← Back to feed
Subnet 209.38.82.0/24
SUBNET Ended highWhy this campaign was detected
3 IPs from the same /24 subnet (209.38.82.0/24) were observed attacking our sensors within the same time window. All belong to DigitalOcean, LLC (AS14061). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS14061 · DigitalOcean, LLC
Subnet
209.38.82.0/24
Country
🇦🇺 AU
Cloud Provider
DO
Member Count
3 IPs
Below average
Total Events
27136
Average by volume
Started / Ended
2026-02-25 15:04 — 2026-04-20 22:18
Attack Types
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Execution
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 209.38.82.183 | credential_harvester | 41% | 718 | 2 | ssh:bruteforce | — | 2026-03-14 22:08 | evidence → | |
| 209.38.82.225 | interactive_operator | 35% | 65 | 1 | ssh:bruteforce | — | 2026-02-25 15:18 | evidence → | |
| 209.38.82.77 | credential_harvester | 33% | 26355 | 1 | ssh:bruteforce | — | 2026-03-01 19:47 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds