← Back to feed

Subnet 66.132.172.0/24

SUBNET Active high
Why this campaign was detected
22 IPs from the same /24 subnet (66.132.172.0/24) were observed attacking our sensors within the same time window. All belong to Censys, Inc. (AS398324). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS398324 · Censys, Inc.
Subnet
66.132.172.0/24
Country
πŸ‡ΊπŸ‡Έ US
Cloud Provider
Member Count
22 IPs
Below average
Total Events
106
Below average by volume
Started / Ended
2026-03-19 22:52 — ongoing
Attack Types
http:scan ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
66.132.172.186 web_probe 61% 2x OSINT 7 3 http:scanssh:bruteforce β€” 2026-05-12 08:54 evidence →
66.132.172.132 scanner 59% 1x OSINT 14 3 http:scanssh:bruteforce β€” 2026-05-13 02:16 evidence →
66.132.172.190 web_probe 59% 2x OSINT 6 3 http:scanssh:bruteforce β€” 2026-05-11 10:35 evidence →
66.132.172.134 web_probe 53% 2x OSINT 6 2 http:scanssh:bruteforce β€” 2026-05-16 14:48 evidence →
66.132.172.201 scanner 49% 2x OSINT 9 2 http:scanssh:bruteforce β€” 2026-05-14 03:19 evidence →
66.132.172.191 web_probe 44% 1x OSINT 6 2 http:scanssh:bruteforce β€” 2026-05-13 19:57 evidence →
66.132.172.139 scanner 39% 1x OSINT 8 2 ssh:bruteforce β€” 2026-05-16 12:32 evidence →
66.132.172.101 scanner 38% 1x OSINT 10 2 http:scanssh:bruteforce β€” 2026-05-09 18:34 evidence →
66.132.172.106 web_probe 37% 6 2 http:scanssh:bruteforce β€” 2026-05-12 03:38 evidence →
66.132.172.221 web_probe 34% 5 2 http:scanssh:bruteforce β€” 2026-05-10 22:50 evidence →
66.132.172.130 web_probe 30% 2x OSINT 2 1 http:scan β€” 2026-05-14 02:47 evidence →
66.132.172.138 web_probe 30% 2x OSINT 1 1 http:scan β€” 2026-05-15 14:05 evidence →
66.132.172.195 scanner 26% 1x OSINT 4 1 ssh:bruteforce β€” 2026-05-14 11:05 evidence →
66.132.172.208 web_probe 25% 1 1 http:scan β€” 2026-05-16 11:54 evidence →
66.132.172.178 scanner 25% 1x OSINT 4 1 ssh:bruteforce β€” 2026-05-13 21:35 evidence →
66.132.172.110 scanner 24% 5 1 http:scanssh:bruteforce β€” 2026-05-10 09:32 evidence →
66.132.172.129 web_probe 23% 1x OSINT 1 1 http:scan β€” 2026-05-12 18:52 evidence →
66.132.172.213 web_probe 23% 1 1 http:scan β€” 2026-05-14 22:50 evidence →
66.132.172.196 web_probe 22% 1x OSINT 1 1 http:scan β€” 2026-05-12 00:47 evidence →
66.132.172.187 scanner 22% 1x OSINT 4 1 ssh:bruteforce β€” 2026-05-12 11:33 evidence →
66.132.172.218 web_probe 22% 1 1 http:scan β€” 2026-05-14 10:20 evidence →
66.132.172.96 scanner 20% 4 1 ssh:bruteforce β€” 2026-05-14 01:57 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds