb_all.js`)
Example:
```
CONFIG: {
CONFIG_BUILD_NUMBER: 231,
CONFIG_GUI_NO: "0cebad09e7db38e5316621c963cf944e",
CONFIG_MAJOR_NUM: 6,
CONFIG_MINOR_NUM: 0,
CONFIG_MODEL: "FGT_81E_POE",
CONFIG_MODEL_LEVEL_LOW: !0,
CONFIG_PATCH_NUM: 4,
CONFIG_SQL_LOG: !0
},
```
gitextract_4gck7wen/
├── README.md
├── checklists/
│ └── sd-wan-security-assessment-the-first-hours.md
├── data/
│ ├── tcp2156.json
│ └── viptela_banners.json
└── docs/
├── census.md
└── leakage.md
Condensed preview — 6 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (91K chars).
[
{
"path": "README.md",
"chars": 4553,
"preview": "\n# SD-WAN New Hope\n\nSoftware-defined networking in a wide area network (SD-WAN) quickly becomes v"
},
{
"path": "checklists/sd-wan-security-assessment-the-first-hours.md",
"chars": 3809,
"preview": "# SD-WAN Security Assessment: The First Hours\n\n## Introduction\n\nSuppose you need to perform a security assessment of an "
},
{
"path": "data/tcp2156.json",
"chars": 1105,
"preview": "[\n{ \"ip\": \"13.71.84.216\", \"timestamp\": \"1540077658\", \"ports\": [ {\"port\": 2156, \"proto\": \"tcp\", \"service\": {\"name\": \""
},
{
"path": "data/viptela_banners.json",
"chars": 55090,
"preview": "{\"ip\":\"151.181.50.132\",\"data\":{\"ssh\":{\"status\":\"success\",\"protocol\":\"ssh\",\"result\":{\"banner\":\"viptela 17.2.2\",\"server_id"
},
{
"path": "docs/census.md",
"chars": 12384,
"preview": "# SD-WAN Internet Census\n\n## Overview\nThe most popular and known SD-WAN solutions are enumerated using search engines.\n\n"
},
{
"path": "docs/leakage.md",
"chars": 6539,
"preview": "# SD-WAN Version Leakage\n\n## Overview\nThe most popular and known SD-WAN products leaking software versions are enumerate"
}
]
About this extraction
This page contains the full source code of the sdnewhop/sdwannewhope GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 6 files (81.5 KB), approximately 33.2k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.