← Back to feed

Multi-Agent Scan

SCAN Ended medium
Why this campaign was detected
4 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
4 IPs
Below average
Total Events
2229
Below average by volume
Started / Ended
2026-02-23 04:02 — ongoing
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
193.123.245.198 credential_harvester 52% 1013 2 ssh:bruteforce 2026-04-27 04:12 evidence →
20.26.135.100 credential_harvester 51% 713 2 ssh:bruteforce 2026-04-04 15:20 evidence →
92.118.39.56 credential_harvester 32% DROP 4100 2 ssh:bruteforce 2026-04-17 12:10 evidence →
183.96.173.196 web_probe 24% 5 2 http:scan 2026-04-21 08:40 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds