← Back to feed
Subnet 172.94.9.0/24
SUBNET Active highWhy this campaign was detected
8 IPs from the same /24 subnet (172.94.9.0/24) were observed attacking our sensors within the same time window. All belong to Limited Network LTD (AS213790). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS213790 · Limited Network LTD
Subnet
172.94.9.0/24
Country
🇮🇷 IR
Cloud Provider
—
Member Count
8 IPs
Below average
Total Events
52
Below average by volume
Started / Ended
2026-04-22 21:53 — ongoing
Attack Types
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 172.94.9.62 | reconnaissance | 42% | DROP1x OSINT | 8 | 1 | ssh:bruteforce | — | 2026-04-22 23:22 | evidence → |
| 172.94.9.159 | reconnaissance | 42% | DROP1x OSINT | 8 | 1 | ssh:bruteforce | — | 2026-04-22 22:20 | evidence → |
| 172.94.9.153 | reconnaissance | 42% | DROP1x OSINT | 8 | 1 | ssh:bruteforce | — | 2026-04-22 22:14 | evidence → |
| 172.94.9.65 | reconnaissance | 42% | DROP1x OSINT | 8 | 1 | ssh:bruteforce | — | 2026-04-22 21:53 | evidence → |
| 172.94.9.59 | credential_probe | 29% | DROP1x OSINT | 5 | 1 | ssh:bruteforce | — | 2026-04-22 23:53 | evidence → |
| 172.94.9.205 | credential_probe | 29% | DROP1x OSINT | 5 | 1 | ssh:bruteforce | — | 2026-04-22 22:14 | evidence → |
| 172.94.9.157 | credential_probe | 29% | DROP1x OSINT | 5 | 1 | ssh:bruteforce | — | 2026-04-22 22:00 | evidence → |
| 172.94.9.154 | credential_probe | 29% | DROP1x OSINT | 5 | 1 | ssh:bruteforce | — | 2026-04-22 21:53 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds