← Back to feed

Subnet 213.209.159.0/24

SUBNET Active high
Why this campaign was detected
5 IPs from the same /24 subnet (213.209.159.0/24) were observed attacking our sensors within the same time window. All belong to Feo Prest SRL (AS208137). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS208137 · Feo Prest SRL
Subnet
213.209.159.0/24
Country
🇹🇼 TW
Cloud Provider
Member Count
5 IPs
Below average
Total Events
21743
Below average by volume
Started / Ended
2026-02-16 18:55 — ongoing
Attack Types
mysql:bruteforce ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Exfiltration
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
213.209.159.158 credential_harvester 84% DROP1x OSINT 7600 3 ssh:bruteforce 2026-05-11 16:45 evidence →
213.209.159.56 credential_harvester 69% DROP1x OSINT 3544 3 ssh:bruteforce 2026-05-11 21:37 evidence →
213.209.159.115 mysql_bruter 59% DROP 5295 3 mysql:bruteforce 2026-05-10 15:33 evidence →
213.209.159.154 mysql_bruter 51% DROP 5299 3 mysql:bruteforce 2026-05-07 07:10 evidence →
213.209.159.227 opportunistic_bruter 34% DROP1x OSINT 5 1 ssh:bruteforce 2026-05-09 06:00 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds