← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
13 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
13 IPs
Below average
Total Events
2582
Below average by volume
Started / Ended
2026-02-22 23:06 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
36.64.162.195 credential_harvester 80% 1x OSINT 1058 3 ssh:bruteforce 2026-04-29 19:57 evidence →
95.208.74.83 credential_harvester 72% 1x OSINT 886 3 ssh:bruteforce 2026-04-25 18:20 evidence →
92.118.39.195 opportunistic_bruter 66% DROP1x OSINT 35 3 ssh:bruteforce 2026-05-02 01:02 evidence →
45.33.12.214 scanner 56% 1x OSINT 16 3 ssh:bruteforce 2026-05-02 00:33 evidence →
4.155.240.33 reconnaissance 52% 1x OSINT 16 2 ssh:bruteforce 2026-05-01 22:36 evidence →
64.89.163.154 mysql_bruter 51% DROP 8 3 mysql:bruteforce 2026-05-02 02:28 evidence →
77.54.41.203 credential_harvester 48% 1x OSINT 446 1 ssh:bruteforce 2026-04-26 04:33 evidence →
119.148.49.82 scanner 43% 1x OSINT 50 2 ssh:bruteforce 2026-05-02 00:43 evidence →
77.53.238.44 credential_harvester 42% 2x OSINT 47 1 ssh:bruteforce 2026-04-29 17:57 evidence →
205.210.31.31 scanner 40% 8 2 ssh:bruteforce 2026-05-01 22:58 evidence →
196.188.56.190 scanner 29% 1x OSINT 2 1 ssh:bruteforce 2026-05-02 00:42 evidence →
194.87.216.198 scanner 24% 1x OSINT 7 1 ssh:bruteforce 2026-04-27 21:35 evidence →
45.9.168.192 scanner 20% DROP2x OSINT 4 1 ssh:bruteforce 2026-04-09 04:24 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds