Пожалуйста, обратите внимание, что пользователь заблокирован
10.1.0.0/16 10.152.0.0/16
Do an IP-wide scan like this, and then detect domain-organized machines.
Of course, we also have to take into account that the noise is too loud, and then the other party changes the password to make the privilege off, so if there is a loophole successfully exploited, we have to leave a legitimate backdoor in it first.