← Back to feed

Subnet 38.255.75.0/24

SUBNET Active high
Why this campaign was detected
13 IPs from the same /24 subnet (38.255.75.0/24) were observed attacking our sensors within the same time window. All belong to MAXI CABLE C.A (AS272857). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS272857 · MAXI CABLE C.A
Subnet
38.255.75.0/24
Country
🇻🇪 VE
Cloud Provider
Member Count
13 IPs
Below average
Total Events
240
Below average by volume
Started / Ended
2026-04-30 06:35 — ongoing
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
38.255.75.68 malware_dropper 53% 1x OSINT 13 1 ssh:bruteforce 2026-04-30 07:07 evidence →
38.255.75.110 credential_harvester 52% 146 1 ssh:bruteforce 2026-04-30 07:20 evidence →
38.255.75.247 malware_dropper 48% 18 1 ssh:bruteforce 2026-04-30 07:18 evidence →
38.255.75.251 malware_dropper 48% 13 1 ssh:bruteforce 2026-04-30 06:55 evidence →
38.255.75.170 opportunistic_bruter 34% 5 1 ssh:bruteforce 2026-04-30 07:07 evidence →
38.255.75.195 credential_probe 29% 1x OSINT 5 1 ssh:bruteforce 2026-04-30 07:13 evidence →
38.255.75.95 credential_probe 29% 1x OSINT 5 1 ssh:bruteforce 2026-04-30 07:08 evidence →
38.255.75.222 credential_probe 29% 1x OSINT 5 1 ssh:bruteforce 2026-04-30 07:05 evidence →
38.255.75.50 credential_probe 29% 1x OSINT 5 1 ssh:bruteforce 2026-04-30 07:00 evidence →
38.255.75.24 credential_probe 25% 10 1 ssh:bruteforce 2026-04-30 07:15 evidence →
38.255.75.122 credential_probe 24% 5 1 ssh:bruteforce 2026-04-30 07:19 evidence →
38.255.75.43 credential_probe 24% 5 1 ssh:bruteforce 2026-04-30 06:54 evidence →
38.255.75.16 credential_probe 24% 5 1 ssh:bruteforce 2026-04-30 06:57 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds