Attack Report for Observation

Header

Time

2022/06/16, 05:43:13 (GMT)

Transaction ID

4K7RMJ8DQ6A9JU9B

Service

ftp

Location

US (United States)

Attacker

192.186.12.25

Classification

Standart user pass check

Harm Potential

Medium

Description

Standart user-pass authentication login check

Content

Client : 192.186.12.25:52058 is connected to ftp://ftp.***********:21
220 ftpsrv Microsoft FTP Service <Version 5.0>.
USER admin
331 OK.
PASS 123456
230 OK.
PWD
257 "/"
CWD /
200 OK.
PASV
227 Entering Passive Mode (0,0,0,0,218,181).
PASV
227 Entering Passive Mode (0,0,0,0,208,225).
PASV
227 Entering Passive Mode (0,0,0,0,149,69).
PASV
227 Entering Passive Mode (0,0,0,0,205,177).
PASV
227 Entering Passive Mode (0,0,0,0,191,119).
PASV
227 Entering Passive Mode (0,0,0,0,156,5).
TYPE A
200 Type set to I
PASV
227 Entering Passive Mode (0,0,0,0,186,163).

Client : 192.186.12.25:52058 is disconnected from ftp://ftp.***********:21

All observations are coming from honeypot central database.

Please share your wishes, opinions and suggestions with us:

If you like, you can support
with your donations to us..

Donate