← Back to feed

Subnet 45.153.34.0/24

SUBNET Active high
Why this campaign was detected
7 IPs from the same /24 subnet (45.153.34.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
45.153.34.0/24
Country
🇳🇱 NL
Cloud Provider
Member Count
7 IPs
Below average
Total Events
32184
Average by volume
Started / Ended
2026-03-01 00:48 — 2026-04-23 23:36
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
45.153.34.112 credential_harvester 70% DROP1x OSINT 31292 3 ssh:bruteforce 2026-05-09 11:01 evidence →
45.153.34.158 scanner 52% DROP 63 2 ssh:bruteforce 2026-05-09 14:39 evidence →
45.153.34.226 credential_harvester 51% DROP1x OSINT 290 1 ssh:bruteforce 2026-05-09 22:05 evidence →
45.153.34.47 scanner 45% DROP1x OSINT 21 1 ssh:bruteforce 2026-05-09 09:22 evidence →
45.153.34.59 scanner 40% DROP 32 1 ssh:bruteforce 2026-05-09 01:13 evidence →
45.153.34.235 credential_harvester 34% DROP 479 1 ssh:bruteforce 2026-05-11 22:54 evidence →
45.153.34.208 credential_probe 22% DROP1x OSINT 7 1 ssh:bruteforce 2026-05-07 23:49 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds