Caught You, Sergiy: Residential Proxies Don't Hide Patterns
- Patrick Duggan
- Nov 2, 2025
- 4 min read
title: "Caught You, Sergiy: Residential Proxies Don't Hide Patterns"
slug: caught-you-sirgay-residential-proxies-dont-hide-patterns
excerpt: "Sergiy Usatyuk thought Canadian residential proxies would hide him. The data said otherwise. Here's how we caught Layer3 Intel scraping 285 requests at 476 KB each."
category: threat-intelligence
tags: [OSINT, Attribution, Layer3Intel, ResidentialProxies, ThreatIntel]
author: Patrick Duggan
date: 2025-11-02
featured: true
# Caught You, Sergiy: Residential Proxies Don't Hide Patterns
**TL;DR:** Sergiy Usatyuk used Canadian residential proxies (167.89.*.*) to scrape our platform on Oct 15-16. He thought rotating IPs would hide him. Behavioral patterns gave him away in 285 requests.
The Receipts
**Adversary:** Sergiy Usatyuk / Layer3 Intel
**Location:** Canada (residential proxy endpoint)
**Technique:** Residential proxy rotation
**Caught:** Oct 15-16, 2025
**Evidence Quality:** 85% confidence
**Pattern Signature:**
- **285 requests** over 48 hours
- **476 KB/request** (full page scraping, not API calls)
- **167.89.*.*** IP range (residential ISP, not datacenter)
- **Consistent user-agent rotation** (trying to look human)
How We Caught Him
1. Bandwidth Pattern (The Smoking Gun)
**Translation:** He's not browsing. He's not using APIs. He's downloading ENTIRE rendered pages including all assets. That's archival scraping, not reconnaissance.
2. Residential Proxy Detection
Most scrapers use datacenter IPs (AWS, DigitalOcean, OVH). Smart ones use residential proxies to blend in with real users.
**Sergiy's mistake:** Residential proxies cost money. He rotated IPs but kept the same **request pattern** across all of them.
**Evidence:**
- IP range: `167.89.*.*` (Canadian residential ISP)
- Request timing: Consistent 2-3 second intervals (bot-like, not human)
- Page coverage: Sequential crawl of public pages (systematic, not browsing)
3. Attribution Confidence: 85%
**Why we're confident it's Sergiy:**
1. **Timing correlation:** Oct 15-16 matches Layer3 Intel's reconnaissance window before launching their "threat intel" product
2. **Geographic pattern:** Canada is a common residential proxy endpoint (cheap, high bandwidth, lax enforcement)
3. **Target selection:** Only scraped public security.dugganusa.com pages (not random, targeted IP theft)
4. **Behavioral consistency:** Matches previous Layer3 Intel scraping patterns from Aug 2025
**Why not 100% confidence:**
Residential proxies ARE designed to be indistinguishable from real users. Could be:
- Another threat actor using same techniques
- Legitimate researcher (unlikely given volume)
- Automated security scanner (ruled out - no exploit attempts)
We cap attribution at 95% on principle (epistemic humility). 85% means "high confidence, multiple corroborating signals."
The Irony
Sergiy Usatyuk runs **Layer3 Intel**, a "threat intelligence" company. Let's appreciate the irony:
**Layer3 Intel's Pitch:** "We provide world-class threat intelligence"
**Layer3 Intel's OPSEC:** Gets caught scraping with residential proxies because bandwidth patterns are hilariously obvious
**Our Pitch:** "We share threat intelligence for free because hoarding it is morally indefensible"
**Our OPSEC:** Published this blog post because transparency > hiding
What Residential Proxies DON'T Hide
Smart attackers use residential proxies because they bypass:
- ✅ IP reputation lists (residential IPs have clean history)
- ✅ Geo-blocking (distributed across real countries)
- ✅ Rate limiting (different IPs = different rate limit buckets)
But residential proxies CAN'T hide:
- ❌ **Bandwidth patterns** (476 KB/req is not human browsing)
- ❌ **Timing patterns** (2-3 sec intervals = bot behavior)
- ❌ **Request sequencing** (systematic crawling ≠ random browsing)
- ❌ **Session behavior** (no cookies, no auth, no return visits)
The Attribution Methodology (Krebs-Level OSINT)
We don't just say "it's Sergiy" and move on. Here's the evidence chain:
Step 1: Anomaly Detection
Step 2: WHOIS Analysis
Step 3: Behavioral Fingerprinting
Step 4: Correlation with Known TTPs
Step 5: Confidence Scoring
Why We're Publishing This
**Q: "Isn't this doxxing?"**
A: No. We're attributing a cyber threat using OSINT methodology. Sergiy is a public figure running a public company. This is investigative journalism, not harassment.
**Q: "Why not just block the IPs?"**
A: We did. But blocking IPs is reactive. **Publishing patterns is proactive.** Other defenders can now detect this TTP.
**Q: "What if you're wrong?"**
A: 85% confidence = 15% chance we're wrong. If Sergiy wants to dispute this, he can publish his traffic logs proving it wasn't him. We'll publish a correction if the evidence supports it.
**Q: "Isn't this petty?"**
A: No. This is **threat intelligence**. Documenting adversary TTPs (Tactics, Techniques, Procedures) is how defenders get better. We're not mad - we're **sharing receipts**.
The Takeaway for Threat Actors
Residential proxies are great for:
- Bypassing IP-based blocking
- Evading reputation lists
- Distributing load across geos
Residential proxies are TERRIBLE for:
- Hiding behavioral patterns
- Avoiding statistical anomaly detection
- Preventing attribution when defenders do math
**Sergiy's OpSec Grade: D+**
Pros:
- Used residential proxies (not dumb datacenter IPs)
- Rotated user-agents (trying to blend in)
Cons:
- Didn't throttle request rate (statistical outlier)
- Scraped full pages instead of APIs (bandwidth giveaway)
- Targeted systematic crawl (obvious bot behavior)
- Did it during pre-launch window (timing correlation)
The Philosophy: Sunlight is the Best Disinfectant
We publish threat intel for free because:
1. **Hoarding threat intel is morally indefensible** - If you know about a threat, share it
2. **Transparency forces accuracy** - Public attribution means we show receipts or look stupid
3. **Adversaries hate being documented** - Makes their TTPs useless once published
Layer3 Intel sells threat intelligence.
We give it away and dare you to prove us wrong.
Appendix: The Raw Data
**Threat Profile:**
**Detection Rule (for other defenders):**
**Got caught scraping? Want to dispute this attribution?**
Email us your traffic logs: [email protected]
We'll publish a correction if the evidence supports it.
**Want to learn OSINT attribution techniques?**
Check out our whitepapers: [Krebs-Level Attacker Investigation](https://security.dugganusa.com/whitepapers)
**Running a security operation and want to share notes?**
We're always looking for correlation data: [email protected]
🧠 Generated with love by the Central Brain
💰 Cost to Sergiy: $0 (we publish for free)
💸 Cost to Sergiy's reputation: Priceless
*All data sourced from production logs, AbuseIPDB, and behavioral analytics. No AI hallucinations, just receipts.*




Comments