← Back to feed

Multi-Agent Scan

SCAN Active medium
Why this campaign was detected
6 IPs independently targeted the same honeypot sensors within a 24-hour window. Scanning the same targets in close succession indicates shared reconnaissance tooling or a coordinated scan list.
Primary ASN
Subnet
Country
Cloud Provider
Member Count
6 IPs
Below average
Total Events
633
Below average by volume
Started / Ended
2026-03-07 16:32 — ongoing
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
87.106.44.172 credential_harvester 78% 452 3 ssh:bruteforce ip87-106-44-172.pbiaas.com 2026-05-03 13:49 evidence →
95.215.0.144 scanner 75% 3x OSINT 102 3 ftp:bruteforcessh:bruteforce scan.f6.security 2026-05-03 12:56 evidence →
45.91.64.7 scanner 70% 2x OSINT 28 3 ftp:bruteforcessh:bruteforce scan.f6.security 2026-05-03 12:53 evidence →
64.89.163.154 mysql_bruter 41% DROP1x OSINT 8 2 mysql:bruteforce 2026-05-03 14:05 evidence →
64.89.163.149 mysql_bruter 39% DROP 40 2 mysql:bruteforce 2026-05-03 11:24 evidence →
43.135.142.7 web_probe 36% 4 2 http:scan 2026-05-03 13:37 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds