← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
52 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
52 IPs
Below average
Total Events
11408
Below average by volume
Started / Ended
2026-02-28 09:31 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
102.88.137.80 credential_harvester 69% 1x OSINT 2303 2 ssh:bruteforce 2026-04-19 06:08 evidence →
103.103.245.61 credential_harvester 64% 1006 2 ssh:bruteforce 2026-04-19 08:48 evidence →
27.79.45.122 credential_harvester 63% 1x OSINT 327 2 ssh:bruteforce 2026-04-18 19:45 evidence →
80.87.83.229 credential_harvester 63% 819 2 ssh:bruteforce 2026-04-19 03:17 evidence →
103.173.154.45 credential_harvester 62% 510 2 ssh:bruteforce 2026-04-19 00:03 evidence →
159.65.153.141 opportunistic_bruter 59% 69 2 ssh:bruteforce 2026-04-19 11:12 evidence →
222.73.56.10 scanner 59% 39 2 ssh:bruteforce 2026-04-19 11:29 evidence →
14.103.123.80 malware_dropper 58% 26 2 ssh:bruteforce 2026-04-18 16:49 evidence →
45.148.10.183 credential_harvester 58% DROP1x OSINT 382 2 ssh:bruteforce 2026-04-19 15:06 evidence →
64.62.156.122 scanner 54% 2x OSINT 19 2 http:scanssh:bruteforce 2026-04-19 01:33 evidence →
81.29.142.100 web_probe 53% 1x OSINT 91 2 http:scanmysql:bruteforcessh:bruteforce igutic.earnningipti.co.uk 2026-04-19 02:07 evidence →
94.102.49.155 scanner 53% DROP1x OSINT 101 2 ftp:bruteforcessh:bruteforce no-reverse-dns-configured.com 2026-04-19 12:29 evidence →
184.105.247.252 scanner 51% 1x OSINT 21 2 http:scanssh:bruteforce 2026-04-19 04:04 evidence →
45.227.254.170 opportunistic_bruter 51% 1x OSINT 50 2 ssh:bruteforce 2026-04-19 07:02 evidence →
80.94.92.186 credential_harvester 49% DROP1x OSINT 4534 2 ssh:bruteforce 2026-04-19 10:26 evidence →
192.42.116.14 proxy_abuser 48% 1x OSINT 10 1 ssh:bruteforce 2026-04-18 20:24 evidence →
180.76.250.38 scanner 48% 22 1 ssh:bruteforce 2026-04-19 08:46 evidence →
66.228.53.157 scanner 47% 31 2 http:scanssh:bruteforce 2026-04-19 05:41 evidence →
45.79.181.94 web_probe 47% 30 2 http:scanssh:bruteforce 2026-04-19 03:28 evidence →
2.57.122.192 opportunistic_bruter 46% DROP 70 2 ssh:bruteforce 2026-04-19 01:03 evidence →
85.11.183.27 web_probe 46% 16 2 http:scanssh:bruteforce 2026-04-19 06:52 evidence →
66.228.53.204 web_probe 46% 14 2 http:scanssh:bruteforce 2026-04-19 07:10 evidence →
45.91.64.7 scanner 43% 2x OSINT 19 2 ftp:bruteforcessh:bruteforce scan.f6.security 2026-04-13 22:16 evidence →
31.56.209.38 credential_harvester 43% DROP1x OSINT 11 1 ssh:bruteforce 2026-04-18 22:47 evidence →
107.175.34.74 malware_dropper 42% 23 1 ssh:bruteforce 2026-04-15 17:43 evidence →
103.193.178.240 credential_harvester 41% 192 1 ssh:bruteforce 2026-04-13 13:17 evidence →
43.160.233.150 credential_harvester 41% 395 1 ssh:bruteforce 2026-04-07 17:50 evidence →
213.177.179.62 scanner 40% DROP1x OSINT 19 2 ssh:bruteforce 2026-04-19 05:19 evidence →
45.148.10.141 opportunistic_bruter 40% DROP 90 2 ssh:bruteforce 2026-04-15 13:04 evidence →
46.151.182.162 mysql_bruter 40% DROP1x OSINT 4 2 mysql:bruteforce 2026-04-19 15:55 evidence →
45.79.211.97 scanner 40% 1x OSINT 13 2 ssh:bruteforce 2026-04-19 08:35 evidence →
194.195.210.47 scanner 40% 1x OSINT 14 2 ssh:bruteforce 2026-04-19 05:32 evidence →
14.103.112.105 scanner 38% 33 2 ssh:bruteforce 2026-04-19 13:41 evidence →
65.49.1.80 scanner 38% 2x OSINT 7 1 http:scanssh:bruteforce 2026-04-16 01:36 evidence →
31.56.209.39 reconnaissance 38% DROP 12 1 ssh:bruteforce 2026-04-19 11:52 evidence →
124.156.179.141 web_probe 37% 9 2 http:scan 2026-04-19 12:03 evidence →
119.148.49.82 scanner 37% 48 2 ssh:bruteforce 2026-04-19 00:52 evidence →
213.177.179.80 scanner 36% DROP1x OSINT 28 2 ssh:bruteforce 2026-04-16 17:12 evidence →
43.155.195.141 web_probe 36% 5 2 http:scan 2026-04-19 00:12 evidence →
43.156.156.96 web_probe 35% 2 2 http:scan 2026-04-19 05:19 evidence →
92.118.39.235 opportunistic_bruter 34% DROP 5 1 ssh:bruteforce 2026-04-19 16:02 evidence →
5.187.35.142 scanner 30% 2x OSINT 6 2 ssh:bruteforce 2026-04-06 10:41 evidence →
103.183.13.42 scanner 29% 4 2 ssh:bruteforce 2026-04-16 20:04 evidence →
92.118.39.196 opportunistic_bruter 28% DROP 5 1 ssh:bruteforce 2026-04-16 13:03 evidence →
43.167.245.18 web_probe 27% 3 2 http:scan 2026-04-14 19:19 evidence →
45.148.10.67 web_probe 25% DROP 1 1 http:scan 2026-04-19 04:43 evidence →
2.26.86.54 credential_probe 24% 10 1 ssh:bruteforce 2026-04-19 06:01 evidence →
64.89.163.91 mysql_bruter 22% DROP1x OSINT 3 1 mysql:bruteforce 2026-04-14 21:15 evidence →
34.77.175.80 ftp_probe 22% 2 1 ftp:bruteforce 2026-04-19 00:05 evidence →
205.210.31.128 scanner 17% 1x OSINT 4 1 ssh:bruteforce 2026-04-12 16:35 evidence →
195.170.172.128 web_probe 14% 3 1 http:scan 2026-03-17 19:11 evidence →
14.103.118.140 credential_probe 11% 4 1 ssh:bruteforce 2026-03-29 12:10 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds