Loading threats
Uses the Redis CONFIG SET dir /var/spool/cron/crontabs command to redirect Redis persistence output to the per-user cron directory, a common step in Redis exploitation chains that enables attackers to write malicious crontab entries and establish persistent command execution.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 183.56.243.176 | 94% | 5,797 | 712 | 🇨🇳 CN | AS135089 | 2026-04-09 |
| 101.206.108.14 | 100% | 2,995 | 1,187 | 🇨🇳 CN | AS4837 | 2026-04-09 |
| 220.181.1.163 | 100% | 2,803 | 831 | 🇨🇳 CN | AS23724 | 2026-04-09 |
| 221.130.29.85 | 91% | 2,186 | 1,095 | 🇨🇳 CN | AS56046 | 2026-04-08 |
| 9.169.195.91 | 79% | 2,076 | 213 | 🇺🇸 US | AS8075 | 2026-02-18 |
| 14.116.219.149 | 91% | 1,715 | 692 | 🇨🇳 CN | AS58466 | 2026-04-09 |
| 97.74.92.144 | 100% | 1,664 | 726 | 🇺🇸 US | AS26496 | 2026-04-08 |
| 113.214.18.234 | 100% | 1,590 | 1,051 | 🇨🇳 CN | AS24139 | 2026-04-09 |
| 157.230.101.158 | 100% | 1,435 | 677 | 🇩🇪 DE | AS14061 | 2026-04-09 |
| 182.40.103.253 | 100% | 1,313 | 360 | 🇨🇳 CN | AS136195 | 2026-04-08 |
| 74.50.81.220 | 100% | 1,285 | 214 | 🇺🇸 US | AS19318 | 2026-03-31 |
| 138.68.169.168 | 100% | 1,047 | 214 | 🇬🇧 GB | AS14061 | 2026-03-09 |
| 39.105.202.192 | 86% | 1,017 | 472 | 🇨🇳 CN | AS37963 | 2026-04-09 |
| 139.198.30.179 | 84% | 972 | 232 | 🇨🇳 CN | AS59078 | 2026-04-08 |
| 117.72.186.146 | 78% | 908 | 219 | 🇨🇳 CN | AS141679 | 2026-04-09 |
| 84.247.137.164 | 100% | 881 | 107 | 🇫🇷 FR | AS51167 | 2026-02-23 |
| 143.198.113.180 | 83% | 879 | 79 | 🇺🇸 US | AS14061 | 2026-02-21 |
| 8.142.178.141 | 94% | 870 | 510 | 🇨🇳 CN | AS37963 | 2026-04-09 |
| 218.78.131.154 | 100% | 830 | 439 | 🇨🇳 CN | AS4812 | 2026-04-09 |
| 14.103.220.97 | 100% | 821 | 261 | 🇨🇳 CN | AS4811 | 2026-04-09 |