← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
7 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
7 IPs
Below average
Total Events
5150
Below average by volume
Started / Ended
2026-03-02 13:13 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
104.208.108.166 credential_harvester 83% 1x OSINT 411 3 ssh:bruteforce 2026-04-28 03:20 evidence →
102.88.137.80 credential_harvester 65% 1x OSINT 2672 2 ssh:bruteforce 2026-04-25 16:04 evidence →
27.79.43.239 credential_harvester 63% 1x OSINT 315 2 ssh:bruteforce 2026-04-28 02:53 evidence →
102.88.137.213 credential_harvester 58% 1x OSINT 1469 2 ssh:bruteforce 2026-04-21 22:31 evidence →
102.88.137.145 credential_harvester 57% 1x OSINT 365 2 ssh:bruteforce 2026-04-22 11:52 evidence →
106.12.43.166 scanner 54% 1x OSINT 50 2 ssh:bruteforce 2026-04-22 18:13 evidence →
103.56.115.187 credential_probe 36% DROP1x OSINT 28 2 ssh:bruteforce 2026-04-25 22:12 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds