← Back to feed
Subnet 165.154.6.0/24
SUBNET Active highWhy this campaign was detected
5 IPs from the same /24 subnet (165.154.6.0/24) were observed attacking our sensors within the same time window. All belong to UCLOUD INFORMATION TECHNOLOGY HK LIMITED (AS135377). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS135377 · UCLOUD INFORMATION TECHNOLOGY HK LIMITED
Subnet
165.154.6.0/24
Country
🇭🇰 HK
Cloud Provider
—
Member Count
5 IPs
Below average
Total Events
2974
Below average by volume
Started / Ended
2026-03-03 07:25 — ongoing
Attack Types
MITRE ATT&CK Techniques
Initial Access
Discovery
Command and Control
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 165.154.6.102 | credential_harvester | 68% | 1x OSINT | 846 | 2 | ssh:bruteforce | — | 2026-05-11 08:24 | evidence → |
| 165.154.6.34 | credential_harvester | 62% | 1x OSINT | 449 | 2 | ssh:bruteforce | — | 2026-05-09 00:44 | evidence → |
| 165.154.6.138 | credential_harvester | 61% | 1x OSINT | 645 | 2 | ssh:bruteforce | — | 2026-05-07 19:47 | evidence → |
| 165.154.6.49 | credential_harvester | 56% | 1x OSINT | 1029 | 2 | ssh:bruteforce | — | 2026-05-04 23:41 | evidence → |
| 165.154.6.75 | credential_probe | 20% | 5 | 1 | ssh:bruteforce | — | 2026-05-09 18:51 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds