← Back to feed
Subnet 209.38.27.0/24
SUBNET Ended highWhy this campaign was detected
3 IPs from the same /24 subnet (209.38.27.0/24) were observed attacking our sensors within the same time window. All belong to DigitalOcean, LLC (AS14061). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS14061 · DigitalOcean, LLC
Subnet
209.38.27.0/24
Country
🇦🇺 AU
Cloud Provider
DO
Member Count
3 IPs
Below average
Total Events
2893
Below average by volume
Started / Ended
2026-02-23 15:25 — 2026-04-11 14:19
Attack Types
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 209.38.27.19 | credential_harvester | 42% | 1866 | 2 | ssh:bruteforce | — | 2026-03-02 13:50 | evidence → | |
| 209.38.27.153 | credential_harvester | 32% | 665 | 1 | ssh:bruteforce | — | 2026-03-02 06:30 | evidence → | |
| 209.38.27.200 | credential_harvester | 31% | 362 | 1 | ssh:bruteforce | — | 2026-03-01 18:40 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds