Well here is what you are looking for from that attack.
jul/23/2018 05:37:21 system,error,critical login failure for user admin from 185.153.198.228 via winbox
jul/23/2018 05:37:25 system,error,critical login failure for user admin from 185.153.198.228 via winbox
jul/23/2018 05:37:28 system,error,critical login failure for user admin from 185.153.198.228 via winbox
jul/23/2018 05:37:32 system,error,critical login failure for user Admin from 185.153.198.228 via winbox
jul/23/2018 05:37:36 system,error,critical login failure for user emergency from 185.153.198.228 via winbox
jul/23/2018 05:37:39 system,error,critical login failure for user mtaadmin from 185.153.198.228 via winbox
jul/23/2018 05:37:42 system,error,critical login failure for user contractdata from 185.153.198.228 via winbox
jul/23/2018 05:37:45 system,error,critical login failure for user K16000865 from 185.153.198.228 via winbox
After you update your router change the password…
You will see log in attempts from that IP using your old passwords.
Here’s my typical blacklist firewall config. Generally we don’t permit any admin connections from the internet other than known management networks. This is used in any case where we are accepting traffic from the internet. This also works decently for other services with the forward chain rule.
All of them are attempting to use the already patched “slingshot” exploit to gain unauthorized access to Mikrotik routers.
One of our clients had a couple of boards running older firmware, and we logged in to find SOCKS configured, a “call home” script running every 60 seconds, and an added firewall rule.