← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
8 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
8 IPs
Below average
Total Events
3916
Below average by volume
Started / Ended
2026-02-24 02:15 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
130.12.180.51 data_exfiltrator 79% DROP 2267 3 ssh:bruteforce 2026-04-23 09:07 evidence →
36.255.220.44 credential_harvester 68% 1x OSINT 686 2 ssh:bruteforce 2026-04-23 08:34 evidence →
106.13.69.159 scanner 65% 1x OSINT 114 2 ssh:bruteforce 2026-04-23 06:31 evidence →
142.248.80.38 web_probe 61% 2x OSINT 8 3 http:scan 2026-04-23 06:13 evidence →
138.204.127.54 credential_harvester 58% 1x OSINT 310 2 ssh:bruteforce 2026-04-18 14:42 evidence →
152.250.243.47 credential_harvester 56% 1x OSINT 618 2 ssh:bruteforce 2026-04-16 13:16 evidence →
103.203.57.2 scanner 43% 2x OSINT 208 2 ssh:bruteforce scan-57-2.security.ipip.net 2026-04-20 13:12 evidence →
106.12.43.166 scanner 41% 1x OSINT 25 1 ssh:bruteforce 2026-03-13 02:03 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds