← Back to feed

Subnet 14.103.127.0/24

SUBNET Active high
Why this campaign was detected
6 IPs from the same /24 subnet (14.103.127.0/24) were observed attacking our sensors within the same time window. All belong to China Telecom Group (AS4811). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS4811 · China Telecom Group
Subnet
14.103.127.0/24
Country
🇨🇳 CN
Cloud Provider
Member Count
6 IPs
Below average
Total Events
543
Below average by volume
Started / Ended
2026-02-18 13:33 — ongoing
Attack Types
ssh:bruteforce
MITRE ATT&CK Techniques
Reconnaissance
Initial Access
Credential Access
Discovery
Command and Control
Member Actors
IP Address Behavior Confidence Flags Events Agents Attack Types Hostname Last Seen
14.103.127.233 credential_harvester 61% 1x OSINT 193 2 ssh:bruteforce 2026-05-14 00:14 evidence →
14.103.127.7 scanner 49% 88 2 ssh:bruteforce 2026-05-10 23:00 evidence →
14.103.127.199 credential_harvester 40% 150 2 ssh:bruteforce 2026-05-11 01:29 evidence →
14.103.127.32 scanner 39% 60 2 ssh:bruteforce 2026-05-11 05:43 evidence →
14.103.127.2 scanner 35% 1x OSINT 32 1 ssh:bruteforce 2026-05-12 02:40 evidence →
14.103.127.204 scanner 29% 20 2 ssh:bruteforce 2026-05-12 00:57 evidence →
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds