← Back to feed
Subnet 194.165.16.0/24
SUBNET Active highWhy this campaign was detected
3 IPs from the same /24 subnet (194.165.16.0/24) were observed attacking our sensors within the same time window. All belong to Flyservers S.A. (AS48721). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS48721 · Flyservers S.A.
Subnet
194.165.16.0/24
Country
🇲🇨 MC
Cloud Provider
—
Member Count
3 IPs
Below average
Total Events
51
Below average by volume
Started / Ended
2026-02-20 17:50 — ongoing
Attack Types
MITRE ATT&CK Techniques
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 194.165.16.166 | scanner | 29% | 1x OSINT | 21 | 2 | ssh:bruteforce | — | 2026-05-17 06:52 | evidence → |
| 194.165.16.162 | scanner | 29% | 18 | 2 | ssh:bruteforce | — | 2026-05-19 20:39 | evidence → | |
| 194.165.16.161 | scanner | 21% | 1x OSINT | 12 | 1 | ssh:bruteforce | — | 2026-05-18 09:07 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds