← Back to feed
Subnet 14.103.127.0/24
SUBNET Active highWhy this campaign was detected
6 IPs from the same /24 subnet (14.103.127.0/24) were observed attacking our sensors within the same time window. All belong to China Telecom Group (AS4811). Concentrated activity from adjacent IPs is a strong indicator of a single operator or coordinated botnet.
Primary ASN
AS4811 · China Telecom Group
Subnet
14.103.127.0/24
Country
🇨🇳 CN
Cloud Provider
—
Member Count
6 IPs
Below average
Total Events
543
Below average by volume
Started / Ended
2026-02-18 13:33 — ongoing
Attack Types
MITRE ATT&CK Techniques
Initial Access
Command and Control
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 14.103.127.233 | credential_harvester | 61% | 1x OSINT | 193 | 2 | ssh:bruteforce | — | 2026-05-14 00:14 | evidence → |
| 14.103.127.7 | scanner | 49% | 88 | 2 | ssh:bruteforce | — | 2026-05-10 23:00 | evidence → | |
| 14.103.127.199 | credential_harvester | 40% | 150 | 2 | ssh:bruteforce | — | 2026-05-11 01:29 | evidence → | |
| 14.103.127.32 | scanner | 39% | 60 | 2 | ssh:bruteforce | — | 2026-05-11 05:43 | evidence → | |
| 14.103.127.2 | scanner | 35% | 1x OSINT | 32 | 1 | ssh:bruteforce | — | 2026-05-12 02:40 | evidence → |
| 14.103.127.204 | scanner | 29% | 20 | 2 | ssh:bruteforce | — | 2026-05-12 00:57 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds