← Back to feed
AS4811 China Telecom Group
ASN Active mediumWhy this campaign was detected
23 IPs from the same network (China Telecom Group, AS4811) were active during overlapping time periods. Temporal correlation across a shared autonomous system suggests infrastructure controlled by the same entity.
Primary ASN
AS4811 · China Telecom Group
Subnet
—
Country
🇨🇳 CN
Cloud Provider
—
Member Count
23 IPs
Below average
Total Events
1824
Below average by volume
Started / Ended
2026-02-16 20:33 — ongoing
Attack Types
MITRE ATT&CK Techniques
Initial Access
Command and Control
Member Actors
| IP Address | Behavior | Confidence | Flags | Events | Agents | Attack Types | Hostname | Last Seen | |
|---|---|---|---|---|---|---|---|---|---|
| 14.103.109.71 | scanner | 64% | 1x OSINT | 70 | 2 | ssh:bruteforce | — | 2026-05-11 11:55 | evidence → |
| 14.103.41.249 | scanner | 60% | 1x OSINT | 205 | 2 | ssh:bruteforce | — | 2026-05-08 08:44 | evidence → |
| 14.103.90.30 | scanner | 59% | 1x OSINT | 45 | 2 | ssh:bruteforce | — | 2026-05-09 12:36 | evidence → |
| 14.103.21.179 | scanner | 59% | 1x OSINT | 389 | 2 | ssh:bruteforce | — | 2026-05-07 06:55 | evidence → |
| 14.103.104.36 | credential_harvester | 57% | 1x OSINT | 181 | 2 | ssh:bruteforce | — | 2026-05-07 03:42 | evidence → |
| 14.103.63.16 | scanner | 55% | 1x OSINT | 155 | 2 | ssh:bruteforce | — | 2026-05-05 23:14 | evidence → |
| 14.103.73.80 | credential_harvester | 55% | 1x OSINT | 223 | 2 | ssh:bruteforce | — | 2026-05-05 12:17 | evidence → |
| 14.103.249.172 | scanner | 52% | 1x OSINT | 62 | 2 | ssh:bruteforce | — | 2026-05-05 05:31 | evidence → |
| 14.103.114.227 | scanner | 51% | 104 | 2 | ssh:bruteforce | — | 2026-05-07 01:03 | evidence → | |
| 218.78.60.105 | scanner | 51% | 1x OSINT | 51 | 2 | ssh:bruteforce | — | 2026-05-11 16:48 | evidence → |
| 14.103.75.9 | scanner | 51% | 20 | 2 | ssh:bruteforce | — | 2026-05-08 07:19 | evidence → | |
| 14.103.228.234 | scanner | 51% | 37 | 2 | ssh:bruteforce | — | 2026-05-07 15:07 | evidence → | |
| 14.103.145.231 | scanner | 49% | 1x OSINT | 65 | 3 | ssh:bruteforce | — | 2026-05-06 11:28 | evidence → |
| 14.103.103.211 | scanner | 48% | 27 | 1 | ssh:bruteforce | — | 2026-05-11 10:16 | evidence → | |
| 210.16.189.78 | scanner | 46% | 1x OSINT | 24 | 2 | ssh:bruteforce | — | 2026-05-08 11:03 | evidence → |
| 180.184.141.117 | scanner | 39% | 1x OSINT | 11 | 2 | ssh:bruteforce | — | 2026-05-11 04:18 | evidence → |
| 14.103.91.55 | scanner | 36% | 1x OSINT | 50 | 2 | ssh:bruteforce | — | 2026-05-07 11:06 | evidence → |
| 14.103.114.2 | scanner | 34% | 6 | 2 | ssh:bruteforce | — | 2026-05-11 10:26 | evidence → | |
| 121.46.231.41 | scanner | 32% | 1x OSINT | 7 | 2 | ssh:bruteforce | — | 2026-05-07 17:51 | evidence → |
| 14.103.116.192 | scanner | 27% | 18 | 2 | ssh:bruteforce | — | 2026-05-06 02:32 | evidence → | |
| 14.103.126.104 | scanner | 27% | 55 | 1 | ssh:bruteforce | — | 2026-05-09 19:16 | evidence → | |
| 118.196.64.77 | scanner | 22% | 1x OSINT | 4 | 1 | ssh:bruteforce | — | 2026-05-07 22:27 | evidence → |
| 14.103.100.131 | credential_probe | 15% | 15 | 1 | ssh:bruteforce | — | 2026-05-06 06:12 | evidence → |
VPN Known VPN or proxy provider
DROP ASN on Spamhaus DROP list
Nx OSINT Corroborated by N external threat feeds