Check an IP Address, Domain Name, Subnet, or ASN
185.226.197.70 has a threat confidence score of 85%. This IP address from Portugal (AS21859, Zenlayer Inc) has been observed in 81 honeypot sessions and reported 1 times targeting HTTPS, HTTP, REDIS, ELASTICSEARCH, POSTGRES and 2 other protocols. First observed on January 25, 2026, most recently active March 19, 2026.
The client authenticated to a Redis service and executed the INFO command (info / redis_info_lowercase) without attempting configuration changes, data access, or command execution. The INFO command retrieves server metadata including version, role (master/replica), connected clients, memory usage, persistence settings, and replication status. This behavior is consistent with automated reconnaissance activity where a bot validates exposure, fingerprints the Redis instance, and determines whether it is a viable target for follow-up exploitation (e.g., replication abuse, module loading, or persistence manipulation). No destructive or modification activity was observed in this session.
Client performs a direct request to the Elasticsearch /_cat/indices endpoint and retrieves a successful response without preceding generic web discovery or multi-protocol probing. This behavior indicates targeted Elasticsearch reconnaissance focused on enumerating available indices, document counts, and storage size to assess data exposure. Unlike broad internet scanners, the interaction is Elasticsearch-aware from the start, suggesting tooling or operators specifically searching for open clusters rather than conducting general service fingerprinting.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 5, 2026, 13:11 | Brute Force | POSTGRES | SikkerGuard: 2 blocked packets |