Check an IP Address, Domain Name, Subnet, or ASN
134.209.78.215 has a very high threat confidence level of 84%, originating from North Bergen, United States, on the DigitalOcean, LLC network (14061). It has been observed across 53 sessions targeting REDIS, POSTGRES, ELASTICSEARCH, MONGODB, First observed on March 10, 2026, most recently active March 10, 2026.
Identifies an automated Redis service probing sequence consisting of PING, INFO (uppercase invocation), execution of a deliberately nonexistent command to assess error handling behavior, and QUIT. This tightly grouped pattern reflects reconnaissance and fingerprinting activity used by scanners and exploitation frameworks to determine Redis version, configuration details, and command availability prior to follow-on exploitation attempts. The inclusion of a nonexistent command indicates capability probing rather than normal client interaction.
Client first performs a generic request to the Elasticsearch root endpoint to verify service availability, then proceeds to request /_cat/indices. This sequence reflects staged Elasticsearch reconnaissance where the actor validates that the cluster is reachable before attempting index enumeration and data exposure assessment. Compared to direct index enumeration behaviors, the interaction begins with a service-validation step, suggesting adaptive probing rather than immediate Elasticsearch-specific targeting.