Attack Report for Observation

Header

Time

2023/05/21, 16:48:43 (GMT)

Transaction ID

A744F5LQ0WPJETII

Service

smtp

Location

BG (Bulgaria)

Attacker

185.254.37.223

Classification

Freemail replyto neq from dom

Harm Potential

Not

Description

Unknown client hostname (PTR or FCrDNS verification failed)

Content

220 mail.***********ehlo [185.254.37.223]
250-mail.***********
250-PIPELINING
250-8BITMIME
250-SIZE 40960000
250 AUTH LOGIN PLAIN
mail FROM:<INFO@usa.net> size=1501
250 2.1.0 Ok
rcpt TO:<deliveryagentfile2021@gmail.com>
250 2.1.5 Ok
rcpt TO:<omazuonyii2014@hotmail.com>
250 2.1.5 Ok
rcpt TO:<agentpetercruz2021@poczta.onet.eu>
250 2.1.5 Ok
rcpt TO:<omazu_onyii@yahoo.com>
250 2.1.5 Ok
rcpt TO:<kinatuma23@cash4u.com>
250 2.1.5 Ok
rcpt TO:<spanishlotteryaward2021@aol.com>
250 2.1.5 Ok
rcpt TO:<europdelivery2021@gmail.com>
250 2.1.5 Ok
data
354 End data with <CR><LF>.<CR><LF>
250 2.0.0 Ok: queued as A744F5LQ0WPJETII
quit
221 2.0.0 Bye

All observations are coming from honeypot central database.

Please share your wishes, opinions and suggestions with us:

If you like, you can support
with your donations to us..

Donate