Honey Pot Caught List

Offering On premise systems for 19 years and SaaS systems for over 12 years, Cyber Security has always been a major part of our core systems.

One fun part of this non-stop battle are honey pots. We have numerous honey pots setup to suck in the bad guys and their attacks, let them eat up our poison honey we give them.

Adept Secure® Honey Pot
Adept Secure ® Honey Pot

We work with numerous Law Enforcement agencies especially with the FBI and DHS who enjoy the constant bad guy sources and their contact information of their attacks against our systems.

Going forward we will be sharing the top attack information with the public, since we feel it is important for everyone to have the IP addresses of these attackers.

Here is the list of the very bad that got caught in one of our honey pots on 06/02/2020.

1) 185.106.96.0-185.106.96.255
2) 93.99.104.0-93.99.104.255
3) 85.204.246.0-85.204.246.255
4) 185.86.164.0-185.86.164.255
5) 92.244.247.0-92.244.247.255
6) 185.85.191.0-185.85.191.255
7) 89.35.39.0-89.35.39.255
8) 110.43.208.0-110.43.208.255
9) 43.239.191.0-43.239.191.255
10) 60.190.248.0-60.190.248.255
11) 218.77.12.0-218.77.12.255
12) 164.52.24.0-164.52.24.255
13) 113.12.77.0-113.12.77.255
14) 92.119.160.0-92.119.160.255
15) 195.54.166.0-195.54.166.255
16) 92.63.194.0-92.63.194.255
17) 195.54.160.0-195.54.160.255
18) 50.156.73.0-50.156.73.255
19) 139.199.131.0-139.199.131.255
20) 195.169.125.0-195.169.125.255
21) 89.248.160.0-89.248.160.255
22) 92.53.65.0-92.53.65.255
23) 185.176.27.0-185.176.27.255
24) 45.134.179.0-45.134.179.255
25) 114.42.99.0-114.42.99.255
26) 128.199.162.0-128.199.162.255
27) 176.113.115.0-176.113.115.255
28) 185.175.93.0-185.175.93.255
29) 51.178.78.0-51.178.78.255
30) 83.240.182.0-83.240.182.255
31) 89.248.168.0-89.248.168.255
32) 128.105.145.0-128.105.145.255
33) 54.36.160.0-54.36.160.255
34) 195.54.161.0-195.54.161.255
35) 182.61.19.0-182.61.19.255
36) 18.231.147.0-18.231.147.255
37) 185.209.0.0-185.209.0.255
38) 185.176.27.0-185.176.27.255
39) 176.113.115.0-176.113.115.255
40) 125.224.14.0-125.224.14.255
41) 185.209.0.0-185.209.0.255
42) 92.63.196.0-92.63.196.255
43) 223.71.167.0-223.71.167.255
44) 36.239.218.0-36.239.218.255
45) 89.248.172.0-89.248.172.255
46) 83.97.20.0-83.97.20.255
47) 185.186.78.0-185.186.78.255
48) 192.151.145.0-192.151.145.255
49) 195.54.166.0-195.54.166.255
50) 144.217.78.0-144.217.78.255
51) 185.153.199.0-185.153.199.255
52) 93.174.89.0-93.174.89.255
53) 165.227.15.0-165.227.15.255
54) 162.243.142.0-162.243.142.255
55) 185.222.59.0-185.222.59.255
56) 119.63.74.0-119.63.74.255
57) 1.162.98.0-1.162.98.255
58) 185.153.196.0-185.153.196.255
59) 195.54.167.0-195.54.167.255
60) 91.4.215.0-91.4.215.255
61) 36.112.131.0-36.112.131.255
62) 69.147.82.0-69.147.82.255
63) 192.243.250.0-192.243.250.255
64) 113.214.30.0-113.214.30.255
65) 76.14.31.0-76.14.31.255
66) 46.174.191.0-46.174.191.255
67) 103.114.107.0-103.114.107.255
68) 162.243.143.0-162.243.143.255
69) 185.156.73.0-185.156.73.255
70) 98.128.178.0-98.128.178.255
71) 172.104.60.0-172.104.60.255
72) 185.175.93.0-185.175.93.255
73) 94.102.51.0-94.102.51.255
74) 183.136.225.0-183.136.225.255
75) 139.162.189.0-139.162.189.255
76) 193.27.228.0-193.27.228.255
77) 129.82.138.0-129.82.138.255
78) 189.130.122.0-189.130.122.255
79) 163.172.40.0-163.172.40.255
80) 96.87.237.0-96.87.237.255
81) 63.250.38.0-63.250.38.255
82) 92.63.196.0-92.63.196.255
83) 104.236.247.0-104.236.247.255
84) 54.39.151.0-54.39.151.255
85) 3.101.13.0-3.101.13.255
86) 141.135.71.0-141.135.71.255
87) 45.143.220.0-45.143.220.255
88) 87.251.74.0-87.251.74.255
89) 3.101.13.0-3.101.13.255
90) 141.135.71.0-141.135.71.255
91) 45.143.220.0-45.143.220.255
92) 89.144.47.0-89.144.47.255
93) 218.211.169.0-218.211.169.255
94) 61.132.87.0-61.132.87.255
95) 94.102.56.0-94.102.56.255
96) 80.82.78.0-80.82.78.255
97) 162.62.17.0-162.62.17.255
98) 46.161.27.0-46.161.27.255
99) 106.37.74.0-106.37.74.255
100)162.243.141.0-162.243.141.255
101)128.199.134.0-128.199.134.255
102)51.161.12.0-51.161.12.255
103)195.154.189.0-195.154.189.255
104)70.104.137.0-70.104.137.255
105)27.74.22.0-27.74.22.255
106)167.99.150.0-167.99.150.255
107)194.26.25.0-194.26.25.255
108)198.108.66.0-198.108.66.255
109)90.150.162.0-90.150.162.255
110)186.209.184.0-186.209.184.255
111) 37.36.229.0 – 37.36.229.255
112) 54.39.131.0 – 54.39.131.255 (54.39.131.174)
113) 178.21.164.0 – 178.21.164.255 (178.21.164.90)
114) 91.134.27.0 – 91.134.27.255 (91.134.27.29)
115) 31.28.106.0 – 31.28.106.255 (31.28.106.171)
————————————————-

