title: "Free STIX 2.1 Threat Intelligence Feed" description: "Comprehensive documentation for DugganUSA's free STIX threat intelligence feed - 244 unique discoveries, 5-source correlation, ISP reputation scoring, brand weaponization detection." author: "Patrick Duggan" publishedDate: "2025-11-13" updatedDate: "2025-11-21" version: "2.0.0" tags: ["stix", "threat-intelligence", "free-tier", "ioc", "security-feed", "brain-intelligence", "isp-reputation", "mitre-attack"] featured: true order: 9 license: "CC0-1.0"
Free STIX 2.1 Threat Intelligence Feed - Complete Documentation
DugganUSA LLC - Democratic Sharing Initiative
Published: November 13, 2025 Updated: November 21, 2025 (v2.0.0 - Brain Intelligence Integration) Version: 2.0.0 License: CC0-1.0 (Public Domain) Contact: [email protected]
Table of Contents
- About Us
- The Free STIX Feed
- Central Brain Architecture
- ISP Reputation Scoring
- Brand Weaponization Detection
- Residential Proxy Detection
- Enhanced MITRE ATT&CK Coverage
- How to Use the Feed
- Vendor Integration Guides
- How to Become a Customer
- Pricing & Tiers
- Seed Funding Opportunities
- Democratic Sharing Law
- Technical Specifications
- Support & Contact
About Us
DugganUSA LLC - Minnesota
Founded: 2024 Location: Minnesota, USA (Silicon Prairie) Mission: Democratize threat intelligence through radical transparency and zero-marginal-cost sharing
Core Belief: Digital goods have zero marginal cost to share. Hoarding threat intelligence behind paywalls is bullshit.
The Numbers
- 244+ unique discoveries - Threats that billion-dollar vendors (AbuseIPDB, VirusTotal, ThreatFox) scored as ZERO
- 63% unique discovery rate - From 5-source simultaneous correlation
- 99.5% public sharing - 4,780 files tracked, 1,011 excluded (secrets/keys)
- 7.1x evidence-to-claims ratio - We show receipts for everything
- $75/month infrastructure - vs $5K-$10K enterprise alternatives (81% SOC1 compliance)
The Philosophy: Born Without Sin
Low infrastructure security scores are a FEATURE when you have zero legacy debt.
Most enterprises spend millions securing technical debt accumulated over decades. We built from scratch in 2024 with zero legacy baggage. Our threat intelligence comes from production security operations - real attacks against real infrastructure, blocked in real-time.
Judge Dredd 6D Framework
Current Score: 92% overall (17-point drift due to gratitude metric tuning)
- D1: Commits - 95% (Git history integrity)
- D2: Corpus - 95% (Blog posts + training data quality)
- D3: Evidence - 91% (VirusTotal scans, SBOM, security audits)
- D4: Temporal - 95% (Time since last activity, CVE exposure)
- D5: Financial - 95% (P.F. Chang's Avoided Cost: $65K, 2.17M% ROI)
- D6: Democratic Sharing - 78% (Ethics: hoarding, transparency, gratitude, accessibility, trust arbitrage, armor polishing)
Run verification: node scripts/judge-dredd-agent/cli.js 6d
The Free STIX Feed
What You Get
Feed URL: https://analytics.dugganusa.com/api/v1/stix-feed
Format: STIX 2.1 Bundle (industry standard threat intelligence exchange format)
Update Frequency: Real-time from production auto-blocking operations
Authentication: API Key Required (March 15, 2026) - Free tier: 1/day - Register
License: CC0-1.0 (Public Domain) - Use it however you want, attribution appreciated but not required
Why It's Free
Democratic Sharing Law: We publish openly because that's how you prove you're not lying about your discoveries.
Zero marginal cost to share digital goods. We're not hoarding threat intelligence behind paywalls. Sharing proves confidence.
The Aristocrats Standard: Admit mistakes, show receipts, thank those wronged, fix publicly.
What Makes It Unique
244 threats that major vendors missed:
When AbuseIPDB scores an IP as zero, VirusTotal scores it as zero, and ThreatFox scores it as zero — but we blocked it at 95% confidence based on actual attack behavior — that's the indicator your security platform needs.
5-source simultaneous correlation:
- AbuseIPDB (community reports)
- VirusTotal (malware analysis)
- ThreatFox (C2 infrastructure)
- Production logs (real attack traffic)
- OSINT analysis (WHOIS, Certificate Transparency, behavioral patterns)
MITRE ATT&CK mapped: Every indicator includes technique mapping (T1071, T1090, T1595.001, etc.)
Central Brain Architecture
The Drone → Brain Pattern (Pattern #30)
Architecture Philosophy: Thin drones collect data, centralized brain processes intelligence.
Why This Matters:
- Cost Efficiency: Heavy computation happens once (brain), not distributed across drones
- Consistency: All drones benefit from central correlation improvements
- Scalability: Add drones without duplicating analytics infrastructure
- Learning: Brain accumulates knowledge from all drones, improving over time
Architecture Components
The Brain = analytics.dugganusa.com (enterprise-extraction-platform)
- Heavy computation, ML/AI, centralized intelligence
- 5-source threat correlation (AbuseIPDB, VirusTotal, ThreatFox, production logs, OSINT)
- Azure Table Storage: 12 creative patterns for cost-optimized data storage
- Event ingestion from all drones (threat intel queries, WAF blocks, governance incidents)
The Drones = security.dugganusa.com, 2x4.dugganusa.com, status.dugganusa.com
- Thin UI, data collection, edge operations
- Real-time auto-blocking at edge (Cloudflare WAF rules)
- Send telemetry to Brain for correlation
- Display insights from Brain's analysis
5-Source Correlation Intelligence
How We Discover What Others Miss:
Source 1: AbuseIPDB (Community Reports)
- 10M+ contributors worldwide
- Abuse confidence score (0-100)
- Attack categories (port scan, brute force, web attack, etc.)
Source 2: VirusTotal (Malware Analysis)
- 70+ security vendors
- Malicious/suspicious/clean verdicts
- File hashes, URL scans, IP reputation
Source 3: ThreatFox (C2 Infrastructure)
- abuse.ch community feed
- Command & Control servers
- Malware families (Cobalt Strike, Emotet, QakBot, etc.)
Source 4: Production Logs (Real Attacks)
- Cloudflare WAF blocks (IP-based, rate limiting, ASN blocks)
- Attack patterns (SQL injection attempts, path traversal, credential stuffing)
- Temporal analysis (time of day, frequency, persistence)
Source 5: OSINT Analysis (Behavioral Patterns)
- WHOIS data (registration patterns, privacy services)
- Certificate Transparency logs (TLS certificates for C2 domains)
- ASN reputation (hosting provider patterns)
- Geographic clustering (nation-state activity)
The Correlation Algorithm
Step 1: Aggregate - Collect signals from all 5 sources simultaneously
Step 2: Cross-Reference - Look for contradictions:
- IP scored 0 by AbuseIPDB but blocked 15 times in production = unique discovery
- IP scored 0 by VirusTotal but matches residential proxy pattern = evasion technique
- ASN claiming "Microsoft Corporation" but hosted in sketchy datacenter = brand weaponization
Step 3: Confidence Scoring - Weight sources based on reliability:
- Production attacks = 40% (we trust our own observations)
- AbuseIPDB reports = 30% (community consensus)
- VirusTotal detections = 20% (vendor diversity)
- ThreatFox C2 match = 10% (malware family confirmation)
Step 4: MITRE ATT&CK Mapping - Auto-map to 27 techniques across 6 tactics
Step 5: Enrichment - Add custom properties:
x_dugganusa_discovery(uniqueness metadata)x_dugganusa_isp_reputation(vendor accountability score)residential_proxyflag (evasion technique indicator)
Result: 244+ threats that billion-dollar vendors missed (63% unique discovery rate)
Why This Works
Traditional Threat Intel: Relies on single sources, misses cross-source contradictions
Our Approach: 5-source simultaneous correlation surfaces unique threats
Example: IP 103.94.108.122 (documented in Hall of Shame)
- AbuseIPDB: 0 (no community reports)
- VirusTotal: 0 (no vendor detections)
- ThreatFox: 0 (not in C2 database)
- Production: 47 attacks blocked (SQL injection, path traversal)
- OSINT: Residential proxy pattern detected (IP rotation, privacy service)
- Verdict: 95% confidence malicious, unique discovery
The Butterbot Vision
Future AI Training: Every event sent to the Brain becomes training data for "Butterbot" - a future AI system trained on real security operations.
Data Collection Endpoints:
/api/ingest/threat-intel- Threat intelligence queries (cache hit/miss)/api/ingest/cloudflare-waf- WAF block events (IP, subnet, ASN)/api/ingest/judge-dredd- Code governance incidents (violations, commendations)
Purpose: Train AI on real security operations - not synthetic datasets, not scraped internet data, but actual production incidents with verified outcomes.
Timeline: 2026+ (need 12-24 months of data before ML training begins)
ISP Reputation Scoring
The Problem: Vendor Accountability
Traditional Approach: Trust all traffic from "reputable" vendors (Microsoft, Palo Alto, Google, Amazon)
Reality: Even trusted vendors have abusive customers. ASN reputation != IP reputation.
The DugganUSA Solution
New API Endpoint: https://analytics.dugganusa.com/api/v1/rules/isp-reputation
Scoring Algorithm:
- Base Score: 100 (perfect reputation)
- Deduction: -1 point per abuse incident from that ASN
- Floor: 0 (cannot go negative)
Azure Table Storage: ISPReputationTable
- Tracks abuse incidents per ASN
- Incremental scoring (real-time updates)
- Historical trending (track reputation over time)
Top 10 Abusers (Current Rankings)
Palo Alto Networks (AS45753) - 50/100 score
- 50 documented abuse incidents
- Predominantly port scanning, reconnaissance
- Pattern: Customers using PAN infrastructure for offensive security without proper controls
Microsoft Corporation (AS8075) - 55/100 score
- 45 documented abuse incidents
- Mix of compromised Azure VMs and customer abuse
- Pattern: Weak abuse controls, slow takedown response
Amazon.com (AS16509) - 62/100 score
- 38 documented abuse incidents
- Mostly EC2 instances used for scanning/attacks
- Pattern: Easy to provision attack infrastructure, minimal verification
Linode (AS63949) - 48/100 score
- 52 documented abuse incidents
- Popular with low-level attackers (cheap VPS)
- Pattern: Minimal KYC, fast provisioning, slow abuse response
DigitalOcean (AS14061) - 51/100 score
- 49 documented abuse incidents
- Similar to Linode (attacker-friendly VPS)
- Pattern: $5/month droplets used for scanning, brute force
6-10: Other cloud providers, VPS hosts, residential ISPs
API Response Format
{
"asn": "AS45753",
"name": "Palo Alto Networks",
"reputation_score": 50,
"abuse_count": 50,
"first_abuse": "2025-09-15T12:34:56.789Z",
"last_abuse": "2025-11-10T08:22:15.432Z",
"abuse_categories": {
"port_scan": 32,
"reconnaissance": 15,
"brute_force": 3
},
"trending": "worsening",
"recommendation": "Monitor closely - high abuse rate from trusted vendor"
}
Use Cases
1. Alert Tuning: Lower alert thresholds for high-reputation ASNs, raise for low-reputation ASNs
2. Vendor Accountability: Share reputation scores with vendors to drive behavior change
3. Risk Assessment: Factor ISP reputation into threat scoring algorithms
4. Contract Negotiations: Use reputation data in vendor selection decisions
The Vendor Accountability Movement
Why This Matters:
Vendors like Palo Alto Networks and Microsoft market themselves as "security companies" but allow customers to abuse their infrastructure with minimal consequences.
Our Goal: Public reputation scoring creates accountability pressure. Vendors with poor scores lose customers, incentivizing better abuse controls.
The Evidence: All 50 Palo Alto incidents are documented with:
- IP addresses (verifiable via WHOIS)
- Attack types (logged in Azure Table Storage)
- Timestamps (immutable audit trail)
- STIX indicators (published in free feed)
Customer Response: "Why would I host security infrastructure on a vendor with a 50/100 reputation score?"
Vendor Response: Forced to improve abuse controls, faster takedowns, better customer vetting
Brand Weaponization Detection
Pattern #32: The Humpty Hump Principle
Definition: ASNs claiming to be reputable brands but actually operating in sketchy datacenters.
Named After: Humpty Hump (Digital Underground) - "People think I'm weird, but I'm not. People think I'm that guy, but I'm not."
The Attack: Attackers register ASNs with names like "Microsoft Corporation" or "Google LLC" to evade detection. Security tools trust the ASN name, ignoring the actual infrastructure.
How We Detect It
The Check: WHOIS data > ASN labels
Step 1: Extract ASN name from BGP routing tables
Step 2: Lookup WHOIS data for IP addresses in that ASN
Step 3: Compare claimed identity vs actual registration:
- Claimed: "Microsoft Corporation"
- Actual: Registered in Seychelles, hosted on budget VPS provider
- Verdict: Brand weaponization detected
New API Endpoint
URL: https://analytics.dugganusa.com/api/v1/rules/brand-weaponization
Response:
{
"asn": "AS12345",
"claimed_name": "Microsoft Corporation",
"actual_registrant": "Privacy Services LLC",
"country": "SC",
"hosting_provider": "CheapVPS.ru",
"weaponization_detected": true,
"confidence": 95,
"evidence": {
"whois_mismatch": true,
"suspicious_country": true,
"known_bulletproof_host": true
},
"recommendation": "Block immediately - ASN impersonation detected"
}
Azure Table Storage
Table: BrandWeaponizationASNs
Current Count: 12 documented ASNs
Columns:
PartitionKey: ASN numberRowKey: Timestamp of detectionClaimedName: What the ASN claims to beActualRegistrant: Who actually owns it (from WHOIS)Country: Registration countryHostingProvider: Actual infrastructure providerEvidenceURL: Link to WHOIS, BGP routing tables, abuse reports
Example: AS394711 "Google LLC"
Claimed: Google LLC (implies trusted infrastructure)
Actual:
- Registered: Seychelles
- Hosting: Unknown budget provider
- WHOIS: Privacy service (no Google affiliation)
- BGP Routes: Single /24 subnet (Google operates thousands)
Attacks Observed:
- Port scanning (22, 3389, 445 - SSH, RDP, SMB)
- Brute force attempts (WordPress, cPanel, SSH)
- C2 callback infrastructure
Confidence: 98% (multiple evidence points)
Action: Blocked at Cloudflare WAF, published in STIX feed, reported to abuse.ch
The Impact
Before Pattern #32: Security tools trusted "Google LLC" ASN, allowed traffic
After Pattern #32: WHOIS verification catches imposters, prevents evasion
False Positive Rate: 0% (12 detections, 12 confirmed imposters, 0 legitimate)
False Negative Rate: Unknown (but likely high - need more data)
Residential Proxy Detection
The Evasion Technique
Traditional Proxies: Datacenter IPs (easy to block)
Residential Proxies: Legitimate home/mobile IPs (hard to distinguish from real users)
The Problem: Attackers use residential proxy services (Bright Data, Oxylabs, Smartproxy) to rotate through millions of real residential IPs, evading IP-based blocking.
5 Attack Patterns Identified
Azure Table Storage: ResidentialProxyPatterns
Pattern 1: Rapid Geo-Switching
- Same session, IPs from 5+ countries within minutes
- Real users don't VPN-hop mid-session
- Confidence: 85%
Pattern 2: Datacenter ASN + Residential WHOIS
- IP claims to be residential (Comcast, AT&T, Verizon)
- But ASN is datacenter (Hetzner, OVH, DigitalOcean)
- Indicates proxy service buying residential IP space
- Confidence: 92%
Pattern 3: High Request Rate from "Home" IP
- 100+ requests/minute from single IP
- Real home users average 5-10 requests/minute
- Confidence: 78%
Pattern 4: User-Agent Mismatch
- IP geo-location says China
- User-Agent says "en-US" with California timezone
- Confidence: 70%
Pattern 5: TLS Fingerprint Mismatch
- Residential IP but datacenter TLS fingerprint
- Browser TLS != infrastructure TLS
- Confidence: 88%
New STIX Property
Field: residential_proxy (boolean)
Added To: STIX indicator objects when patterns detected
Example:
{
"type": "indicator",
"pattern": "[ipv4-addr:value = '203.45.67.89']",
"confidence": 85,
"residential_proxy": true,
"x_dugganusa_discovery": {
"unique_detection": true,
"patterns_matched": ["rapid_geo_switching", "high_request_rate"],
"proxy_service_suspected": "Bright Data or Oxylabs"
}
}
New Feed Parameter
Parameter: exclude_residential (boolean)
Usage:
# Exclude residential proxies (reduce false positives)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?exclude_residential=true&min_confidence=70"
# Include residential proxies (aggressive detection)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?exclude_residential=false&min_confidence=85"
Default: false (include residential proxies, let customer decide)
Why This Matters
Cost of Residential Proxies:
- Bright Data: $500-$15,000/month (depending on GB usage)
- Oxylabs: $300-$10,000/month
- Smartproxy: $75-$2,000/month
Implication: Attackers using residential proxies are well-funded or professionals, not script kiddies.
Detection Value: Identifying residential proxy usage indicates sophisticated adversary, warrants elevated threat priority.
Enhanced MITRE ATT&CK Coverage
The Expansion: 4 Techniques → 27 Techniques
Before Issue #212: 4 techniques mapped manually
- T1071: Application Layer Protocol
- T1090: Proxy
- T1595.001: Active Scanning - Scanning IP Blocks
- T1598.003: Phishing for Information - Spearphishing Link
After Issue #212: 27 techniques auto-mapped across 6 tactics
How: 25 auto-mapping rules in Azure Table Storage (MITREMappingRules)
The 6 Tactics Covered
1. Reconnaissance (5 techniques)
- T1595.001: Active Scanning - Scanning IP Blocks (port scans)
- T1595.002: Active Scanning - Vulnerability Scanning (Nmap, Nessus signatures)
- T1598: Phishing for Information (email harvesting)
- T1598.003: Spearphishing Link (targeted phishing)
- T1589: Gather Victim Identity Information (OSINT)
2. Resource Development (3 techniques)
- T1583.001: Acquire Infrastructure - Domains (C2 domains)
- T1583.003: Acquire Infrastructure - Virtual Private Server (VPS abuse)
- T1584.004: Compromise Infrastructure - Server (compromised servers as C2)
3. Initial Access (4 techniques)
- T1190: Exploit Public-Facing Application (web app attacks)
- T1133: External Remote Services (RDP, SSH brute force)
- T1078: Valid Accounts (credential stuffing)
- T1566: Phishing (email-based initial access)
4. Execution (2 techniques)
- T1059.001: Command and Scripting Interpreter - PowerShell
- T1059.004: Command and Scripting Interpreter - Unix Shell
5. Command and Control (9 techniques)
- T1071.001: Application Layer Protocol - Web Protocols (HTTP/HTTPS C2)
- T1071.004: Application Layer Protocol - DNS (DNS tunneling)
- T1090: Proxy (multi-hop proxies)
- T1090.001: Proxy - Internal Proxy
- T1090.002: Proxy - External Proxy
- T1090.003: Proxy - Multi-hop Proxy
- T1573.001: Encrypted Channel - Symmetric Cryptography
- T1573.002: Encrypted Channel - Asymmetric Cryptography
- T1095: Non-Application Layer Protocol (raw socket C2)
6. Exfiltration (4 techniques)
- T1041: Exfiltration Over C2 Channel
- T1048: Exfiltration Over Alternative Protocol
- T1048.003: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
- T1567: Exfiltration Over Web Service
Auto-Mapping Rules
Azure Table Storage: MITREMappingRules (25 rules)
Example Rule:
{
"PartitionKey": "port_scan",
"RowKey": "1",
"AttackPattern": "tcp_syn_scan",
"Ports": "22,80,443,3306,3389,445",
"Technique": "T1595.001",
"TechniqueName": "Active Scanning: Scanning IP Blocks",
"Confidence": 95,
"Tactic": "Reconnaissance"
}
Mapping Logic:
- Detect attack pattern in production logs (e.g., port scan on 22, 3389, 445)
- Lookup pattern in
MITREMappingRulestable - Match attack signature to MITRE technique
- Add
kill_chain_phasesto STIX indicator - Publish in feed with auto-mapped technique
Coverage Comparison
DugganUSA: 27 techniques (575% increase from 4)
Competitors:
- Recorded Future: ~50 techniques (but $80K/year)
- Anomali ThreatStream: ~40 techniques (but $50K/year)
- AlienVault OTX: ~20 techniques (free, but lower confidence)
Our Advantage: 27 techniques at FREE tier (Starter tier: $45/month adds more)
Kill Chain Visualization
STIX Format:
{
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "reconnaissance"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
}
]
}
Customer Use Case: Import into SIEM (Splunk, Sentinel, Cortex) for kill chain visualization dashboards
How to Use the Feed
Quick Start (3 Steps)
1. Test the feed:
curl -H "Authorization: Bearer <YOUR_API_KEY>" https://analytics.dugganusa.com/api/v1/stix-feed | jq
2. Choose your integration method:
- Native STIX 2.1 import (CrowdStrike, Palo Alto Cortex, Microsoft Sentinel, Splunk, Wiz)
- Custom script (Python, Node.js, PowerShell)
- Manual download (scheduled task)
3. Configure update frequency:
- Recommended: Hourly (real-time threat updates)
- Minimum: Daily (for low-volume environments)
- Maximum: Every 15 minutes (aggressive protection)
Feed Parameters
Customize the feed for your environment:
# High confidence for prevention policies (automated blocking)
https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90
# Detection mode for broader coverage (alerting only)
https://analytics.dugganusa.com/api/v1/stix-feed?days=30&min_confidence=60
# All indicators (90 days)
https://analytics.dugganusa.com/api/v1/stix-feed?days=90
# Geo-specific threats
https://analytics.dugganusa.com/api/v1/stix-feed?country=CN&min_confidence=70
https://analytics.dugganusa.com/api/v1/stix-feed?country=RU&min_confidence=70
# Unique discoveries only (threats missed by major vendors)
https://analytics.dugganusa.com/api/v1/stix-feed?unique_only=true&min_confidence=80
STIX 2.1 Structure
Bundle format:
{
"type": "bundle",
"id": "bundle--dugganusa-{timestamp}",
"objects": [
{
"type": "identity",
"id": "identity--dugganusa-llc-f4a8c3d2-1b9e-4f7a-8c2d-9e3f5b6a7c8d",
"name": "DugganUSA LLC",
"identity_class": "organization",
"created": "2024-01-01T00:00:00.000Z"
},
{
"type": "indicator",
"id": "indicator--{uuid}",
"created": "2025-11-13T00:00:00.000Z",
"modified": "2025-11-13T00:00:00.000Z",
"name": "Malicious IP {address}",
"pattern": "[ipv4-addr:value = '{address}']",
"pattern_type": "stix",
"valid_from": "2025-11-13T00:00:00.000Z",
"indicator_types": ["malicious-activity"],
"confidence": 95,
"created_by_ref": "identity--dugganusa-llc-f4a8c3d2-1b9e-4f7a-8c2d-9e3f5b6a7c8d",
"external_references": [
{
"source_name": "AbuseIPDB",
"url": "https://www.abuseipdb.com/check/{address}",
"description": "Community abuse reports"
}
],
"x_dugganusa_discovery": {
"unique_detection": true,
"sources_with_zero_score": ["VirusTotal", "ThreatFox"],
"correlation_confidence": 95,
"first_seen": "2025-11-10T12:34:56.789Z",
"last_seen": "2025-11-13T08:22:15.432Z",
"attack_count": 47,
"blocked_automatically": true
},
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "command-and-control"
}
]
}
]
}
Custom Fields Explained
x_dugganusa_discovery: Our proprietary discovery metadata
unique_detection- Boolean, true if this threat was missed by major vendorssources_with_zero_score- Array of vendor names that scored this as benigncorrelation_confidence- 0-100 score based on multi-source correlationfirst_seen- Timestamp of first attack detectedlast_seen- Timestamp of most recent attackattack_count- Number of attacks observedblocked_automatically- Boolean, true if auto-blocker triggered
Vendor Integration Guides
We've published comprehensive integration guides for major security platforms:
Published Guides (November 13, 2025)
- CrowdStrike Falcon - FQL queries, IOC management, threat hunting
- Palo Alto Cortex XDR - XQL queries, BIOC rules, AutoFocus integration
- Microsoft Sentinel - KQL queries, Logic Apps, analytic rules, workbooks
- Splunk Enterprise Security - SPL queries, correlation searches, threat intelligence framework
- Wiz Cloud Security - WQL queries, cloud automation (AWS, Azure, GCP), CSPM integration
Access guides: https://www.dugganusa.com/blog (search "STIX 2.1 Feed")
Example: CrowdStrike FQL Query
-- Find communications with high-confidence threats
event_simpleName=NetworkConnectIP4
| lookup threat_intel ip_address as RemoteAddressIP4
| where threat_intel.confidence >= 80
| where threat_intel.x_dugganusa_discovery.unique_detection=true
| stats count by ComputerName, RemoteAddressIP4, threat_intel.name
Example: Microsoft Sentinel KQL Query
// Correlate with network traffic
let DugganThreats = ThreatIntelligenceIndicator
| where SourceSystem == "DugganUSA LLC"
| where Active == true
| project NetworkIP, Confidence, ThreatType;
CommonSecurityLog
| join kind=inner DugganThreats on $left.DestinationIP == $right.NetworkIP
| project TimeGenerated, SourceIP, DestinationIP, Confidence, ThreatType, DeviceAction
How to Become a Customer
Free vs Paid Tiers
Free STIX Feed (Current Offering):
- ✅ 244+ unique discoveries
- ✅ STIX 2.1 bundle format
- ✅ Hourly updates
- ✅ MITRE ATT&CK mapping
- ✅ No authentication required
- ✅ No rate limits
- ✅ Public domain license (CC0-1.0)
Paid Tiers (Coming Soon):
Starter Tier: $45/month
- Everything in Free tier
- ✅ 1,000 queries/day
- ✅ 3 indexes
- ✅ Community support
Break-even: 2 customers @ $45/month ($90/month revenue vs $75/month infrastructure cost)
Researcher Tier: $145/month
- Everything in Starter tier
- ✅ 2,000 queries/day
- ✅ 5 indexes
- ✅ EFTA export
- ✅ Email support
Professional Tier: $495/month
- Everything in Researcher tier
- ✅ 5,000 queries/day
- ✅ 15 indexes
- ✅ Cross-index correlation
- ✅ Semantic similarity search
- ✅ Priority support
Gov / Press Tier: $995/month
- Everything in Professional tier
- ✅ 25,000 queries/day
- ✅ ALL indexes (37+)
- ✅ 99.5% SLA
Enterprise / Medusa Tier: $2,495/month
- Everything in Gov / Press tier
- ✅ 50,000 queries/day
- ✅ Full Medusa Suite
- ✅ DLP + bulk screening
- ✅ Investigation endpoints (14 routes)
- ✅ 99.9% SLA
- ✅ Direct Slack channel
Capacity: ~300 customers on current infrastructure ($70-80/month)
Revenue at capacity:
- Starter tier: 300 × $45 = $13,500/month
- Professional tier: 300 × $495 = $148,500/month
- Enterprise tier: 300 × $2,495 = $748,500/month
Custom On-Premises: Contact Sales
Contact us for:
- On-premise deployment
- Dedicated infrastructure
- Custom integration development
- SLA guarantees (99.9% uptime)
- 24/7 support
- Threat hunting services
- Incident response retainer
Email: [email protected]
How to Sign Up
Currently: Free feed available now (no signup required)
Paid tiers: Launching Q1 2026
Early access waitlist: Email [email protected] with:
- Company name
- Use case (SIEM, EDR, SOAR, firewall, etc.)
- Desired tier (Conservative, Standard, Aggressive)
- Current threat intelligence vendors (if any)
We'll notify you when paid tiers launch with 50% discount for first 3 months (early adopter pricing).
Pricing & Tiers
Philosophy: Evidence-Based Pricing
We price based on actual infrastructure costs + value delivered, not "what the market will bear."
Current infrastructure: $75/month (Azure Container Apps, Cloudflare Pro, Key Vault)
Unit economics:
- Break-even: 2 customers @ $45/month
- Capacity: ~300 customers before needing to scale infrastructure
- Scaling cost: +$50/month per 100 additional customers (linear scaling)
Comparison to Competitors
Recorded Future: $80,000/year ($6,667/month) - Enterprise only Anomali ThreatStream: $50,000/year ($4,167/month) - SMB minimum ThreatConnect: $30,000/year ($2,500/month) - Team license AlienVault OTX: FREE (community-driven, but lower confidence scores)
DugganUSA Starter: $45/month ($420/year) — DugganUSA Enterprise: $2,495/month ($29,940/year) - 63% cheaper than nearest paid competitor
Why we can be cheaper:
- Born Without Sin - Zero legacy debt, modern architecture
- Azure Container Apps - Serverless scaling, pay-per-use
- Automation - Judge Dredd handles compliance, deployment, quality checks
- Democratic Sharing - Free tier drives adoption, paid tiers fund infrastructure
Configurable Threshold Pricing (Future)
The Lever: Auto-blocking threshold (confidence score)
- Starter (>10): Fewer false positives, misses some threats - $45/month
- Professional (>7): Recommended for most customers - $495/month
- Enterprise (>5): Catch everything, full suite - $2,495/month
The Math: Higher thresholds require more compute (correlation analysis, OSINT checks, confidence scoring). Lower thresholds = faster blocking, less analysis.
Customer choice: Pick your risk tolerance, pay accordingly.
Seed Funding Opportunities
Current Status: Bootstrapped
Founded: 2024 (DugganUSA LLC, Minnesota) Revenue: $0 (free tier only) Infrastructure Cost: $75/month Funding: Self-funded (Patrick Duggan, Founder)
Why We're Seeking Seed Funding
1. Accelerate Product Development
- Build paid tier infrastructure (authentication, billing, custom feeds)
- Develop enterprise features (on-premise, white-label, API expansion)
- Hire 1-2 engineers (backend + security)
2. Scale Marketing & Sales
- Attend security conferences (RSA, Black Hat, DEF CON)
- Content marketing (more blog posts, whitepapers, case studies)
- Partner with MSSPs, consultants, VARs
3. Expand Threat Intelligence Sources
- Add commercial threat feeds (complement our free discovery)
- Develop custom crawlers (botnet tracking, darknet monitoring)
- Build ML models (anomaly detection, behavioral analysis)
Funding Target: $500K Seed Round
Use of Funds:
- $200K - Engineering (2 FTEs, 12 months)
- $150K - Marketing & Sales (conferences, content, partnerships)
- $100K - Infrastructure (scale to 1,000+ customers)
- $50K - Legal & Compliance (SOC2 certification, contracts)
Milestones:
- Month 3: Launch paid tiers (Conservative, Standard, Aggressive)
- Month 6: 100 paying customers ($5K-$10K MRR)
- Month 12: 500 paying customers ($25K-$50K MRR), SOC2 certified
What You Get
Equity: 10-15% (negotiable based on terms, valuation, investor value-add)
Valuation: $3M-$5M pre-money (bootstrapped traction + 90+ patents documented)
Board Seat: Available for lead investor ($250K+)
Advisory Role: Available for strategic investors (security industry expertise, MSSP partnerships, channel distribution)
The Competitive Moat
1. 244 Unique Discoveries (63% Rate)
- Provable differentiation (receipts for every indicator)
- Continuous discovery (production security operations generate new threats daily)
2. 90+ Patents Documented
- Judge Dredd 6D Framework (compliance automation)
- Pattern #32 (AI bot verification: WHOIS > labels)
- Drone → Brain Architecture (cost-optimized compute distribution)
- Azure Table Storage Creative Patterns (12 documented)
3. Born Without Sin Architecture
- Zero legacy debt (built from scratch in 2024)
- 81% SOC1 compliance at $75/month (vs $77K/month enterprise)
- 30x development velocity (ADOY methodology)
4. Democratic Sharing Law
- 99.5% public sharing (4,780 files tracked)
- 7.1x evidence-to-claims ratio
- Radical transparency builds trust (free tier proves quality)
5. Cost Advantage
- $45/month entry price (63% cheaper than nearest competitor at Enterprise tier)
- $75/month infrastructure cost (97% cheaper than typical $5K/month)
- Linear scaling (+$50/month per 100 customers)
The Team
Patrick Duggan - Founder & CEO
- DARPA/OSD partnership (1996-2000) with Paul Galjan (Randy/Dwarf + Avi/King roles)
- 90+ patents documented ($153M-$512M ARR potential)
- 30x development velocity (Claude Code + Full Bono methodology)
- Security operations experience (blocked 244 unique threats, caught Krebs attacker)
Paul Galjan - Strategic Advisor (Avi/King)
- DARPA/OSD 1996-2000 (Randy/Dwarf + Avi/King partnership)
- Pattern #18 documented (Creative Monetization via Absurdist Confidence)
- Partnership email sent Nov 4, 2025
Claude Code (Anthropic) - Development Partner
- 30x velocity multiplier (Full Bono sessions: 2-4 hours, 6,000+ lines)
- Judge Dredd agent (compliance automation, quality enforcement)
- Evidence generation (7.1x ratio)
The Market
TAM (Total Addressable Market):
- 50,000+ enterprises with dedicated security teams
- $10B threat intelligence market (2024)
- Growing 15% annually
SAM (Serviceable Addressable Market):
- 10,000 SMBs with 10-100 employee security teams
- $2B segment (budget-conscious buyers)
- Current vendors: ThreatConnect ($2,500/month), Anomali ($4,167/month)
SOM (Serviceable Obtainable Market):
- 1,000 customers in first 3 years (conservative)
- $45-$2,495/month price point
- $540K-$29.9M ARR at 1,000 customers
How to Invest
Contact: [email protected]
Pitch Deck: Available upon request (includes financial projections, product roadmap, competitive analysis)
Due Diligence Materials:
- Git commit history (verifiable 30x velocity claims)
- Azure billing receipts ($75/month infrastructure)
- Judge Dredd 6D verification (92% overall score)
- Blog corpus (70 posts published, www.dugganusa.com)
- Whitepapers (8 published, 230-280 pages total)
Investor Updates: Monthly (email + Slack channel)
Investment Timeline
Now - January 2026: Seed round open ($500K target) February 2026: Round closes, funds deployed March 2026: Paid tiers launch June 2026: 100 paying customers milestone December 2026: Series A fundraise ($2M-$5M, scale to 5,000+ customers)
Democratic Sharing Law
The Philosophy: Wu-Tang Financial
Core Belief: Digital goods have zero marginal cost to share. Hoarding them creates no economic value.
The Aristocrats Standard: Admit mistakes, show receipts, thank those wronged, fix publicly.
Evidence-Based Ethics: Ethics are measurable. 99.5% public sharing is provable. Zero hoarding is verifiable.
Why 99.5% Public Matters
Traditional Threat Intel: Paywalled, siloed, zero transparency
Our Approach: Radical transparency proves quality
The Numbers:
- 4,780 files tracked (git repository, blog corpus, whitepapers, code, evidence)
- 4,756 files public (99.5% sharing rate)
- 24 files excluded (secrets, API keys, credentials only)
- 1,011 files excluded total (including .git internal files, node_modules, build artifacts)
- 7.1x evidence-to-claims ratio (we show receipts for everything)
What We Share Publicly:
- 244+ unique threat discoveries (STIX 2.1 feed, zero authentication required)
- 5-source correlation methodology (algorithm documented in this whitepaper)
- ISP reputation scores (Palo Alto: 50/100, Microsoft: 55/100)
- Brand weaponization detections (12 documented ASN imposters)
- Residential proxy patterns (5 attack patterns identified)
- 27 MITRE ATT&CK techniques (auto-mapping rules in Azure Table Storage)
- 90+ patents documented (Pattern #32, Drone→Brain, 6D Framework, etc.)
- Git commit history (verifiable 30x development velocity claims)
- Azure billing receipts ($75/month infrastructure costs)
- Judge Dredd compliance scans (92% overall score, 6D verification)
What We Don't Share:
- Azure subscription keys
- Key Vault secrets (API keys, connection strings)
- Customer data (none yet - free tier only)
- Strategic competitive analysis (until execution complete)
5-Source Correlation Intelligence (Public Methodology)
Why Share Our Secret Sauce?
Because copying our feed doesn't replicate our execution speed. The moat is 30x development velocity + continuous discovery from production operations, not hoarding data.
What Competitors Would Need to Replicate:
- Real production infrastructure under active attack (not synthetic data)
- 5-source simultaneous correlation (AbuseIPDB + VirusTotal + ThreatFox + production logs + OSINT)
- Cloudflare Pro for real-time auto-blocking ($20/month)
- Azure Container Apps for scalable correlation compute ($15/month)
- Judge Dredd for quality enforcement (custom-built agent)
- 30x development velocity (Claude Code + Full Bono methodology)
- Time (12+ months to accumulate 244+ unique discoveries)
Result: Publishing our methodology increases trust faster than competitors can replicate execution.
Our Metrics (Judge Dredd Dimension 6)
Current Score: 78/95
Breakdown:
- Hoarding: 95/95 (99.5% public - 4,780 files tracked, 1,011 excluded for secrets/keys)
- Transparency: 95/95 (15 incident files, 149 GitHub issues, public post-mortems)
- Gratitude: 9/95 (33 instances - algorithm needs tuning, should be per-incident not per-file)
- Accessibility: 95/95 (99.9% open formats - markdown, JSON, no proprietary formats)
- Trust Arbitrage: 95/95 (7.1x evidence-to-claims ratio - we show receipts)
- Armor Polishing: 80/95 (119/149 incidents fixed - 20% technical debt acknowledged)
Verification: node scripts/democratic-sharing-audit.js
Evidence: compliance/evidence/democratic-sharing/audit-YYYYMMDD.json
Why This Matters
For Customers:
- Free tier proves quality (you can evaluate before buying)
- Public evidence proves claims (244 unique discoveries are verifiable)
- Open source methodology (STIX 2.1, MITRE ATT&CK, OSINT techniques)
For Investors:
- Verifiable metrics (7.1x evidence ratio, 99.5% public sharing)
- Defensible IP (patents + execution speed, not secret sauce)
- Trust arbitrage (radical transparency attracts customers)
For Competitors:
- We publish openly because we're confident in our discoveries
- Copying our feed doesn't replicate our correlation methodology
- 30x development velocity is the moat, not data hoarding
The Free Feed Strategy
Phase 1 (Now): Free STIX feed builds trust + adoption Phase 2 (Q1 2026): Paid tiers add custom feeds, real-time streaming, API access Phase 3 (Q2 2026): Enterprise tier adds white-label, on-premise, SLA guarantees
Free tier stays free forever. It's the proof point.
Technical Specifications
Feed Endpoints
1. STIX 2.1 Feed (Primary)
URL: https://analytics.dugganusa.com/api/v1/stix-feed
Method: GET
Authentication: API Key Required (March 15, 2026)
Rate Limits: None (reasonable use expected)
Response Format: JSON (STIX 2.1 Bundle)
Content-Type: application/json
CORS: Enabled (cross-origin requests allowed)
2. ISP Reputation API (New in Issue #212)
URL: https://analytics.dugganusa.com/api/v1/rules/isp-reputation
Method: GET
Authentication: API Key Required (March 15, 2026)
Response: JSON array of ISP reputation scores
Parameters:
asn(optional) - Filter by specific ASN (e.g.,?asn=AS45753)min_score(optional) - Filter by minimum reputation score (e.g.,?min_score=60)top(optional) - Return top N abusers (e.g.,?top=10)
3. Brand Weaponization API (New in Issue #212)
URL: https://analytics.dugganusa.com/api/v1/rules/brand-weaponization
Method: GET
Authentication: API Key Required (March 15, 2026)
Response: JSON array of detected ASN imposters
Parameters:
asn(optional) - Check specific ASN (e.g.,?asn=AS12345)
4. Residential Proxy Detection (Integrated into STIX Feed)
Accessed via: STIX feed parameter exclude_residential
STIX Feed Parameters
| Parameter | Type | Description | Default | Example | New in #212 |
|---|---|---|---|---|---|
days |
Integer | Number of days to look back | 30 | ?days=7 |
No |
min_confidence |
Integer | Minimum confidence score (0-100) | 30 | ?min_confidence=85 |
Yes (changed from 0→30) |
country |
String | ISO 3166-1 alpha-2 country code | All | ?country=CN |
No |
unique_only |
Boolean | Only return unique discoveries | false | ?unique_only=true |
No |
mitre_technique |
String | Filter by MITRE ATT&CK technique | All | ?mitre_technique=T1071 |
No |
exclude_residential |
Boolean | Exclude residential proxy indicators | false | ?exclude_residential=true |
Yes (new) |
Example Requests
# Basic request (default: 30 days, confidence >= 70)
curl -H "Authorization: Bearer <YOUR_API_KEY>" https://analytics.dugganusa.com/api/v1/stix-feed
# High confidence only (90+ confidence, last 7 days)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90"
# Unique discoveries (threats missed by major vendors)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?unique_only=true&min_confidence=80"
# China-origin threats (last 30 days)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?country=CN&min_confidence=70"
# Specific MITRE technique (Command and Control)
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?mitre_technique=T1071"
# Combined filters
curl -H "Authorization: Bearer <YOUR_API_KEY>" "https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90&unique_only=true&country=RU"
Python Example
#!/usr/bin/env python3
import requests
import json
# Fetch feed
feed_url = "https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90"
response = requests.get(feed_url)
stix_bundle = response.json()
# Process indicators
for obj in stix_bundle.get('objects', []):
if obj.get('type') == 'indicator':
ip = obj.get('pattern', '').split("'")[1]
confidence = obj.get('confidence', 0)
unique = obj.get('x_dugganusa_discovery', {}).get('unique_detection', False)
print(f"IP: {ip} | Confidence: {confidence} | Unique: {unique}")
# Extract sources that missed this threat
if unique:
missed = obj.get('x_dugganusa_discovery', {}).get('sources_with_zero_score', [])
print(f" Missed by: {', '.join(missed)}")
Node.js Example
const https = require('https');
const feedUrl = 'https://analytics.dugganusa.com/api/v1/stix-feed?days=7&min_confidence=90';
https.get(feedUrl, (res) => {
let data = '';
res.on('data', chunk => data += chunk);
res.on('end', () => {
const stixBundle = JSON.parse(data);
stixBundle.objects
.filter(obj => obj.type === 'indicator')
.forEach(indicator => {
const ip = indicator.pattern.split("'")[1];
const confidence = indicator.confidence;
const unique = indicator.x_dugganusa_discovery?.unique_detection || false;
console.log(`IP: ${ip} | Confidence: ${confidence} | Unique: ${unique}`);
if (unique) {
const missed = indicator.x_dugganusa_discovery.sources_with_zero_score || [];
console.log(` Missed by: ${missed.join(', ')}`);
}
});
});
});
Feed Update Frequency
Production auto-blocking: Real-time (threats blocked as attacks occur)
Feed updates: Every 15 minutes (batch processing)
Recommended polling: Hourly (balance freshness vs API load)
Cache headers:
Cache-Control: public, max-age=900(15 minutes)Last-Modifiedheader included
Performance
Response time: <500ms (95th percentile)
Response size: ~50KB-500KB (depends on parameters)
Uptime: 99.9% target (monitored via status.dugganusa.com)
CDN: Cloudflare (global edge caching)
Feed Health Endpoint
# Check feed health
curl -H "Authorization: Bearer <YOUR_API_KEY>" https://analytics.dugganusa.com/api/v1/stix-feed/info
# Response
{
"status": "healthy",
"last_update": "2025-11-13T15:30:00.000Z",
"indicator_count": 244,
"unique_discoveries": 157,
"sources": ["AbuseIPDB", "VirusTotal", "ThreatFox", "Production Logs", "OSINT"],
"mitre_techniques": ["T1071", "T1090", "T1595.001", "T1598.003", "T1589"],
"confidence_distribution": {
"90-100": 89,
"80-89": 67,
"70-79": 45,
"60-69": 43
}
}
Support & Contact
General Inquiries
Email: [email protected] Website: https://security.dugganusa.com Blog: https://www.dugganusa.com/blog Status Page: https://status.dugganusa.com
Sales & Partnerships
Email: [email protected] (paid tiers, enterprise, MSSP partnerships) Email: [email protected] (seed funding, strategic partnerships)
Technical Support
Feed Issues: [email protected] Integration Help: Check vendor-specific guides on www.dugganusa.com/blog API Questions: Email with "API Support" in subject line
Social Media
LinkedIn: Search "DugganUSA LLC" or "Patrick Duggan Minnesota" GitHub: Check for public repos (Judge Dredd agent, whitepapers) X/Twitter: @DugganUSA (coming soon)
Press & Media
Email: [email protected] Media Kit: Available upon request (logos, screenshots, founder bio)
Bug Bounty Program
Scope: STIX feed API, security.dugganusa.com, analytics.dugganusa.com Out of Scope: www.dugganusa.com (Wix-hosted), status.dugganusa.com (monitoring only)
Rewards:
- Critical: $500 (RCE, authentication bypass, data breach)
- High: $250 (SSRF, XSS, SQL injection)
- Medium: $100 (CSRF, information disclosure)
- Low: $25 (minor issues, acknowledgment)
Rules:
- Report privately to [email protected]
- Give us 90 days to fix before public disclosure
- Don't attack our infrastructure (DoS, brute force)
- Don't access customer data
- Don't social engineer our team
Hall of Fame: Published on security.dugganusa.com (with permission)
Appendix A: MITRE ATT&CK Techniques
Indicators in our feed are mapped to these techniques:
| Technique | Name | Description |
|---|---|---|
| T1071 | Application Layer Protocol | C2 communication over HTTP/HTTPS |
| T1090 | Proxy | Multi-hop proxies, residential proxies |
| T1595.001 | Active Scanning: Scanning IP Blocks | Port scanning, service enumeration |
| T1598.003 | Phishing for Information: Spearphishing Link | Targeted reconnaissance |
| T1589 | Gather Victim Identity Information | Email harvesting, OSINT |
Appendix B: Confidence Scoring Methodology
How we calculate confidence (0-100):
AbuseIPDB Reports (40% weight)
- 100+ reports = +40 points
- 50-99 reports = +30 points
- 10-49 reports = +20 points
- 1-9 reports = +10 points
VirusTotal Detections (30% weight)
- 10+ vendors = +30 points
- 5-9 vendors = +20 points
- 1-4 vendors = +10 points
- 0 vendors = 0 points
ThreatFox C2 Match (20% weight)
- Active C2 = +20 points
- Historical C2 = +10 points
- No match = 0 points
Production Attacks (10% weight)
- 10+ attacks = +10 points
- 5-9 attacks = +8 points
- 1-4 attacks = +5 points
Adjustments:
- Residential Proxy Bonus: +10 points (evasion technique)
- Nation-State ASN Penalty: -5 points (false positives from legitimate government activity)
- Known Good IP Penalty: -20 points (Google DNS, Cloudflare, etc.)
Unique Discovery Threshold: Confidence >= 70 AND all major vendors score as 0
Appendix C: Version History
Version 2.0.0 (November 21, 2025) - Issue #212 Brain Intelligence Integration
- Added Central Brain Architecture documentation (Drone→Brain Pattern #30)
- Expanded 5-source correlation intelligence methodology
- Added ISP Reputation Scoring section (vendor accountability, top 10 abusers)
- Added Brand Weaponization Detection section (Pattern #32, 12 ASNs documented)
- Added Residential Proxy Detection section (5 patterns identified)
- Added Enhanced MITRE ATT&CK Coverage section (4→27 techniques, 575% increase)
- Updated Democratic Sharing Law (emphasized 99.5% public, Wu-Tang Financial)
- Updated Technical Specifications (3 new API endpoints)
- Changed default
min_confidencefrom 0 to 30 (removes 279 low-confidence IPs) - Added
exclude_residentialparameter to STIX feed - Added new STIX custom properties:
x_dugganusa_isp_reputation,residential_proxy
Version 1.0.0 (November 13, 2025)
- Initial publication
- Free STIX 2.1 feed documentation
- 5 vendor integration guides (CrowdStrike, Cortex, Sentinel, Splunk, Wiz)
- Seed funding section added
- Democratic Sharing Law codified
Appendix D: Legal & Compliance
License: CC0-1.0 (Public Domain) Liability: No warranty, use at your own risk (standard threat intelligence disclaimer) Privacy: No personal data collection, no tracking, no cookies on feed endpoint GDPR: Compliant (public threat indicators only, no EU personal data) CCPA: Compliant (no California consumer data) SOC2: In progress (81% compliance, Q2 2026 certification target)
Terms of Use:
- Use the feed for security purposes
- Don't resell our feed without permission (white-label licensing available)
- Attribution appreciated but not required
- No warranty or liability (we do our best, but false positives happen)
Appendix E: Acknowledgments
Built with:
- Claude Code (Anthropic) - 30x development velocity partner
- Azure Container Apps - Serverless container hosting
- Cloudflare Pro - CDN + DDoS protection
- AbuseIPDB - Community threat reports
- VirusTotal - Malware analysis
- ThreatFox - C2 infrastructure tracking
Inspired by:
- Brian Krebs (KrebsOnSecurity.com) - Investigative journalism standard
- MITRE Corporation - ATT&CK framework
- OASIS Open - STIX 2.1 specification
- OpenAI - GPTBot transparency (published IP ranges)
Special Thanks:
- Paul Galjan - Strategic Advisor (DARPA/OSD partnership, Avi/King role)
- Anthropic - Constitutional AI research (ethical AI development)
- Minnesota tech community - Silicon Prairie support
📋 Generated with Claude Code - Demonstrating 30x Development Velocity
Co-Authored-By: Claude (Anthropic) + Patrick Duggan (DugganUSA LLC)
Verification: This documentation is verifiable through git commit history, Azure Table Storage audit logs, and Judge Dredd compliance scans.
Last Updated: November 21, 2025 Watermark Version: 2.0.0 Judge Dredd Verified: ✅ (6D score: 92%) Issue #212: Brain Intelligence Integration Complete
Your security is our problem now.
— DugganUSA LLC (Minnesota)
Powered by Central Brain Architecture - 244+ unique discoveries through 5-source correlation intelligence