← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
7 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
7 IPs
Below average
Total Events
4545
Below average by volume
Started / Ended
2026-02-28 07:54 — ongoing
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Exfiltration
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
213.209.159.158 credential_harvester 84% DROP1x OSINT 7600 3 ssh:bruteforce 2026-05-11 16:45 evidence →
69.5.0.120 credential_harvester 71% 1x OSINT 711 3 ssh:bruteforce 2026-04-26 21:02 evidence →
197.153.57.103 credential_harvester 56% 1x OSINT 873 2 ssh:bruteforce 2026-04-27 00:40 evidence →
196.28.242.198 credential_harvester 56% 1x OSINT 709 2 ssh:bruteforce 2026-04-03 20:21 evidence →
220.247.223.56 credential_harvester 50% 384 2 ssh:bruteforce 56.sta.idc-2.slt.lk 2026-03-23 21:19 evidence →
83.97.24.41 credential_harvester 48% 133 2 ssh:bruteforce 2026-03-17 06:08 evidence →
80.82.70.133 scanner 10% DROP2x OSINT 42 3 ssh:bruteforce rnd.group-ib.com 2026-05-11 18:04 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds