Event JSON
{
"id": "83e6ea6fbc5f8e458c0c07eb8cc292ae5d2841f479051c04048724fdb153c795",
"pubkey": "feda847eda3921acfa84c18c36287c49a152df7419aea8d7d14d0634679866ca",
"created_at": 1756148406,
"kind": 1,
"tags": [
[
"t",
"remotedesktop"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/090/941/432/782/395/original/a498b25dbf6f7c24.png",
"m image/png"
],
[
"t",
"analysis"
],
[
"t",
"greynoise"
],
[
"t",
"rdp"
],
[
"t",
"cybersecurity"
],
[
"t",
"threatintel"
],
[
"proxy",
"https://infosec.exchange/@greynoise/115090941957332295",
"web"
],
[
"proxy",
"https://infosec.exchange/users/greynoise/statuses/115090941957332295",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/greynoise/statuses/115090941957332295",
"pink.momostr"
],
[
"-"
]
],
"content": "On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog: https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop\n\n#ThreatIntel #RDP #Cybersecurity #GreyNoise #Analysis #RemoteDesktop\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/115/090/941/432/782/395/original/a498b25dbf6f7c24.png\n",
"sig": "ff06eb70b92f7d785790d1aeee6c673ffc5551058e57ff5cf9cbf357b74fe7db0de9134fd959c2bb0fde60d3649ffba685989c51b1952f00f1c79f570d281316"
}