Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Port 6379 (tcp/udp) Attack Activity Port 6379 (tcp/udp) Attack Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp redis Redis
Top IPs Scanning
TodayYesterday
152.136.176.43 (255)218.8.57.184 (865)
116.63.137.0 (206)159.223.71.150 (486)
39.153.183.75 (166)208.100.26.228 (462)
150.158.193.126 (162)116.63.137.0 (391)
222.128.18.116 (159)45.155.205.166 (378)
121.5.147.7 (159)61.153.110.33 (370)
39.103.233.191 (156)101.52.126.60 (369)
111.123.243.37 (155)112.86.226.201 (343)
119.3.166.167 (155)114.247.118.139 (323)
1.14.76.195 (151)124.71.143.184 (300)
Port diary mentions
URL
Anatomy of a Redis mining worm
User Comments
Submitted By Date
Comment
Johannes 2018-05-18 12:09:53
Redis by default allows arbitrary file uploads, which can easily be leveraged to execute code. See http://blog.knownsec.com/2015/11/analysis-of-redis-unauthorized-of-expolit/
Sunny Dhabhai 2013-03-12 13:17:55
Redis Server Port which client can run queries. Default Port Exposed to Internet Could Face Brute Force Attacks. Nmap Brute Force Script For Radis: http://nmap.org/nsedoc/scripts/redis-brute.html
Add a comment
CVE Links
CVE # Description
CVE-2015-8080