← Back to feed

Subnet 192.109.200.0/24

SUBNET Active high
Why this campaign was detected
3 IPs from the same /24 subnet (192.109.200.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
192.109.200.0/24
Country
🇧🇬 BG
Cloud Provider
Member Count
3 IPs
Below average
Total Events
50952
Average by volume
Started / Ended
2026-02-20 07:18 — 2026-04-21 13:06
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
192.109.200.237 credential_harvester 73% DROP1x OSINT 31344 3 ssh:bruteforce 2026-05-11 07:23 evidence →
192.109.200.78 credential_harvester 58% DROP1x OSINT 19573 2 ssh:bruteforce 2026-05-11 05:07 evidence →
192.109.200.219 scanner 30% DROP 35 1 ssh:bruteforce materialoranges.ptr.network 2026-05-11 22:03 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds