← Back to feed

Subnet 45.194.70.0/24

SUBNET Active high
Why this campaign was detected
3 IPs from the same /24 subnet (45.194.70.0/24) were observed attacking our sensors within the same time window. All belong to UCLOUD INFORMATION TECHNOLOGY HK LIMITED (AS135377). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS135377 · UCLOUD INFORMATION TECHNOLOGY HK LIMITED
Subnet
45.194.70.0/24
Country
πŸ‡ΈπŸ‡¨ SC
Cloud Provider
Member Count
3 IPs
Below average
Total Events
12
Below average by volume
Started / Ended
2026-05-04 05:10 — ongoing
Attack Types
ftp:bruteforce http:scan
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
45.194.70.248 web_probe 36% 2x OSINT 6 1 http:scan β€” 2026-05-04 22:01 evidence →
45.194.70.249 web_probe 35% 2x OSINT 5 1 http:scan β€” 2026-05-04 05:10 evidence →
45.194.70.252 ftp_probe 27% 1x OSINT 1 1 ftp:bruteforce β€” 2026-05-04 19:51 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds