I got a mongodb server which from the logfiles seems to have acceptedgot a connection from a remote ip address, though its obviously not allowed (or to be more precise: the mongod is not bound to any public interface) due to the mongodb configuration file as shown below.
So, the question is: How can I identifyone get with a public ip address to the leak where theymongodb server? They seem to got initially in and what steps do Issh access because of various facts below but even then they would need to do in orderuse the local interface to collect more informationsconnect to prevent this attack on a new fresh os deploymongodb, right?