← Back to feed

AS45102 Alibaba US Technology Co., Ltd.

ASN Active medium
Why this campaign was detected
31 IPs from the same network (Alibaba US Technology Co., Ltd., AS45102) were active during overlapping time periods. Temporal correlation across a shared autonomous system suggests infrastructure controlled by the same entity.
Primary ASN
AS45102 · Alibaba US Technology Co., Ltd.
Subnet
Country
🇭🇰 HK
Cloud Provider
Member Count
31 IPs
Below average
Total Events
9499
Below average by volume
Started / Ended
2026-02-28 21:04 — ongoing
Attack Types
http:scan mysql:bruteforce ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
8.221.139.48 scanner 61% 37 3 mysql:bruteforcessh:bruteforce 2026-05-11 06:09 evidence →
8.219.222.66 scanner 59% 1x OSINT 37 3 mysql:bruteforcessh:bruteforce 2026-05-08 02:45 evidence →
47.237.123.131 credential_harvester 50% 1x OSINT 2060 1 ssh:bruteforce 2026-05-11 16:05 evidence →
47.82.173.72 credential_harvester 47% 1x OSINT 364 1 ssh:bruteforce 2026-05-10 03:27 evidence →
8.217.135.101 credential_harvester 45% 2005 1 ssh:bruteforce 2026-05-11 11:15 evidence →
8.218.227.125 scanner 43% 430 1 ssh:bruteforce 2026-05-10 13:15 evidence →
8.222.128.242 scanner 43% 1x OSINT 22 2 mysql:bruteforcessh:bruteforce 2026-05-07 14:20 evidence →
8.217.232.214 credential_harvester 42% 141 2 ssh:bruteforce 2026-05-07 03:09 evidence →
47.236.124.158 credential_harvester 42% 1411 1 ssh:bruteforce 2026-05-09 23:59 evidence →
47.237.107.227 credential_harvester 41% 188 1 ssh:bruteforce 2026-05-11 02:14 evidence →
47.74.51.79 scanner 38% 1x OSINT 19 2 mysql:bruteforcessh:bruteforce 2026-05-05 06:25 evidence →
43.110.129.195 credential_harvester 37% 2200 1 ssh:bruteforce 2026-05-07 09:21 evidence →
47.86.3.155 credential_harvester 36% 122 1 ssh:bruteforce 2026-05-08 15:16 evidence →
47.242.144.15 credential_harvester 35% 376 1 ssh:bruteforce 2026-05-07 07:11 evidence →
47.250.81.7 scanner 35% 1x OSINT 18 2 ssh:bruteforce 2026-05-08 12:24 evidence →
8.210.46.79 scanner 31% 1x OSINT 10 1 ssh:bruteforce 2026-05-11 17:49 evidence →
47.242.216.170 credential_probe 30% 1x OSINT 20 1 ssh:bruteforce 2026-05-11 12:49 evidence →
47.251.11.155 web_probe 29% 2 2 http:scan 2026-05-08 11:03 evidence →
47.86.226.94 scanner 27% 1x OSINT 2 1 ssh:bruteforce 2026-05-11 01:06 evidence →
47.251.90.48 web_probe 27% 3 1 http:scan 2026-05-11 18:06 evidence →
8.208.81.42 scanner 25% 5 1 ssh:bruteforce 2026-05-11 13:30 evidence →
47.239.94.240 scanner 24% 6 1 ssh:bruteforce 2026-05-10 09:12 evidence →
47.86.234.169 scanner 24% 1x OSINT 2 1 ssh:bruteforce 2026-05-09 02:29 evidence →
47.86.234.30 scanner 23% 2 1 ssh:bruteforce 2026-05-10 02:52 evidence →
8.221.124.62 scanner 18% 3 1 ssh:bruteforce 2026-05-08 08:45 evidence →
47.86.235.148 scanner 17% 2 1 ssh:bruteforce 2026-05-08 02:26 evidence →
47.83.226.177 scanner 15% 2 1 ssh:bruteforce 2026-05-07 01:53 evidence →
47.91.79.196 web_probe 15% 2 1 http:scan 2026-05-05 16:20 evidence →
47.83.159.53 scanner 14% 4 1 ssh:bruteforce 2026-05-05 18:17 evidence →
8.217.119.64 scanner 13% 2 1 ssh:bruteforce 2026-05-06 04:25 evidence →
47.83.133.117 scanner 12% 2 1 ssh:bruteforce 2026-05-05 03:59 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds