LAST UPDATED: 2022-08-29
This report identifies hosts that have the Memcached key-value store running and accessible on the Internet.
Since this service does not support authentication, any entity that can access the Memcached instance can have complete control over the key-value store. In addition, instances of Memcached that are accessible via UDP may be abused in amplification-style denial of service attacks.
See memcached.org for more information about Memcached.
For more details behind the scan methodology and a daily update of global Memcached scan statistics please visit our dedicated Memcached scan page.
For more information on our scanning efforts, check out our Internet scanning summary page.