← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
12 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
12 IPs
Below average
Total Events
2437
Below average by volume
Started / Ended
2026-03-01 05:49 — ongoing
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
39.123.249.114 credential_harvester 71% 1x OSINT 1397 3 ssh:bruteforce 2026-05-04 10:47 evidence →
197.248.207.139 credential_harvester 64% 2x OSINT 1509 2 ssh:bruteforce 2026-05-07 08:08 evidence →
102.88.137.80 credential_harvester 60% 2x OSINT 3103 2 ssh:bruteforce 2026-05-03 12:21 evidence →
152.32.252.65 credential_harvester 59% 1x OSINT 756 2 ssh:bruteforce 2026-05-06 15:51 evidence →
104.244.74.84 credential_harvester 52% 1065 2 ssh:bruteforce 2026-04-13 21:00 evidence →
106.13.48.156 scanner 51% 1x OSINT 42 2 ssh:bruteforce 2026-04-23 20:08 evidence →
101.126.69.201 scanner 46% 50 2 ssh:bruteforce 2026-03-30 20:05 evidence →
207.46.224.91 reconnaissance 39% 271 2 ssh:bruteforce 2026-03-27 15:07 evidence →
2.57.121.17 opportunistic_bruter 34% DROP 45 2 ssh:bruteforce 2026-04-13 22:02 evidence →
80.102.218.207 credential_harvester 25% 27 2 ssh:bruteforce 2026-03-27 11:07 evidence →
134.199.158.149 scanner 22% 8 2 ssh:bruteforce 2026-04-01 00:25 evidence →
50.118.250.178 scanner 21% 4 2 ssh:bruteforce 2026-03-27 17:34 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds