Check an IP Address, Domain Name, Subnet, or ASN
40.124.173.224 has a high threat confidence level of 69%, originating from San Antonio, United States, on the Microsoft Corporation network (8075). It has been observed across 79 sessions targeting HTTPS, SMTP, SSH, FTP, REDIS and 6 other protocols, First observed on January 21, 2026, most recently active March 12, 2026.
Redis session where the client presents the MGLNDD-prefixed identifier (for example MGLNDD_[ip]_6379) within the connection metadata, indicating activity from a specific automated Redis scanning framework. The behavior is triggered by the previously defined primitive detecting this exact tag pattern and groups sessions attributed to that tooling. The behavior reflects identifiable automated access rather than standard Redis client usage and does not assume additional commands beyond the observable identifier.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
FTP session where the client issues AUTH TLS to upgrade the connection to Transport Layer Security. This reflects protocol-level encryption negotiation prior to further interaction.