Here is a very good link to exam the IP addresses that are attacking your systems: https://scamalytics.com/ip

Update: (6/13/2020) it appears that many bad guys are using US Based Server Farms that allow for remote access outside the USA to attack.

Denial of Service Attacks are originating from these locations. (Http Port 80 and Https 443)
192.151.146.0 – 192.168.146.255
51.222.38.0 – 51.222.38.255
24.12.196.0 – 24.12.196.255
173.31.143.0 – 173.31.143.255
54.39.131.0 – 54.39.131.255
73.107.171.0 – 73.107.171.255
144.217.105.0 – 144.217.105.255
174.137.58.0 – 174.137.58.255
78.105.8.0 – 78.105.8.255 – U.K.

FTP attacks (Port 21 and 22)
45.168.67.0 – 45.168.67.255
23.129.64.0 – 23.129.64.255
59.56.79.0 – 59.56.79.255
125.88.183.0 – 125.88.183.255
38.21.239.0 – 38.21.239.255
38.21.230.0 – 38.21.230.255 (38.21.230.188)
125.88.144.0 – 125.88.144.255
43.227.222.0 – 43.227.222.255

IP Spoofing UDP
169.254.30.0 – 169.254.30.255 (169.254.30.99)
———————————————

Update 6/18/2020 – China attacking today good attacks!

FTP(s) attacks (Port 21 and 22) Brute Force
1) 119.188.242.0 – 119.188.242.255 (119.188.242.128)
2) 58.217.230.0 – 58.217.230.255 (58.217.230.27)

HTTP(s) attacks (Port 80 and 443) Troll, Brute Force and SQL Injection
1) 203.171.235.0 – 203.171.235.255 (203.171.235.212)
2) 86.14.80.0 – 86.14.80.255 (86.14.80.176)

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Cyber Attacks and Coronavirus

Since the Coronavirus has been unleashed and escaped China, Cyber Attacks out of Asia have gone up, and these attacks have changed and are now heavy focused on remote access, since most of the workforce is now working from home.

We have seen a rise on VPN (Virtual Private Network) brute force attacks, where a bot just nails the VPN systems with User Names like VENDOR1 – VENDOR2000 with numerous passwords.

Adept Secure Attack Viewer

I personally find these attacks just outrageous. So we have decided to start taking aggressive action against these horrible systems. If any system attacks our systems we will target them, and take the necessary action. Their IP addresses have been stored, and added to our target lists.

These organizations and individuals that are attacking everyone have no place on this planet. For everyone else, be safe, check your router logs daily, block these bad guys.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Coronavirus Outbreak


Coronavirus Outbreak

There is currently no vaccine to prevent coronavirus disease 2019 (COVID-19).The best way to prevent illness is to avoid being exposed to this virus. The virus is thought to spread mainly from person-to-person. Between people who are in close contact with one another (within about 6 feet). Through respiratory droplets produced when an infected person coughs or sneezes. These droplets can land in the mouths or noses of people who are nearby or possibly be inhaled into the lungs.

Adept Technologies is a totally distributed company, so everyone works from wherever they are in the world. It could be a coffee shop, it could be their home, it could be a co-working space, it could be in one of our offices. We hire people regardless of where they are.

