// soc investigation 2026-03-26
SOC135 Multiple FTP Connection Attempt
letsdefend Medium closed ✓ true positive
analyst verdict TRUE POSITIVE

T1110 Brute Force

👤 Who

An external attacker from IP address 42.192.84.19 targeted the internal server gitServer (IP address 172.16.20.4).

🔎 What

The alert SOC135 Multiple FTP Connection Attempt triggered due to repeated authentication attempts against the FTP web interface endpoint /ftp/webUI.php. Log analysis shows multiple login attempts using common credential combinations such as admin/admin, admin/123456, and admin/root, which is indicative of a brute force attack attempting to gain unauthorized access.

🕐 When

Mar 07 2021 05:09 PM

📍 Where

Source IP Address: 42.192.84.19 Destination Hostname: gitServer Destination IP Address: 172.16.20.4 Target Endpoint: http://172.16.20.4/ftp/webUI.php

💡 Why

The alert was triggered due to multiple authentication attempts from a single external IP address targeting an FTP login interface. The use of common default credentials confirms this is a brute force attempt. There is no indication of a successful login in the logs, suggesting the attack was unsuccessful. The activity is classified as a true positive brute force attempt with no confirmed compromise.