← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
9 IPs independently targeted the same honeypot sensors within a 24-hour window. Hosted on Azure. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Azure
Member Count
9 IPs
Below average
Total Events
1069
Below average by volume
Started / Ended
2026-02-27 14:46 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
104.208.108.166 credential_harvester 82% 1x OSINT 411 3 ssh:bruteforce 2026-04-28 03:20 evidence →
94.102.49.155 scanner 69% DROP1x OSINT 145 3 ftp:bruteforcemysql:bruteforcessh:bruteforce no-reverse-dns-configured.com 2026-04-28 02:31 evidence →
58.225.220.117 credential_harvester 67% 1x OSINT 401 2 ssh:bruteforce 2026-04-28 02:54 evidence →
172.236.228.218 web_probe 63% 45 3 http:scanssh:bruteforce 2026-04-28 04:34 evidence →
45.79.181.94 web_probe 63% 33 3 http:scanssh:bruteforce 2026-04-28 02:58 evidence →
64.89.163.153 mysql_bruter 51% DROP 7 3 mysql:bruteforce 2026-04-28 00:01 evidence →
66.228.53.162 web_probe 46% 19 3 http:scan 2026-04-24 05:12 evidence →
165.154.225.20 scanner 45% DROP2x OSINT 30 2 ssh:bruteforce 2026-04-28 02:02 evidence →
34.62.134.78 ftp_probe 39% 2 2 ftp:bruteforcemysql:bruteforce 2026-04-28 01:47 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds