Time | 2022/06/16, 08:43:13 (GMT) |
Transaction ID | 4K7RMJ8DQ6A9JU9B |
Service | ftp |
Location | US (United States) |
Attacker | 192.186.12.25 |
Classification | Standart user pass check |
Harm Potential | Medium |
Client : 192.186.12.25:52058 is connected to ftp://ftp.***********:21 220 ftpsrv Microsoft FTP Service <Version 5.0>. USER admin 331 OK. PASS 123456 230 OK. PWD 257 "/" CWD / 200 OK. PASV 227 Entering Passive Mode (0,0,0,0,218,181). PASV 227 Entering Passive Mode (0,0,0,0,208,225). PASV 227 Entering Passive Mode (0,0,0,0,149,69). PASV 227 Entering Passive Mode (0,0,0,0,205,177). PASV 227 Entering Passive Mode (0,0,0,0,191,119). PASV 227 Entering Passive Mode (0,0,0,0,156,5). TYPE A 200 Type set to I PASV 227 Entering Passive Mode (0,0,0,0,186,163). Client : 192.186.12.25:52058 is disconnected from ftp://ftp.***********:21
All observations are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |