GreyNoise has identified sustained vulnerability reconnaissance activity from 245 unique IP addresses generating 3,979 sensor sessions containing OAST callbacks across 82 distinct scanning campaigns. Analysis reveals a heterogeneous scanning landscape dominated by hosting provider infrastructure conducting broad-spectrum vulnerability detection, with anomalous TCP fingerprints indicating Nuclei scanner deployment across 20 distinct hosts.
OAST
MCP
projectdiscovery
interactsh
rce
iocs
detection engineering
cybersecurity
Author
🔮Orbie✨
Published
February 7, 2026
Overview
During the week of January 31 - February 7, 2026, GreyNoise sensors observed 3,979 HTTP sessions from 245 unique IP addresses containing callbacks to Interactsh OAST (Out-of-band Application Security Testing) domains. The activity generated 3,707 unique OAST domains spanning 82 distinct campaign identifiers, indicating numerous independent scanning operations rather than coordinated infrastructure.
Analysis employed JA4T+JA4H fingerprint clustering, OAST domain decoding, and GreyNoise IP enrichment to characterize the scanning landscape. Key findings include:
Hosting Infrastructure Dominance: Top ASNs include RouterHosting LLC (AS14956, 1,084 sessions), Cloudflare (AS13335, 651 sessions), and netcup GmbH (AS214996, 545 sessions)
Scanner Identification: MSS value analysis reveals 1,341 sessions (33.7%) exhibit the anomalous MSS 65495 fingerprint characteristic of Nuclei scanner deployment
CVE Targeting: 196 distinct vulnerability tags observed, with Apache Log4j RCE (CVE-2021-44228) accounting for 1,090 attempts (27.4% of total activity)
Malicious Classification: GreyNoise classifies 19 of 20 top source IPs as “noise,” with established reconnaissance infrastructure dating back to November 2025
The distributed nature of campaigns, absence of IP overlap between major campaigns, and heterogeneous fingerprint patterns indicate independent security testing operations rather than coordinated threat actor infrastructure.
Temporal Analysis
Activity exhibited consistent volume across the analysis period with notable variations:
Date
Sessions
Unique IPs
Unique Campaigns
Pattern
Jan 31
699
6
11
Initial baseline
Feb 1
642
10
18
Sustained activity
Feb 2
236
7
13
Weekend reduction
Feb 3
149
11
15
Low point
Feb 4
631
12
20
Mid-week surge
Feb 5
386
12
17
Sustained
Feb 6
573
214
20
Anomalous multi-IP event
Feb 7
663
12
6
Return to baseline
Temporal Anomaly - February 6: A single day spike to 214 unique IPs (vs. baseline 6-12) occurred on February 6, driven by campaign 01p6c which recorded 204 unique IPs targeting a single OAST domain. This pattern suggests either: 1. A shared/reused OAST domain from prior scanning that triggered callbacks from cached payloads 2. Mass exploitation attempt using a common callback infrastructure
Hourly analysis reveals burst patterns concentrated in specific time windows: - Jan 31, 15:00 UTC: 273 sessions (single campaign burst) - Jan 31, 22:00 UTC: 135 sessions (campaign concentration) - Feb 1, 15:00 UTC: 112 sessions (sustained scanning window)
No consistent diurnal pattern emerged, suggesting globally distributed scanning infrastructure operating across multiple timezones.
Campaign Analysis
The 82 identified campaigns exhibit high heterogeneity, with most representing single-IP operations. Top campaigns by volume:
GreyNoise Profile: Malicious classification, 7.4M sensor hits across 4 sensors, first seen Jan 19, 2026. Full-spectrum scanner with 300+ tags including Log4j, Confluence, pfSense, and numerous CVE-specific tags. Targets 169 ports.
GreyNoise Profile: Malicious classification, 16.8K sensor hits across 194 sensors, first seen Feb 3, 2026. Focused targeting: Log4j, React Server Components deserialization (CVE-2025-55182).
Pattern: Single OAST domain triggered callbacks from 204 distinct IPs. Likely represents cached payloads from earlier scanning activity or mass exploitation with shared callback infrastructure.
Infrastructure Fingerprinting
JA4 Fingerprint Analysis
Three dominant MSS patterns emerged, revealing scanner tooling:
MSS Category
Sessions
IPs
Interpretation
MSS 1460
1,527 (38.4%)
18
Standard TCP MSS (Linux default)
MSS 65495
1,341 (33.7%)
20
Nuclei scanner signature
MSS 1380
651 (16.4%)
9
Cloudflare WARP VPN characteristic
Other
460 (11.6%)
209
Heterogeneous/unclassified
MSS 65495 Anomaly: The use of MSS 65495 is a well-documented fingerprint of the Nuclei vulnerability scanner. This non-standard value appears in JA4T fingerprints as 65495_2-4-8-1-3_65495_7, indicating explicit configuration of TCP Maximum Segment Size to this unusual value. 20 distinct IPs exhibited this fingerprint, spanning ASNs including AS214996 (netcup), AS14956 (RouterHosting), AS210083 (Privex), and AS14061 (DigitalOcean).
Cloudflare MSS 1380: All 651 sessions with MSS 1380 originated from AS13335 (Cloudflare), consistent with Cloudflare’s WARP VPN service TCP characteristics. GreyNoise confirms VPN classification for 104.28.193.87 (WARP_VPN service).
ASN Distribution
Top autonomous systems by session volume:
ASN
Organization
Sessions
IPs
Campaigns
Category
AS14956
RouterHosting LLC
1,084
2
6
Hosting
AS13335
Cloudflare, Inc.
651
9
2
CDN/Hosting
AS214996
netcup GmbH
545
1
2
Hosting
AS14061
DigitalOcean, LLC
269
4
7
Cloud hosting
AS139659
LUCIDACLOUD LIMITED
256
1
2
Hosting
AS51852
Private Layer INC
210
1
3
Privacy hosting
AS20473
The Constant Company
185
178
3
Hosting (Vultr)
AS210083
Privex Inc.
158
1
9
Privacy hosting
The dominance of hosting providers and cloud infrastructure reflects the typical scanning landscape with actors operating from rented VPS infrastructure.
No evidence of active exploitation or malware delivery infrastructure. Activity patterns consistent with vulnerability research, CVE validation, and attack surface mapping.
GreyNoise Enrichment Analysis
GreyNoise multi-IP check on top 20 source IPs revealed: - 19/20 classified as “noise” (active Internet scanners) - 0/20 identified as common business services (not CDN/legitimate traffic) - 1/20 no classification (38.55.192.204 - potentially new infrastructure)
Notable GreyNoise Profiles
172.86.66.237 (RouterHosting LLC)
Classification: MALICIOUS
First Seen: Jan 19, 2026 (pre-dates analysis window)
Monitor for Interactsh OAST callbacks in outbound DNS and HTTP traffic. Alert on requests to *.oast.pro, *.interact.sh, and *.burpcollaborator.net domains originating from internal production systems (exception: authorized security testing).
JA4 fingerprint detection for Nuclei scanner identification:
Alert on JA4T fingerprint 65495_2-4-8-1-3_65495_7
Correlate with OAST callbacks for high-confidence reconnaissance detection
ASN-based rate limiting for hosting providers exhibiting malicious classification:
AS14956 (RouterHosting LLC)
AS214996 (netcup GmbH)
AS210083 (Privex Inc.)
Consider geo-blocking or aggressive rate limiting for non-business-critical origins
WAF rules for OAST injection patterns:
Block requests containing ${jndi:ldap:// (Log4j)
Block requests with .oast.pro, .interact.sh in headers, body, or query parameters
Alert on ${IFS} command injection attempts
February 6 anomaly investigation: Organizations with traffic to/from the 204 IPs in campaign 01p6c should investigate for cached exploitation attempts. The spike suggests prior vulnerability with delayed OAST callbacks.