← Back to feed
Multi-Agent Scan
SCAN Active mediumWhy this campaign was detected
4 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
—
Subnet
—
Country
—
Cloud Provider
—
Member Count
4 IPs
Below average
Total Events
787
Below average by volume
Started / Ended
2026-04-07 12:22 — ongoing
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 41.216.177.55 | credential_harvester | 82% | 1x OSINT | 395 | 3 | ssh:bruteforce | — | 2026-04-27 06:08 | evidence → |
| 190.181.4.12 | credential_harvester | 67% | 1x OSINT | 261 | 2 | ssh:bruteforce | — | 2026-04-27 05:51 | evidence → |
| 64.89.163.146 | mysql_bruter | 56% | DROP1x OSINT | 7 | 3 | mysql:bruteforce | — | 2026-04-27 06:25 | evidence → |
| 45.192.184.50 | scanner | 44% | 1x OSINT | 125 | 2 | ssh:bruteforce | — | 2026-04-27 06:12 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds