Check an IP Address, Domain Name, Subnet, or ASN
20.106.48.199 has a threat confidence score of 74%. This IP address from United States (AS8075, Microsoft Corporation) has been observed in 79 honeypot sessions and reported 1 times targeting HTTPS, TELNET, MONGODB, SSH, HTTP and 9 other protocols. First observed on January 21, 2026, most recently active March 22, 2026.
The client authenticated to a Redis service and executed the INFO command (info / redis_info_lowercase) without attempting configuration changes, data access, or command execution. The INFO command retrieves server metadata including version, role (master/replica), connected clients, memory usage, persistence settings, and replication status. This behavior is consistent with automated reconnaissance activity where a bot validates exposure, fingerprints the Redis instance, and determines whether it is a viable target for follow-up exploitation (e.g., replication abuse, module loading, or persistence manipulation). No destructive or modification activity was observed in this session.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 22, 2026, 24:22 | Brute Force | DOCKER | SikkerGuard: 2 blocked packets |