Loading threats
Uses the Redis SET command to store a value that resembles a cron-style scheduled task combined with a remote shell script download and execution, a pattern commonly associated with attempts to establish persistence or deploy malware after abusing Redis file-write or configuration weaknesses.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 182.40.103.253 | 100% | 1,315 | 362 | 🇨🇳 CN | AS136195 | 2026-04-09 |
| 139.198.30.179 | 84% | 973 | 233 | 🇨🇳 CN | AS59078 | 2026-04-09 |
| 218.78.131.154 | 100% | 831 | 440 | 🇨🇳 CN | AS4812 | 2026-04-09 |
| 14.103.220.97 | 100% | 821 | 261 | 🇨🇳 CN | AS4811 | 2026-04-09 |
| 180.76.114.78 | 83% | 776 | 454 | 🇨🇳 CN | AS38365 | 2026-04-09 |
| 114.80.35.241 | 100% | 753 | 408 | 🇨🇳 CN | AS4811 | 2026-04-09 |
| 125.94.106.113 | 85% | 706 | 221 | 🇨🇳 CN | AS4134 | 2026-04-09 |
| 14.103.198.15 | 100% | 678 | 163 | 🇨🇳 CN | AS4811 | 2026-04-09 |
| 49.115.217.27 | 82% | 599 | 256 | 🇨🇳 CN | AS4134 | 2026-04-09 |
| 106.227.11.236 | 99% | 568 | 180 | 🇨🇳 CN | AS134238 | 2026-03-26 |
| 106.13.124.241 | 71% | 500 | 332 | 🇨🇳 CN | AS38365 | 2026-04-09 |
| 182.92.181.218 | 100% | 479 | 154 | 🇨🇳 CN | AS37963 | 2026-04-09 |
| 106.12.184.7 | 76% | 479 | 301 | 🇨🇳 CN | AS38365 | 2026-04-09 |
| 125.67.236.54 | 99% | 458 | 165 | 🇨🇳 CN | AS4134 | 2026-03-11 |
| 61.153.23.162 | 66% | 428 | 295 | 🇨🇳 CN | AS4134 | 2026-04-09 |
| 120.48.43.118 | 98% | 388 | 170 | 🇨🇳 CN | AS38365 | 2026-04-09 |
| 218.59.175.217 | 79% | 345 | 211 | 🇨🇳 CN | AS4837 | 2026-04-09 |
| 43.134.0.85 | 80% | 303 | 222 | 🇸🇬 SG | AS132203 | 2026-04-09 |
| 117.50.47.100 | 95% | 298 | 87 | 🇨🇳 CN | AS4808 | 2026-04-08 |
| 180.76.52.82 | 94% | 297 | 145 | 🇨🇳 CN | AS38365 | 2026-04-08 |