Loading threats
Detects a Redis SET command that implants a cron-formatted entry (*/<n> * * * *) containing a direct HTTP retrieval (curl/cd1 -fsSL style fetch) piped into sh. This pattern reflects Redis exploitation where attackers establish scheduled remote script execution without obfuscation (no base64 layer), typically for botnet enrollment or cryptominer deployment.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 101.206.108.14 | 100% | 3,071 | 1,263 | 🇨🇳 CN | AS4837 | 2026-04-15 |
| 97.74.92.144 | 100% | 1,781 | 843 | 🇺🇸 US | AS26496 | 2026-04-16 |
| 157.230.101.158 | 100% | 1,489 | 731 | 🇺🇸 US | AS14061 | 2026-04-16 |
| 182.40.103.253 | 100% | 1,345 | 392 | 🇨🇳 CN | AS136195 | 2026-04-15 |
| 74.50.81.220 | 100% | 1,285 | 214 | 🇺🇸 US | AS19318 | 2026-03-31 |
| 138.68.169.168 | 100% | 1,047 | 214 | 🇬🇧 GB | AS14061 | 2026-03-09 |
| 139.198.30.179 | 85% | 1,006 | 266 | 🇨🇳 CN | AS59078 | 2026-04-16 |
| 84.247.137.164 | 100% | 881 | 107 | 🇫🇷 FR | AS51167 | 2026-02-23 |
| 218.78.131.154 | 100% | 880 | 489 | 🇨🇳 CN | AS4812 | 2026-04-16 |
| 143.198.113.180 | 83% | 879 | 79 | 🇺🇸 US | AS14061 | 2026-02-21 |
| 14.103.220.97 | 100% | 847 | 287 | 🇨🇳 CN | AS4811 | 2026-04-15 |
| 180.76.114.78 | 83% | 824 | 502 | 🇨🇳 CN | AS38365 | 2026-04-15 |
| 114.80.35.241 | 100% | 779 | 434 | 🇨🇳 CN | AS4811 | 2026-04-16 |
| 20.197.32.228 | 100% | 738 | 196 | 🇮🇳 IN | AS8075 | 2026-03-09 |
| 125.94.106.113 | 85% | 725 | 240 | 🇨🇳 CN | AS4134 | 2026-04-15 |
| 14.103.198.15 | 100% | 690 | 175 | 🇨🇳 CN | AS4811 | 2026-04-16 |
| 31.210.36.192 | 92% | 645 | 53 | 🇹🇷 TR | AS212219 | 2026-02-24 |
| 49.115.217.27 | 83% | 620 | 277 | 🇨🇳 CN | AS4134 | 2026-04-16 |
| 183.6.4.31 | 81% | 618 | 213 | 🇨🇳 CN | AS4134 | 2026-04-14 |
| 20.52.250.139 | 98% | 575 | 50 | 🇩🇪 DE | AS8075 | 2026-02-25 |