← Back to feed
Subnet 213.209.159.0/24
SUBNET Active highWhy this campaign was detected
5 IPs from the same /24 subnet (213.209.159.0/24) were observed attacking our sensors within the same time window. All belong to Feo Prest SRL (AS208137). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS208137 · Feo Prest SRL
Subnet
213.209.159.0/24
Country
🇹🇼 TW
Cloud Provider
—
Member Count
5 IPs
Below average
Total Events
21743
Below average by volume
Started / Ended
2026-02-16 18:55 — ongoing
Attack Types
MITRE ATT&CK Techniques
Initial Access
Discovery
Command and Control
Exfiltration
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 213.209.159.158 | credential_harvester | 84% | DROP1x OSINT | 7600 | 3 | ssh:bruteforce | — | 2026-05-11 16:45 | evidence → |
| 213.209.159.56 | credential_harvester | 69% | DROP1x OSINT | 3544 | 3 | ssh:bruteforce | — | 2026-05-11 21:37 | evidence → |
| 213.209.159.115 | mysql_bruter | 59% | DROP | 5295 | 3 | mysql:bruteforce | — | 2026-05-10 15:33 | evidence → |
| 213.209.159.154 | mysql_bruter | 51% | DROP | 5299 | 3 | mysql:bruteforce | — | 2026-05-07 07:10 | evidence → |
| 213.209.159.227 | opportunistic_bruter | 34% | DROP1x OSINT | 5 | 1 | ssh:bruteforce | — | 2026-05-09 06:00 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds