Check an IP Address, Domain Name, Subnet, or ASN
130.131.162.184 has a threat confidence score of 80%. This IP address from United States (AS8075, Microsoft Corporation) has been observed in 117 honeypot sessions and reported 2 times targeting HTTPS, HTTP, MONGODB, SMTP, DOCKER and 9 other protocols. First observed on January 23, 2026, most recently active April 15, 2026.
HTTPS request to /developmentserver/metadatauploader.
The client authenticated to a Redis service and executed the INFO command (info / redis_info_lowercase) without attempting configuration changes, data access, or command execution. The INFO command retrieves server metadata including version, role (master/replica), connected clients, memory usage, persistence settings, and replication status. This behavior is consistent with automated reconnaissance activity where a bot validates exposure, fingerprints the Redis instance, and determines whether it is a viable target for follow-up exploitation (e.g., replication abuse, module loading, or persistence manipulation). No destructive or modification activity was observed in this session.
Identifies HTTP GET requests directly targeting the /bad-request path, indicating automated or manual probing of application error-handling routes rather than legitimate navigation flow.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 21, 2026, 15:02 | Brute Force | MSSQL | SikkerGuard: 2 blocked packets |
| User | Mar 14, 2026, 15:58 | Brute Force | SMTP | SikkerGuard: 2 blocked packets |