Check an IP Address, Domain Name, Subnet, or ASN
8.142.178.14 has a very high threat confidence level of 96%, originating from Beijing, China, on the Hangzhou Alibaba Advertising Co.,Ltd. network (37963). It has been observed across 29 sessions targeting REDIS, SSH, with detected attack patterns including redis config cron persistence via save, ssh authorized keys persistence established, First observed on January 21, 2026, most recently active March 5, 2026.
Identifies Redis configuration abuse where an attacker modifies dir and dbfilename to write a malicious cron job to system cron directories, disables write protections, saves the database to disk, and achieves persistence via scheduled command execution (often using wget/curl pipe-to-sh patterns).
Removal of filesystem attribute protections from the user’s .ssh directory followed by deletion and recreation of the directory and insertion of a new public key into authorized_keys. This pattern reflects deliberate modification of SSH trust configuration to establish persistent key-based access.
Identifies execution of the Redis INFO command (case-insensitive), which retrieves server configuration, version, memory usage, and runtime statistics. This behavior reflects service interrogation and environment fingerprinting activity. While INFO can be used legitimately by administrators, it is also commonly observed during automated scanning and pre-exploitation reconnaissance of exposed Redis instances.