Loading threats
Uses the Redis SET command to store a value that resembles a cron-style scheduled task combined with a remote shell script download and execution, a pattern commonly associated with attempts to establish persistence or deploy malware after abusing Redis file-write or configuration weaknesses.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 182.40.103.253 | 100% | 1,422 | 469 | 🇨🇳 CN | AS136195 | 2026-04-29 |
| 139.198.30.179 | 86% | 1,058 | 318 | 🇨🇳 CN | AS59078 | 2026-04-26 |
| 218.78.131.154 | 100% | 973 | 582 | 🇨🇳 CN | AS4812 | 2026-04-29 |
| 14.103.220.97 | 100% | 914 | 354 | 🇨🇳 CN | AS4811 | 2026-04-29 |
| 114.80.35.241 | 100% | 879 | 534 | 🇨🇳 CN | AS4811 | 2026-04-29 |
| 180.76.114.78 | 83% | 824 | 502 | 🇨🇳 CN | AS38365 | 2026-04-15 |
| 125.94.106.113 | 86% | 761 | 276 | 🇨🇳 CN | AS4134 | 2026-04-28 |
| 14.103.198.15 | 100% | 714 | 199 | 🇨🇳 CN | AS4811 | 2026-04-29 |
| 49.115.217.27 | 83% | 652 | 309 | 🇨🇳 CN | AS4134 | 2026-04-29 |
| 106.13.124.241 | 74% | 613 | 445 | 🇨🇳 CN | AS38365 | 2026-04-28 |
| 106.227.11.236 | 99% | 568 | 180 | 🇨🇳 CN | AS134238 | 2026-03-26 |
| 106.12.184.7 | 78% | 562 | 384 | 🇨🇳 CN | AS38365 | 2026-04-29 |
| 182.92.181.218 | 100% | 506 | 181 | 🇨🇳 CN | AS37963 | 2026-04-25 |
| 61.153.23.162 | 70% | 468 | 335 | 🇨🇳 CN | AS4134 | 2026-04-19 |
| 125.67.236.54 | 99% | 458 | 165 | 🇨🇳 CN | AS4134 | 2026-03-11 |
| 120.48.43.118 | 98% | 437 | 219 | 🇨🇳 CN | AS38365 | 2026-04-29 |
| 218.59.175.217 | 80% | 407 | 273 | 🇨🇳 CN | AS4837 | 2026-04-28 |
| 43.134.0.85 | 83% | 405 | 324 | 🇸🇬 SG | AS132203 | 2026-04-28 |
| 180.76.52.82 | 94% | 348 | 196 | 🇨🇳 CN | AS38365 | 2026-04-28 |
| 106.13.45.232 | 67% | 322 | 219 | 🇨🇳 CN | AS38365 | 2026-04-29 |