Check an IP Address, Domain Name, Subnet, or ASN
220.181.1.163 has a threat confidence score of 100%. This IP address from China (AS23724, IDC, China Telecommunications Corporation) has been observed in 874 honeypot sessions targeting DOCKER, REDIS protocols. Detected attack patterns include docker remote api container takeover. First observed on January 21, 2026, most recently active April 14, 2026.
End-to-end exploitation behavior targeting an exposed Docker Remote API. The actor validates service availability, fingerprints the Docker daemon, creates an attacker-controlled container, attaches to its execution stream, monitors container lifecycle events, and initiates execution. This sequence indicates full remote control over container creation and execution on the host and is commonly used to deploy payloads, establish persistence, or perform host-level abuse via privileged containers or mounted filesystems.
Identifies execution of the Redis INFO command (case-insensitive), which retrieves server configuration, version, memory usage, and runtime statistics. This behavior reflects service interrogation and environment fingerprinting activity. While INFO can be used legitimately by administrators, it is also commonly observed during automated scanning and pre-exploitation reconnaissance of exposed Redis instances.