← Back to feed

Subnet 45.156.87.0/24

SUBNET Active high
Why this campaign was detected
3 IPs from the same /24 subnet (45.156.87.0/24) were observed attacking our sensors within the same time window. All belong to Pfcloud UG (haftungsbeschrankt) (AS51396). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS51396 · Pfcloud UG (haftungsbeschrankt)
Subnet
45.156.87.0/24
Country
🇳🇱 NL
Cloud Provider
Member Count
3 IPs
Below average
Total Events
8905
Below average by volume
Started / Ended
2026-04-19 06:21 — ongoing
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
45.156.87.253 credential_harvester 50% DROP1x OSINT 3918 1 ssh:bruteforce 2026-04-27 09:52 evidence →
45.156.87.99 credential_harvester 46% DROP2x OSINT 3885 1 ssh:bruteforce 2026-04-23 00:28 evidence →
45.156.87.209 reconnaissance 34% DROP 1102 1 ssh:bruteforce 2026-04-21 07:38 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds