Check an IP Address, Domain Name, Subnet, or ASN
71.6.199.65 has a threat confidence score of 100%. This IP address from United States (AS10439, CariNet, Inc.) has been observed in 1,611 honeypot sessions and reported 11 times targeting POSTGRES, REDIS, MONGODB, SMB, HTTP and 9 other protocols. First observed on January 20, 2026, most recently active April 13, 2026.
Remote client performs MongoDB service validation and environment fingerprinting by first initiating a wire-protocol handshake (ismaster / hello) followed by execution of the buildInfo command against the admin database. This sequence indicates targeted reconnaissance to determine server role, software version, build characteristics, and platform details. Such activity is commonly associated with automated scanning frameworks and pre-exploitation tooling used to assess exposure and identify version-specific vulnerabilities prior to authentication attempts or database enumeration
Identifies an automated Redis service probing sequence consisting of PING, INFO (uppercase invocation), execution of a deliberately nonexistent command to assess error handling behavior, and QUIT. This tightly grouped pattern reflects reconnaissance and fingerprinting activity used by scanners and exploitation frameworks to determine Redis version, configuration details, and command availability prior to follow-on exploitation attempts. The inclusion of a nonexistent command indicates capability probing rather than normal client interaction.
Identifies Redis service discovery and basic environment enumeration where an actor probes with invalid commands, validates availability using PING, retrieves server metadata via INFO (case variations), and gracefully exits with QUIT. This pattern is commonly used to fingerprint exposed Redis instances before exploitation.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
HTTP request using GET method.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 19, 2026, 02:39 | Brute Force | SMB | SikkerGuard: 2 blocked packets |
| User | Mar 18, 2026, 14:32 | Brute Force | SMB | SikkerGuard: 2 blocked packets |
| User | Mar 18, 2026, 05:11 | Brute Force | MONGODB | SikkerGuard: 2 blocked packets |
| User | Mar 18, 2026, 03:05 | Brute Force | MYSQL | SikkerGuard: 2 blocked packets |
| User | Mar 17, 2026, 10:34 | Brute Force | SSH | SikkerGuard: 2 blocked packets |