Over 80 percent of our workforce already work from home. This ideology has been in action for almost 19 years. It works, but now with this Coronavirus Outbreak issue, it is shocking how other corporations including clients that have asked us for guidance. We are helping, the technology is easy and available to setup. Our MyAdept.com systems are SaaS and are available to access as long as you have an internet connection. We recommend if your software vendor doesn’t allow remote access, to get rid of them!

We are confident that this Coronavirus Outbreak will wind down. But we as a planet need to learn from our past mistakes. We are happy that 19 years ago our business model was right on. We never thought of the Coronavirus back then, just losing talented people that didn’t want to move to Florida or New York.

We at Adept are very busy, no down time, and we are available for anyone that needs help.

Be safe out there.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Securing corporate networks 2019 Best Practices – Admin Accounts

In the age of constant attacks on your networks here are some good tips on how you can reduce the risk of having a security breach.

Administrator Accounts

Employees with administrative access should be using separate devices dedicated only for administrative operations. These devices like all the other devices within your domains should always be kept up to date with all the recent software and operating system updates.

All default administration accounts should be given zero rights on the device account and the domain account. Its best practices to require that they request just-in-time (JIT) privileges that gives them access for a finite amount of time and logs it in a system.

Secure Admin Accounts

Administrator accounts should also be created on a separate user namespace/forest that cannot access the internet, and should be different from the employee’s normal work identity. This way, any compromise of the company’s employee-force namespace/forest won’t grant the attackers easy access to an administrator account, since the employee with admin rights would not be using that account for daily tasks.

Employees with administrative accounts should avoid remotely logging into devices with administrator access to perform any administrative tasks, as attackers could be logging these events on compromised devices. The way to go is to have administrators use their separate devices for any administrative tasks as much as possible.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.


Is Blockchain Technology Seriously Overvalued?

Is Blockchain Technology Seriously Overvalued?

What amazes me these days is how people can take an idea and place a value on it, without fully understanding the idea. Then numerous 3rd parties leverage this idea into new ideas and package them into speculative instruments and trade them. When the idea in the first place is really not an idea, but an educated guess, with secrets you get the Bitcoin.

What is Blockchain Technology?

Please it was not invented by Satoshi Nakamoto, this technology has been around since software was invented. There is nothing new or cutting edge with it. In fact I would argue Napster was one of the first to leverage this type of technology in the mainstream, but who remembers that? Just look at the word itself “Block” and “Chain”. For the non-tech people out there which means most of everyone, Blockchain is a chain of blocks that continuously grows. Think of opening a Microsoft Word document, then force your cat or dog to jump up and down on the keyboard, now look at the word document…there you just created a blockchain. The cat and dog is the encryption. Now this chain of blocks is saved across multiple computers (nodes) all over the planet. Each time the cat or dog is forced to jump up and down on the keyboard the block is updated and this chain grows and must be verified on ALL the nodes in the chain at the same time, if one computer fails the process must start all over. Nothing in the Chain of blocks can be deleted it just grows on forever. I am not going to get into the all the bells and whistles of the processes but in a nutshell that’s it.

Cryptocurrencies

This creates major problems when we deal with cryptocurrencies like bitcoin, along with all the other stupid guesses being thrown around right now. As the chain grows it consumes more resources. Each transaction would require more energy than the previous one, because the chain has grown.

There really is no value to Cryptocurrencies when the core technology continues to grow in size. Kicking the can down the road hoping that we technology people will fix it or write temporary fixes hoping that other factors of the industry will create software and hardware systems in the future to keep up with the chain demand is nuts. Does anyone remember Y2K?

What I find very upsetting is that the cryptocurrencies idea was to bring free money transfers to everyone on the planet, and to remove the trusted 3rd party from the transaction. Sadly the trusted 3rd parties that cryptocurrencies where supposed to remove have embraced this technology. Private Blockchains VS Public Blockchains boy sounds like a cloud computing conference. Obviously Blockchain technology was flawed from the beginning when it came to Cryptocurrencies for the individual.

I do agree that fiat currencies are under a lot of pressure, yes the markets appear to be fixed, yes the paper gold and paper silver markets are overleveraged, but I will tell you Blockchain Technology is Seriously Overvalued and it is NOT the answer in the long term. Unless you want to wait 30 to 45 minutes for your Bitcoin mastercard to process your peer to peer transaction block for your lunch or dinner, and have huge amounts of servers consuming huge amounts of energy for your transaction, say goodbye to your bandwidth too. The internet crawls to a stop…

Good luck out there.

We do use Blockchain Technology in systems that track transmission of encryption cycles of network communications between groups of nodes, so this technology is useful. If speed is of no issue, and security is, then this type of Technology is interesting, but then again other technology does a better job. I wouldn’t give huge amounts of value on Blockchain Technology, and have industries be able to borrow large sums of venture capital based solely on this technology, remember the .COM crash?

Good luck out there!