HAFNIUM Exchange Victim Special Report

This Special Report contains information on potential victims of HAFNIUM Microsoft Exchange Server breaches. You can read more on the background of HAFNIUM and this report in a blog post here.

Shadowserver Special Reports are unlike all of our other standard free daily network reports. They do not cover a specific time period.

Instead, we send out Special Reports in situations where we are able to share one-time, high value datasets that we feel should be reported responsibly for maximum public benefit. Sometimes there are incidents when it would be useful to be able to notify potential victims about events or breaches that may have impacted them outside of the previous 24 hour period – for example during high profile events such as the Solarwinds Orion/SUNBURST supply chain or HAFNIUM/Microsoft Exchange Server mass breaches, when it may take a number of days for incident responders to conduct forensic investigations and analyzed data becomes available for sharing with potential victims. Although the events included in these Special Reports will fall outside of our usual 24 hour daily reporting window, we believe that there would still be significant benefit to our constituents in them receiving and hopefully acting on the retrospective data.

If you have missed a Special Report because you were NOT yet a subscriber at the time a report was pushed out, simply subscribe for your network now and specifically request all recent Shadowserver Special Reports – and we will regenerate them specifically for your network, at no cost.

Note that the data shared across special reports may differ on a case by case basis hence the report formats for different Special Reports may be different.


  • timestamp
    Timestamp when the IP was seen in UTC+0
  • ip
    IP of the affected device
  • asn
    As of the affected device
  • region
    Region of the affected device
  • city
    City of the affected device
  • hostname
    Hostname of the affected device (may be from revDNS)
  • naics
    North American Industry Classification System Code
  • sector
    Sector of the IP in question
  • tag
    Additional tags for more insight
  • public_source
    Source of the data
  • status
    Status of the affected IP, for example, compromised or likely compromised
  • detail
    Additional details on the event
  • account
    Affected account, if any


"2021-02-26 00:00:00","64.186.x.x",220,"US","ALASKA","KAKE","186-64.example.net",517919,,"hafnium;exchange",,"likely compromised",,
"2021-02-26 00:00:00","204.124.x.x",4620,"US","NEVADA","LAS VEGAS",,541519,,"hafnium;exchange",,"likely compromised",,
"2021-02-26 00:00:00","50.224.x.x",922,"US","WASHINGTON","PUYALLUP","example.com",517311,"Communications, Service Provider, and Hosting Service","hafnium;exchange",,"compromised","https://50.224.x.x/aspnet_client/system_web/7****.aspx","administrator@example.com"
"2021-02-26 00:00:00","96.10.x.x",1146,"US","NORTH CAROLINA","WILSON","example.org",517311,"Communications, Service Provider, and Hosting Service","hafnium;exchange",,"likely compromised",,
"2021-02-26 00:00:00","47.44.x.x",2115,"US","TEXAS","GLEN ROSE","047-044.example.com",517311,"Communications, Service Provider, and Hosting Service","hafnium;exchange",,"likely compromised",,

Our 128 Report Types