Executive Summary

Threat Level:

MODERATE

This report summarizes the cyber threat landscape observed by our honeypot network for the reporting period ending Wed, 11 Mar 2026 04:30:02 GMT. The network observed a high volume of scanning and attempted exploitation across multiple services, with a continued emphasis on brute-force attacks and vulnerability exploitation. DigitalOcean ASNs remain a primary source of malicious activity.

Primary Threat Vectors

Vector 1: Widespread VNC Service Scanning

Automated, high-frequency scanning targeted at TCP port 5900, indicative of attackers searching for vulnerable VNC servers. Activity from this vector is consistent with previous weeks.

  • Top Attacker: 129.212.181.84 (US)
  • Total Events: 1,559,140 (GPL INFO VNC server response)
  • Notable Signature: GPL INFO VNC server response

Vector 2: SSH Brute-Force Attacks

Persistent attempts to brute-force SSH credentials, primarily targeting common usernames and passwords. DigitalOcean ASNs are a major source.

  • Top Attacker: 152.42.255.97 (SG)
  • Top Credential: 345gs5662d34 / 345gs5662d34 (1330 attempts)
  • Top Source Country: KR

Vector 3: Vulnerability Exploitation Attempts

Exploitation attempts against known vulnerabilities, including CVE-2018-13379 (Fortinet), and CVE-2024-14007. These attacks are spread across multiple IPs.

  • Top Attacker for CVE-2018-13379: 194.50.16.198 (NL)
  • Notable CVE: CVE-2018-13379 (3465 attempts)
  • Notable CVE: CVE-2024-14007 (2036 attempts)

Attribution & Pattern Analysis

Deduction:

The observed activity indicates a blended threat landscape, with automated scanning tools used for service discovery and exploitation attempts, in combination with credential brute-force attacks. The persistence of these attacks suggests automated processes.

Cluster 1: DigitalOcean Infrastructure

A significant portion of the malicious activity originates from the AS14061 DIGITALOCEAN-ASN. This includes a high volume of SSH brute-force attempts and VNC scanning. The concentration of activity from this ASN suggests it is being used to conduct large-scale attacks.

  • Top Attacker: 152.42.255.97 (SG) - 1,964,463 events
  • Top ASN: AS14061 DIGITALOCEAN-ASN (6,825,411 events)

Cluster 2: Vulnerability Scanners

Several IPs show a pattern consistent with vulnerability scanners, actively probing for known CVEs. The source countries involved are widely distributed, making mitigation more complex.

  • Top CVE: CVE-2018-13379 (3465 attempts) - 194.50.16.198 (NL)

Actionable Countermeasures

Action 1: Block High-Volume IPs

Justification: Immediate mitigation of active threats by blocking IPs exhibiting a high volume of malicious activity.

  • Block 152.42.255.97, 134.199.206.124, 159.203.173.211, 134.199.201.207

Action 2: Strengthen SSH Configuration

Justification: Prevent brute-force attacks from succeeding. Implement multi-factor authentication and consider disabling password-based authentication.

  • Disable password authentication for SSH.
  • Enforce strong password policies.

Action 3: Patch Vulnerable Systems

Justification: Prevent successful exploitation of known vulnerabilities. Prioritize patching systems exposed to the internet.

  • Ensure all systems are patched against CVE-2018-13379, CVE-2024-14007, and other identified CVEs.

Action 4: Monitor Network Traffic

Justification: Enhance detection of malicious activity. Continuously review network logs for suspicious behavior and anomalous traffic patterns.

  • Monitor for unusual activity on ports 5900, 22, and other potentially vulnerable services.
  • Review all alerts from Suricata and P0f.