← Back to feed

Subnet 91.231.89.0/24

SUBNET Active high
Why this campaign was detected
12 IPs from the same /24 subnet (91.231.89.0/24) were observed attacking our sensors within the same time window. All belong to ONYPHE SAS (AS213412). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS213412 · ONYPHE SAS
Subnet
91.231.89.0/24
Country
🇫🇷 FR
Cloud Provider
Member Count
12 IPs
Below average
Total Events
51
Below average by volume
Started / Ended
2026-02-20 23:00 — ongoing
Attack Types
http:scan ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
91.231.89.82 scanner 45% 8 2 http:scanssh:bruteforce 2026-05-23 03:21 evidence →
91.231.89.228 scanner 43% 2x OSINT 7 2 ssh:bruteforce 2026-05-23 03:19 evidence →
91.231.89.205 scanner 39% 8 3 ssh:bruteforce 2026-05-17 01:44 evidence →
91.231.89.224 scanner 33% 2x OSINT 4 1 ssh:bruteforce 2026-05-23 03:19 evidence →
91.231.89.79 scanner 32% 2x OSINT 2 1 ssh:bruteforce 2026-05-23 03:19 evidence →
91.231.89.235 web_probe 24% 1x OSINT 1 1 http:scan 2026-05-19 17:51 evidence →
91.231.89.246 scanner 24% 4 1 ssh:bruteforce 2026-05-22 11:09 evidence →
91.231.89.73 scanner 23% 2x OSINT 2 1 ssh:bruteforce 2026-05-22 11:06 evidence →
91.231.89.142 scanner 15% 8 1 ssh:bruteforce 2026-05-17 01:46 evidence →
91.231.89.203 scanner 13% 3 1 ssh:bruteforce 2026-05-17 01:44 evidence →
91.231.89.116 scanner 13% 2 1 ssh:bruteforce 2026-05-17 01:44 evidence →
91.231.89.114 scanner 13% 2 1 ssh:bruteforce 2026-05-17 01:44 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds