← Back to feed

Subnet 152.32.171.0/24

SUBNET Active high
Why this campaign was detected
3 IPs from the same /24 subnet (152.32.171.0/24) were observed attacking our sensors within the same time window. All belong to UCLOUD INFORMATION TECHNOLOGY HK LIMITED (AS135377). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS135377 · UCLOUD INFORMATION TECHNOLOGY HK LIMITED
Subnet
152.32.171.0/24
Country
🇭🇰 HK
Cloud Provider
Member Count
3 IPs
Below average
Total Events
725
Below average by volume
Started / Ended
2026-02-27 22:33 — ongoing
Attack Types
ssh:bruteforce
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
152.32.171.99 credential_harvester 60% 1x OSINT 227 2 ssh:bruteforce 2026-04-02 06:15 evidence →
152.32.171.251 credential_harvester 58% 1x OSINT 233 1 ssh:bruteforce 2026-04-05 17:32 evidence →
152.32.171.213 credential_harvester 56% 1x OSINT 265 2 ssh:bruteforce 2026-03-30 19:50 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds