Reporting Period: March 4, 2026
During the 24-hour monitoring period, AST's honeypot detected 1,894 alerts from 95 unique attackers across 10 countries, indicating a sustained and multi-faceted reconnaissance and exploitation campaign. The attack volume concentrated sharply during hours 11–12 (UTC), with 1,285 alerts (68% of daily total) occurring within a two-hour window, suggesting coordinated or wave-based activity. The geographic distribution reveals predominant origination from Greece (66% of alerts) and Germany (21%), though infrastructure is primarily US-hosted, indicating attackers are using compromised or rented cloud and ISP resources for campaign execution.
Two primary high-sophistication threat actors emerged:
The most active attacker, IP 5.203.140.88 (Cosmote Mobile Telecommunications), generated 1,226 alerts through systematic exploitation attempts targeting enterprise platforms including WebLogic, Nacos, Apache OFBiz, and Jupyter. This actor demonstrates human oversight, employing IP spoofing techniques (X-Forwarded-For: 8.8.8.8), injecting Java ProcessBuilder payloads and XSS code within credential fields, and leveraging multiple out-of-band callback domains (oast.me, oast.fun, interact.sh). A secondary Cosmote IP (5.203.230.72) shares overlapping credential choices and tokens, indicating coordinated or shared tooling between both hosts.
IP 185.139.230.187 (Kamatera Inc) conducted 383 alerts with high operational sophistication, executing 36 command injection callbacks to a dedicated callback infrastructure (d6jludo3aohnv30d48k0*.oast.fun) via curl, wget, RMI, and LDAP protocols. Human operator signals—detected through variable response timing (61–128 second intervals)—coupled with novel LLM API probing (testing Cohere's command-nightly model), indicate this actor is actively researching emerging infrastructure vulnerabilities. Credentials targeted include WebLogic, Versa Networks, and IBM HSC, consistent with known CVE exploitation patterns.
Distributed clustering patterns across Akamai Connected Cloud, Nubes LLC, and Contabo suggest organized scanning infrastructure, with 4–5 IPs per ISP targeting identical honeypot endpoints using synchronized fuzzing and parameter injection techniques. Multiple independent novel attack wave detections (tokens: ?iiak3, ?raip8) within 120-minute windows indicate either multiple concurrent campaigns or rapid tool evolution.
Three dominant attack methodologies accounted for 79% of alerts:
Secondary techniques include out-of-band injection callbacks (199 alerts), baithive reconnaissance (53 alerts), and emerging threats such as LLM endpoint scanning and Fastly CDN IP spoofing. Cross-ISP domain reuse (oast.fun, IBM WSDL references, WordPress CDN) indicates shared scanning toolkits, consistent with public frameworks like Nuclei being deployed independently across multiple threat actors.
Immediate containment is recommended for the primary threat actor (5.203.140.88) and secondary actor (185.139.230.187), including ISP notification and coordination with threat intelligence platforms to flag newly identified AWS reconnaissance nodes.
| Fuzzing attack | 519 | |
| Country specific targeted attack | 494 | |
| Credential Compromise Detected | 489 | |
| Injected Out-of-Band Callback Domain Detected | 157 | |
| Attacker with IP unknown to integrated 3rd party threat Intelligence | 97 |
| GR | 1.252 | |
| DE | 406 | |
| US | 154 | |
| SG | 18 | |
| FI | 6 |
👉 Click a slice to explore that ISP’s details below
👉 Click a slice to explore that attacker’s details below
5.203.140.88Profile: Highly sophisticated, likely human-operated scanner/exploitation framework.
%{#a=(new java.lang.ProcessBuilder...)), and another included an XSS payload ("><script>alert(document.domain)</script>), indicating multi-class payload delivery within credential fields.Probably Human Attacker detection and the use of X-Forwarded-For: 8.8.8.8 (IP spoofing) alongside OOB callback domains including oast.me, oast.fun, and interact.sh confirm this is an active, manually guided reconnaissance and exploitation campaign targeting US infrastructure.185.139.230.187Profile: Automated exploitation framework with human oversight and OOB verification infrastructure.
d6jludo3aohnv30d48k0*.oast.fun) via curl, wget, RMI (rmi://), and LDAP (ldap://) protocols, indicating a purpose-built exploitation campaign with dedicated callback infrastructure.command-nightly with prompt Hello, how are you? indicates experimental probing for exposed LLM API endpoints — an emerging and novel attack vector.Oracle@123), Versa Networks (versa123), IBM HSC (hscroot/abc123), and generic defaults, demonstrating broad enterprise platform targeting aligned with known CVE exploitation patterns.[5.203.140.88 + 5.203.230.72]Profile: Coordinated dual-IP attack wave.
?iiak3 in 100 requests within 120 minutes, strongly suggesting coordinated or shared tooling between the two hosts.5.203.230.72 is a lower-intensity secondary actor (10 fuzzing, 8 credential attempts) with overlapping credential choices (admin/admin, user/user, shipper/shipper) matching 5.203.140.88, reinforcing the coordinated hypothesis.3ATl4* OOB-style tokens as usernames/passwords across both Cosmote IPs and Kamatera suggests shared tooling or a common attack framework (possibly Interactsh-based).173.255.230.37, 172.232.181.29, 172.235.138.70, 173.230.153.228Profile: Distributed parameter fuzzing campaign using Fastly egress nodes.
?<token>=<token> and ?<token>=test<token>) matching a consistent structural pattern, suggesting automated parameter pollution or cache-poisoning probe across different egress nodes.173.255.230.37 and 172.232.181.29 indicates the attacker is routing through Fastly's CDN infrastructure, deliberately obscuring origin via loopback spoofing in Fastly headers.Probably Human Attacker signal on both 173.255.230.37 (std dev: 81K–413K ms) and 172.232.181.29 (std dev: 176K ms) suggests semi-manual operation or slow throttled automation designed to evade rate-limiting detection.Profile: Multi-IP fuzzing cluster, US-targeted.
94.72.122.x subnet and 217.216.65.94, 194.238.28.128) all fuzz the same target 3.230.225.206, consistent with a VPS-based scanning cluster using a shared /24 range.217.216.65.94 triggered a New Attack Wave with token ?raip8 in 100 requests over 120 minutes — a separate novel burst from the Cosmote wave, suggesting independently operating actors or different toolkits targeting the same honeypot.Profile: Multi-IP fuzzing, partially human-operated.
161.97.151.101 exhibits a Probably Human Attacker signal (std dev: ~96K ms), distinguishing it from fully automated peers within the same ISP.185.202.236.73 used a distinct OOB domain on oast.live (vs. oast.fun/oast.me used by others), suggesting a different tool or operator within the same hosting provider.Profile: Likely compromised consumer endpoints used as attack proxies.
46.250.232.83, 46.250.232.234) conduct fuzzing and US-targeted attacks from Deutsche Telekom residential IP space, suggesting compromised home/office routers or botnet nodes.46.250.232.234 carries a human attacker signal (std dev: ~184K ms), and 46.250.232.83 attempted a unique credential (admin/dcxvfdor) not seen across other actors, hinting at distinct tooling or manual intervention.Profile: Common scanning tools used across multiple ISPs.
http://schemas.xmlsoap.org, http://docs.oasis-open.org, http://www.ibm.com, https://rfi.nessus.org, https://downloads.wordpress.org, and http://oast.fun appear across Cosmote, Kamatera, Akamai, GSL Networks, and Base IP — strongly indicating shared scanning toolkits (e.g., Nuclei templates) being run independently by different actors.Base IP / 45.38.18.136 exclusively used http://www.ibm.com as an OOB probe domain, which is consistent with legacy XXE or SSRF template probes that reference IBM's WSDL/schema URLs as blind callback canaries.Profile: AWS-hosted reconnaissance endpoints evading threat intelligence.
| Indicator | Source | Significance |
|---|---|---|
LLM probe (command-nightly) |
Kamatera 185.139.230.187 |
Scanning for exposed Cohere/LLM API endpoints |
3ATl4* tokens as credentials |
Cosmote + Kamatera | Shared Interactsh-style OOB verification in auth fields |
| Fastly-Client-Ip: 127.0.0.1 spoofing | Akamai cluster | CDN-layer IP origin obfuscation |
| Java ProcessBuilder in password field | Cosmote 5.203.140.88 |
SSTI/RCE via authentication endpoints |
Novel attack wave tokens (?iiak3, ?raip8) |
Cosmote + Nubes | Unclassified probe patterns requiring rule creation |