Executive Summary

Threat Level:

MODERATE

This report summarizes the cyber threat landscape observed across our honeypot network during the reporting period ending Sun, 25 Jan 2026 04:30:02 GMT. The analysis reveals a continued focus on automated scanning, with significant activity targeting several services. The top attacking ASNs are dominated by cloud providers.

Primary Threat Vectors

Vector 1: Widespread VNC Scanning

High volumes of scanning activity were observed targeting VNC services on various ports. This activity likely aims to identify and exploit systems running vulnerable versions of VNC. The most prevalent signature seen was "GPL INFO VNC server response".

  • Top Attacker: 134.199.197.11 (US, ASN: 14061 DIGITALOCEAN-ASN)
  • Total Events: 644556

Vector 2: SSH Brute-Force Attempts

Numerous SSH brute-force attempts continue, focusing on common username/password combinations. These attacks leverage compromised infrastructure and credential stuffing techniques to gain access to systems. "Cowrie" honeypots are key in gathering this data.

  • Top Attacker: 134.199.202.110 (US, ASN: 14061 DIGITALOCEAN-ASN)
  • Total Events: 813551

Vector 3: HTTPS Traffic & Associated Anomalies

The network saw significant HTTPS traffic with the majority of the overall events. While benign, this includes a large amount of scanning activity. Alerts such as "ET INFO User-Agent (python-requests) Inbound to Webserver" could be an indication of probing.

  • Top Attacker: 134.199.195.17 (US, ASN: 14061 DIGITALOCEAN-ASN)
  • Total Events: 756828

Attribution & Pattern Analysis

Deduction:

The observed activity is indicative of a diverse set of threat actors. The concentration of attacks originating from cloud providers, particularly DigitalOcean, suggests the use of compromised virtual machines or dedicated attack infrastructure. The presence of both brute-force attempts and VNC scanning suggests opportunistic targeting.

Cluster 1: DigitalOcean Based Attacks

A significant portion of attacks originated from IP addresses associated with DigitalOcean (ASN 14061). This cluster exhibited high volumes of SSH and VNC related activity. Further investigation of these IPs is warranted to determine if they are compromised or used for malicious activity directly.

  • Top ASN: AS14061 DIGITALOCEAN-ASN (6789930 events)
  • Top Country: US (7168158 events)

Actionable Countermeasures

Action 1: Block High-Volume IPs

Justification: Implement immediate blocking of the top attacking IPs, especially those originating from known malicious ASNs and countries to mitigate current threats.

Action 2: Enhance SSH Hardening

Justification: Review SSH configuration across the infrastructure to disable password authentication, enforce multi-factor authentication, and implement intrusion detection/prevention systems.

Action 3: Monitor VNC Traffic

Justification: Implement alerts for VNC traffic and log VNC activity. Analyze connection attempts and server responses for unusual behavior. Ensure VNC is not exposed to the public internet.

Action 4: Threat Intelligence Feed Integration

Justification: Integrate the provided IP and CVE information into the existing threat intelligence platform for enhanced detection and proactive defense.