Check an IP Address, Domain Name, Subnet, or ASN
134.209.67.210 has a threat confidence score of 91%. This IP address from United States (AS14061, DigitalOcean, LLC) has been observed in 104 honeypot sessions targeting REDIS, POSTGRES, ELASTICSEARCH, MSSQL, MONGODB protocols. First observed on March 21, 2026, most recently active March 22, 2026.
Remote client performs structured MongoDB reconnaissance by initiating a wire-protocol handshake (ismaster / hello), executing the buildInfo command to obtain server version and build characteristics, and subsequently issuing listDatabases to enumerate all databases present on the instance. This sequence reflects systematic service validation and environment mapping activity commonly associated with automated internet-wide scanning, vulnerability assessment tooling, or pre-exploitation reconnaissance workflows.
Client first performs a generic request to the Elasticsearch root endpoint to verify service availability, then proceeds to request /_cat/indices. This sequence reflects staged Elasticsearch reconnaissance where the actor validates that the cluster is reachable before attempting index enumeration and data exposure assessment. Compared to direct index enumeration behaviors, the interaction begins with a service-validation step, suggesting adaptive probing rather than immediate Elasticsearch-specific targeting.