← Back to feed
Subnet 45.153.34.0/24
SUBNET Active highWhy this campaign was detected
7 IPs from the same /24 subnet (45.153.34.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
45.153.34.0/24
Country
🇳🇱 NL
Cloud Provider
—
Member Count
7 IPs
Below average
Total Events
32184
Average by volume
Started / Ended
2026-03-01 00:48 — 2026-04-23 23:36
Attack Types
MITRE ATT&CK Techniques
Initial Access
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 45.153.34.112 | credential_harvester | 70% | DROP1x OSINT | 31292 | 3 | ssh:bruteforce | — | 2026-05-09 11:01 | evidence → |
| 45.153.34.158 | scanner | 52% | DROP | 63 | 2 | ssh:bruteforce | — | 2026-05-09 14:39 | evidence → |
| 45.153.34.226 | credential_harvester | 51% | DROP1x OSINT | 290 | 1 | ssh:bruteforce | — | 2026-05-09 22:05 | evidence → |
| 45.153.34.47 | scanner | 45% | DROP1x OSINT | 21 | 1 | ssh:bruteforce | — | 2026-05-09 09:22 | evidence → |
| 45.153.34.59 | scanner | 40% | DROP | 32 | 1 | ssh:bruteforce | — | 2026-05-09 01:13 | evidence → |
| 45.153.34.235 | credential_harvester | 34% | DROP | 479 | 1 | ssh:bruteforce | — | 2026-05-11 22:54 | evidence → |
| 45.153.34.208 | credential_probe | 22% | DROP1x OSINT | 7 | 1 | ssh:bruteforce | — | 2026-05-07 23:49 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds