← Back to feed

AS142002 Scloud Pte Ltd

ASN Active medium
Why this campaign was detected
7 IPs from the same network (Scloud Pte Ltd, AS142002) were active during overlapping time periods. Temporal correlation across a shared autonomous system suggests infrastructure controlled by the same entity.
Primary ASN
AS142002 · Scloud Pte Ltd
Subnet
Country
🇭🇰 HK
Cloud Provider
Member Count
7 IPs
Below average
Total Events
915
Below average by volume
Started / Ended
2026-02-27 14:46 — ongoing
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
165.154.236.104 credential_harvester 68% DROP1x OSINT 397 2 ssh:bruteforce 2026-05-14 20:20 evidence →
165.154.231.236 credential_harvester 57% DROP1x OSINT 263 2 ssh:bruteforce 2026-05-09 13:16 evidence →
165.154.231.46 credential_harvester 55% DROP1x OSINT 168 1 ssh:bruteforce 2026-05-14 00:22 evidence →
165.154.225.20 scanner 37% DROP1x OSINT 42 2 ssh:bruteforce 2026-05-12 00:38 evidence →
165.154.225.32 credential_probe 26% DROP1x OSINT 15 1 ssh:bruteforce 2026-05-12 14:49 evidence →
165.154.224.241 credential_probe 26% DROP1x OSINT 15 1 ssh:bruteforce 2026-05-12 13:17 evidence →
165.154.245.69 credential_probe 20% DROP 15 1 ssh:bruteforce 2026-05-11 20:54 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds