← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
9 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
9 IPs
Below average
Total Events
2484
Below average by volume
Started / Ended
2026-02-23 04:02 — ongoing
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
51.158.120.121 credential_harvester 81% 1x OSINT 2021 3 ssh:bruteforce 121-120-158-51.instances.scw.cloud 2026-05-09 23:50 evidence →
45.144.233.56 credential_harvester 70% 1x OSINT 618 3 ssh:bruteforce 2026-05-04 11:52 evidence →
45.78.237.21 credential_harvester 50% 388 2 ssh:bruteforce 2026-04-13 17:27 evidence →
165.154.22.6 credential_harvester 49% 227 2 ssh:bruteforce 2026-03-22 09:51 evidence →
104.223.21.7 credential_harvester 48% 164 2 ssh:bruteforce 2026-03-16 18:07 evidence →
152.32.134.231 credential_harvester 48% 159 2 ssh:bruteforce 2026-03-16 17:41 evidence →
122.224.240.99 scanner 47% 65 2 ssh:bruteforce 2026-04-26 06:46 evidence →
92.118.39.56 credential_harvester 32% DROP 4100 2 ssh:bruteforce 2026-04-17 12:10 evidence →
170.64.175.58 scanner 23% 16 2 ssh:bruteforce 2026-03-17 06:00 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds