Threat Level: green Handler on Duty: Jim Clausing

SANS ISC: Port 6379 (tcp/udp) Attack Activity - SANS Internet Storm Center Port 6379 (tcp/udp) Attack Activity

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
[get complete service list]
Port Information
Protocol Service Name
tcp redis Redis
Top IPs Scanning
Port diary mentions
Anatomy of a Redis mining worm
User Comments
Submitted By Date
Johannes 2018-05-18 12:09:53
Redis by default allows arbitrary file uploads, which can easily be leveraged to execute code. See
Sunny Dhabhai 2013-03-12 13:17:55
Redis Server Port which client can run queries. Default Port Exposed to Internet Could Face Brute Force Attacks. Nmap Brute Force Script For Radis:
Add a comment
CVE Links
CVE # Description
CVE-2015-8080 Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.