← Back to feed
AS45102 Alibaba US Technology Co., Ltd.
ASN Active mediumWhy this campaign was detected
31 IPs from the same network (Alibaba US Technology Co., Ltd., AS45102) were active during overlapping time periods. Temporal correlation across a shared autonomous system suggests infrastructure controlled by the same entity.
Primary ASN
AS45102 · Alibaba US Technology Co., Ltd.
Subnet
—
Country
🇭🇰 HK
Cloud Provider
—
Member Count
31 IPs
Below average
Total Events
9499
Below average by volume
Started / Ended
2026-02-28 21:04 — ongoing
Attack Types
MITRE ATT&CK Techniques
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 8.221.139.48 | scanner | 61% | 37 | 3 | mysql:bruteforcessh:bruteforce | — | 2026-05-11 06:09 | evidence → | |
| 8.219.222.66 | scanner | 59% | 1x OSINT | 37 | 3 | mysql:bruteforcessh:bruteforce | — | 2026-05-08 02:45 | evidence → |
| 47.237.123.131 | credential_harvester | 50% | 1x OSINT | 2060 | 1 | ssh:bruteforce | — | 2026-05-11 16:05 | evidence → |
| 47.82.173.72 | credential_harvester | 47% | 1x OSINT | 364 | 1 | ssh:bruteforce | — | 2026-05-10 03:27 | evidence → |
| 8.217.135.101 | credential_harvester | 45% | 2005 | 1 | ssh:bruteforce | — | 2026-05-11 11:15 | evidence → | |
| 8.218.227.125 | scanner | 43% | 430 | 1 | ssh:bruteforce | — | 2026-05-10 13:15 | evidence → | |
| 8.222.128.242 | scanner | 43% | 1x OSINT | 22 | 2 | mysql:bruteforcessh:bruteforce | — | 2026-05-07 14:20 | evidence → |
| 8.217.232.214 | credential_harvester | 42% | 141 | 2 | ssh:bruteforce | — | 2026-05-07 03:09 | evidence → | |
| 47.236.124.158 | credential_harvester | 42% | 1411 | 1 | ssh:bruteforce | — | 2026-05-09 23:59 | evidence → | |
| 47.237.107.227 | credential_harvester | 41% | 188 | 1 | ssh:bruteforce | — | 2026-05-11 02:14 | evidence → | |
| 47.74.51.79 | scanner | 38% | 1x OSINT | 19 | 2 | mysql:bruteforcessh:bruteforce | — | 2026-05-05 06:25 | evidence → |
| 43.110.129.195 | credential_harvester | 37% | 2200 | 1 | ssh:bruteforce | — | 2026-05-07 09:21 | evidence → | |
| 47.86.3.155 | credential_harvester | 36% | 122 | 1 | ssh:bruteforce | — | 2026-05-08 15:16 | evidence → | |
| 47.242.144.15 | credential_harvester | 35% | 376 | 1 | ssh:bruteforce | — | 2026-05-07 07:11 | evidence → | |
| 47.250.81.7 | scanner | 35% | 1x OSINT | 18 | 2 | ssh:bruteforce | — | 2026-05-08 12:24 | evidence → |
| 8.210.46.79 | scanner | 31% | 1x OSINT | 10 | 1 | ssh:bruteforce | — | 2026-05-11 17:49 | evidence → |
| 47.242.216.170 | credential_probe | 30% | 1x OSINT | 20 | 1 | ssh:bruteforce | — | 2026-05-11 12:49 | evidence → |
| 47.251.11.155 | web_probe | 29% | 2 | 2 | http:scan | — | 2026-05-08 11:03 | evidence → | |
| 47.86.226.94 | scanner | 27% | 1x OSINT | 2 | 1 | ssh:bruteforce | — | 2026-05-11 01:06 | evidence → |
| 47.251.90.48 | web_probe | 27% | 3 | 1 | http:scan | — | 2026-05-11 18:06 | evidence → | |
| 8.208.81.42 | scanner | 25% | 5 | 1 | ssh:bruteforce | — | 2026-05-11 13:30 | evidence → | |
| 47.239.94.240 | scanner | 24% | 6 | 1 | ssh:bruteforce | — | 2026-05-10 09:12 | evidence → | |
| 47.86.234.169 | scanner | 24% | 1x OSINT | 2 | 1 | ssh:bruteforce | — | 2026-05-09 02:29 | evidence → |
| 47.86.234.30 | scanner | 23% | 2 | 1 | ssh:bruteforce | — | 2026-05-10 02:52 | evidence → | |
| 8.221.124.62 | scanner | 18% | 3 | 1 | ssh:bruteforce | — | 2026-05-08 08:45 | evidence → | |
| 47.86.235.148 | scanner | 17% | 2 | 1 | ssh:bruteforce | — | 2026-05-08 02:26 | evidence → | |
| 47.83.226.177 | scanner | 15% | 2 | 1 | ssh:bruteforce | — | 2026-05-07 01:53 | evidence → | |
| 47.91.79.196 | web_probe | 15% | 2 | 1 | http:scan | — | 2026-05-05 16:20 | evidence → | |
| 47.83.159.53 | scanner | 14% | 4 | 1 | ssh:bruteforce | — | 2026-05-05 18:17 | evidence → | |
| 8.217.119.64 | scanner | 13% | 2 | 1 | ssh:bruteforce | — | 2026-05-06 04:25 | evidence → | |
| 47.83.133.117 | scanner | 12% | 2 | 1 | ssh:bruteforce | — | 2026-05-05 03:59 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds