Palo Alto Networks Portals

On October 3, 2025, cybersecurity firm GreyNoise reported a significant uptick in scanning activity targeting Palo Alto Networks login portals, marking a nearly 500% increase in unique IP addresses compared to previous observations. This surge, involving approximately 1,300 unique IP addresses, underscores a growing threat landscape where attackers are actively probing network defenses for vulnerabilities.

Key Observations
  • Volume and Scope: The scanning activity was highly targeted and structured, primarily aimed at Palo Alto Networks login portals. The majority of the IP addresses involved were geolocated to the U.S., with smaller clusters detected in the U.K., the Netherlands, Canada, and Russia.
  • Threat Classification: Of the 1,300 unique IP addresses, 93% were classified as suspicious, and 7% as malicious. This indicates a deliberate effort to identify and exploit potential weaknesses in network security infrastructures.
  • Regional Clustering and Tooling Overlap: The scanning activity exhibited regional clustering and shared characteristics with previous scanning events, such as those targeting Cisco ASA devices. Both campaigns demonstrated overlapping tooling and infrastructure, suggesting a coordinated effort by threat actors.
  • Historical Context: GreyNoise’s Early Warning Signals report from July 2025 highlighted that surges in scanning, brute-forcing, or exploit attempts are often followed by the disclosure of new Common Vulnerabilities and Exposures (CVEs) affecting the same technology within six weeks. This pattern was observed in previous incidents, such as those involving Cisco ASA devices.
Implications for Industries

The recent surge in scanning activity serves as a critical reminder for organizations across various sectors to reassess their cybersecurity posture. Industries such as financial services, healthcare, retail, manufacturing, and government are particularly vulnerable due to the sensitive nature of the data they handle and their reliance on networked systems.

Proactive measures, including regular security assessments, timely patching of vulnerabilities, and robust monitoring of network traffic, are essential to mitigate the risks associated with such scanning activities.

Conclusion

The nearly 500% increase in scanning activity targeting Palo Alto Networks login portals highlights a pressing need for heightened cybersecurity vigilance. Organizations must remain proactive in identifying and addressing potential vulnerabilities to safeguard their networks against evolving threats.

About COE Security

COE Security partners with organizations in financial services, healthcare, retail, manufacturing, and government to secure AI-powered systems and ensure compliance. Our offerings include:

  • AI-enhanced threat detection and real-time monitoring
  • Data governance aligned with GDPR, HIPAA, and PCI DSS
  • Secure model validation to guard against adversarial attacks
  • Customized training to embed AI security best practices
  • Penetration Testing (Mobile, Web, AI, Product, IoT, Network & Cloud)
  • Secure Software Development Consulting (SSDLC)
  • Customized CyberSecurity Services

Follow COE Security on LinkedIn for ongoing insights into safe, compliant AI adoption.

Click to read our LinkedIn feature article