← Back to feed

Subnet 165.154.6.0/24

SUBNET Active high
Why this campaign was detected
5 IPs from the same /24 subnet (165.154.6.0/24) were observed attacking our sensors within the same time window. All belong to UCLOUD INFORMATION TECHNOLOGY HK LIMITED (AS135377). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS135377 · UCLOUD INFORMATION TECHNOLOGY HK LIMITED
Subnet
165.154.6.0/24
Country
🇭🇰 HK
Cloud Provider
Member Count
5 IPs
Below average
Total Events
2974
Below average by volume
Started / Ended
2026-03-03 07:25 — ongoing
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
165.154.6.102 credential_harvester 68% 1x OSINT 846 2 ssh:bruteforce 2026-05-11 08:24 evidence →
165.154.6.34 credential_harvester 62% 1x OSINT 449 2 ssh:bruteforce 2026-05-09 00:44 evidence →
165.154.6.138 credential_harvester 61% 1x OSINT 645 2 ssh:bruteforce 2026-05-07 19:47 evidence →
165.154.6.49 credential_harvester 56% 1x OSINT 1029 2 ssh:bruteforce 2026-05-04 23:41 evidence →
165.154.6.75 credential_probe 20% 5 1 ssh:bruteforce 2026-05-09 18:51 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds