← Back to feed
Subnet 192.109.200.0/24
SUBNET Active highWhy this campaign was detected
3 IPs from the same /24 subnet (192.109.200.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
192.109.200.0/24
Country
🇧🇬 BG
Cloud Provider
—
Member Count
3 IPs
Below average
Total Events
50952
Average by volume
Started / Ended
2026-02-20 07:18 — 2026-04-21 13:06
Attack Types
MITRE ATT&CK Techniques
Initial Access
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 192.109.200.237 | credential_harvester | 73% | DROP1x OSINT | 31344 | 3 | ssh:bruteforce | — | 2026-05-11 07:23 | evidence → |
| 192.109.200.78 | credential_harvester | 58% | DROP1x OSINT | 19573 | 2 | ssh:bruteforce | — | 2026-05-11 05:07 | evidence → |
| 192.109.200.219 | scanner | 30% | DROP | 35 | 1 | ssh:bruteforce | materialoranges.ptr.network | 2026-05-11 22:03 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds