← Back to feed

Subnet 176.65.132.0/24

SUBNET Active high
Why this campaign was detected
16 IPs from the same /24 subnet (176.65.132.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
176.65.132.0/24
Country
🇩🇪 DE
Cloud Provider
Member Count
16 IPs
Below average
Total Events
24294
Below average by volume
Started / Ended
2026-02-22 21:11 — 2026-04-21 11:49
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
176.65.132.190 scanner 63% DROP1x OSINT 187 2 ssh:bruteforce 2026-05-11 21:56 evidence →
176.65.132.23 credential_harvester 60% DROP1x OSINT 122 2 ssh:bruteforce 2026-05-11 02:07 evidence →
176.65.132.129 credential_harvester 53% DROP1x OSINT 11754 2 ssh:bruteforce 2026-05-08 17:24 evidence →
176.65.132.24 credential_harvester 53% DROP1x OSINT 11754 2 ssh:bruteforce 2026-05-08 13:49 evidence →
176.65.132.50 scanner 52% DROP1x OSINT 85 1 ssh:bruteforce 2026-05-11 20:40 evidence →
176.65.132.7 scanner 50% DROP1x OSINT 48 1 ssh:bruteforce 2026-05-11 01:31 evidence →
176.65.132.143 scanner 49% DROP 61 2 ssh:bruteforce 2026-05-08 10:39 evidence →
176.65.132.33 scanner 48% DROP1x OSINT 16 1 ssh:bruteforce 2026-05-11 00:35 evidence →
176.65.132.210 scanner 46% DROP 58 1 ssh:bruteforce 2026-05-11 10:52 evidence →
176.65.132.37 proxy_abuser 43% DROP1x OSINT 18 1 ssh:bruteforce 2026-05-08 07:17 evidence →
176.65.132.18 scanner 43% DROP 46 1 ssh:bruteforce 2026-05-09 23:44 evidence →
176.65.132.218 scanner 40% DROP 69 1 ssh:bruteforce 2026-05-08 00:16 evidence →
176.65.132.117 scanner 39% DROP1x OSINT 16 1 ssh:bruteforce 2026-05-06 10:43 evidence →
176.65.132.5 scanner 38% DROP 30 2 ssh:bruteforce 2026-05-11 19:19 evidence →
176.65.132.186 scanner 29% DROP1x OSINT 9 1 ssh:bruteforce 2026-05-09 23:51 evidence →
176.65.132.45 credential_probe 21% DROP1x OSINT 21 1 ssh:bruteforce 2026-05-06 09:26 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds