top of page

Successful VPN Logins by Source Address

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 9, 2025
  • 2 min read

Summary:

This document contains a log of successful logins recorded between two specific times on November 3, 2009, detailing user access to VPN device groups via various source addresses. The top 10 sources with the most logins are listed along with detailed records showing which users logged in as what from where within the /VPN device group. This information is vital for cybersecurity analysis and monitoring efforts.

Details:

The provided data represents a log of successful logins from various source addresses between two specific times on November 3, 2009. The data is organized into two main sections: "Top 10 Sources with Successful Logins" and "Successful Login Counts by Source-Destination Pair." ### Top 10 Sources with Successful Logins The table lists the top 10 source addresses based on the number of successful logins, along with their respective counts. Here are the entries:

  • **56.112.27.116**: 6 logins

  • **199.166.14.133**: 5 logins

  • **146.12.222.16**: 4 logins

  • **99.56.128.154**: 3 logins

  • **207.12.16.2**: 3 logins

  • **208.34.128.66**: 3 logins

  • **87.146.22.137**: 2 logins

  • **192.177.132.250**: 1 login

  • **75.128.128.47**: 1 login

  • **132.67.45.121**: 1 login

### Successful Login Counts by Source-Destination Pair This section provides a detailed view of successful logins, showing the source address, user name, count of logins, and device group for each entry:

  • **75.128.128.47** (source address) logged in as **bcenter**, with 1 login to the /VPN device group.

  • **146.12.222.16** logged in as **efields**, with 4 logins to the /VPN device group.

  • **99.56.128.154** logged in as **llopez**, with 3 logins to the /VPN device group.

  • **208.34.128.66** logged in as **poswalt**, with 3 logins to the /VPN device group.

  • **87.146.22.137** logged in as **rjones**, with 2 logins to the /VPN device group.

  • **192.177.132.250** logged in as **rwhite**, with 1 login to the /VPN device group.

  • **56.112.27.116** logged in as **skawahara**, with 6 logins to the /VPN device group.

  • **207.12.16.2** logged in as **spham**, with 3 logins to the /VPN device group.

  • **146.47.118.23** logged in as **swright**, with 1 login to the /VPN device group.

  • **99.23.254.12** logged in as **swright**, with 1 login to the /VPN device group.

  • **132.67.45.121** logged in as **swright**, with 1 login to the /VPN device group.

  • **166.122.87.2** logged in as **swright**, with 1 login to the /VPN device group.

  • **99.23.254.47** logged in as **swright**, with 1 login to the /VPN device group.

  • **199.166.14.133** logged in as **zawad**, with 5 logins to the /VPN device group.

This data is crucial for security analysis and monitoring, providing insights into which users accessed what devices and from where within the specified time frame.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page