← Back to feed

AS45090 Shenzhen Tencent Computer Systems Company Limited

ASN Active medium
Why this campaign was detected
17 IPs from the same network (Shenzhen Tencent Computer Systems Company Limited, AS45090) were active during overlapping time periods. Temporal correlation across a shared autonomous system suggests infrastructure controlled by the same entity.
Primary ASN
AS45090 · Shenzhen Tencent Computer Systems Company Limited
Subnet
Country
🇨🇳 CN
Cloud Provider
Member Count
17 IPs
Below average
Total Events
1150
Below average by volume
Started / Ended
2026-03-06 13:09 — ongoing
Attack Types
http:scan ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
82.156.194.252 scanner 44% 1100 1 ssh:bruteforce 2026-05-12 03:07 evidence →
82.156.38.59 scanner 29% 1x OSINT 4 1 ssh:bruteforce 2026-05-13 12:04 evidence →
111.230.233.46 web_probe 27% 4 1 http:scan 2026-05-13 14:14 evidence →
139.155.126.16 web_probe 27% 3 1 http:scan 2026-05-13 11:54 evidence →
175.178.110.121 web_probe 27% 5 1 http:scan 2026-05-13 01:22 evidence →
49.233.45.47 web_probe 24% 4 1 http:scan 2026-05-11 21:43 evidence →
1.15.52.154 web_probe 22% 2 1 http:scan 2026-05-11 08:50 evidence →
129.211.172.249 web_probe 22% 3 1 http:scan 2026-05-10 20:48 evidence →
119.91.20.139 web_probe 20% 3 1 http:scan 2026-05-09 19:38 evidence →
175.27.171.245 web_probe 18% 2 1 http:scan 2026-05-09 06:27 evidence →
123.207.65.62 web_probe 17% 2 1 http:scan 2026-05-08 18:17 evidence →
82.156.38.68 scanner 17% 2 1 ssh:bruteforce 2026-05-09 16:19 evidence →
106.54.62.156 web_probe 16% 2 1 http:scan 2026-05-08 05:20 evidence →
122.51.236.174 web_probe 16% 4 1 http:scan 2026-05-07 08:54 evidence →
162.14.66.219 web_probe 15% 2 1 http:scan 2026-05-07 17:38 evidence →
101.42.46.71 web_probe 15% 4 1 http:scan 2026-05-07 04:19 evidence →
43.138.68.113 web_probe 15% 4 1 http:scan 2026-05-06 21:22 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds