← Back to feed
Subnet 176.65.131.0/24
SUBNET Active highWhy this campaign was detected
5 IPs from the same /24 subnet (176.65.131.0/24) were observed attacking our sensors within the same time window. All belong to PIO-Hosting GmbH (AS198584). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS198584 · PIO-Hosting GmbH
Subnet
176.65.131.0/24
Country
🇩🇪 DE
Cloud Provider
—
Member Count
5 IPs
Below average
Total Events
54
Below average by volume
Started / Ended
2026-05-05 03:14 — ongoing
Attack Types
MITRE ATT&CK Techniques
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 176.65.131.185 | credential_harvester | 38% | 1x OSINT | 14 | 1 | ssh:bruteforce | — | 2026-05-09 01:16 | evidence → |
| 176.65.131.215 | credential_harvester | 30% | 1x OSINT | 14 | 1 | ssh:bruteforce | — | 2026-05-05 03:14 | evidence → |
| 176.65.131.189 | credential_probe | 30% | 1x OSINT | 14 | 1 | ssh:bruteforce | — | 2026-05-09 02:14 | evidence → |
| 176.65.131.188 | credential_probe | 28% | 1x OSINT | 6 | 1 | ssh:bruteforce | — | 2026-05-08 10:45 | evidence → |
| 176.65.131.192 | credential_probe | 28% | 1x OSINT | 6 | 1 | ssh:bruteforce | — | 2026-05-08 03:45 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds