top of page

I Tracked Who's Consuming Our Free Threat Intel Feed. The Results Got Creepy.

  • Writer: Patrick Duggan
    Patrick Duggan
  • Nov 22, 2025
  • 8 min read

What Happens When You Build a Free STIX Feed and Actually Look at Who's Using It


MINNEAPOLIS, November 22, 2025 — Two hours ago, I published a blog post celebrating that Microsoft, Google, and Cloudflare were consuming our free STIX threat intelligence feed.


Then someone asked: "Are you sure those aren't just tenants in those clouds? Did you check the DNS?"


I checked.


Microsoft was real. Google was a search crawler. Cloudflare was me testing my own dashboard.


So I added noise filtering to the analytics script and re-ran the analysis. Then I went full OSINT on the 4 real consumers.


What I found was... unsettling.


The Correction: What's Actually Real



• 21 unique IPs

• "Microsoft, Google, Cloudflare consuming our feed!"

• 103 requests, 48,002 indicators served


After Filtering (What's Actually Real): ``` Total Unique IPs: 21 ✅ Real Consumers: 4 (19.0%) 🔁 Self-Referential: 8 (38.1%) — My own dashboard 🤖 Search Crawlers: 3 (14.3%) — googlebot, msnbot 🧪 Testing Traffic: 6 (28.6%) — Me testing with curl ```


The 4 Real Consumers: 1. Microsoft 172.168.195.241 (Des Moines, Iowa) - 28 requests 2. Microsoft 9.169.121.184 (Washington, Virginia) - 1 request (BLOCKED) 3. Verizon Residential 108.35.157.59 (Dumont, New Jersey) - 1 request 4. Google Fiber Residential (Raleigh, North Carolina) - 1 request


So I did what any security professional would do: I went full stalker mode on these 4 IPs.




🎯 Consumer #1: The Automated Beast (Microsoft Des Moines)


IP: 172.168.195.241 Location: Des Moines, Iowa (Azure Central US Datacenter) Organization: AS8075 Microsoft Corporation User-Agent: `node` (Node.js script) Status: PRODUCTION INTEGRATION


What They're Doing


This isn't someone testing our feed. This is a fully automated production system running on Azure infrastructure.


I pulled all 28 requests from our analytics table. Here's what I found:



• Active for 6 days straight (Nov 17-22, 2025)

• 4.7 requests per day average

• Two alternating query patterns:



• Peak activity: 18:00 UTC (12pm Central Time)

• Secondary peaks: 22:00 UTC and 01:00 UTC

• Longest gap between requests: 26.7 hours

• Shortest gap: 30 seconds (Nov 20, three simultaneous requests)



• Total indicators served: 9,964

• Average per request: ~356 indicators

• Response times: 119ms - 1,539ms (they're getting fast responses)


What This Means


Someone — either Microsoft's internal security team OR an Azure customer — has integrated our free STIX feed into their operational threat intelligence pipeline.


They're running a Node.js script that: 1. Wakes up roughly daily (with some variance) 2. Pulls ALL recent threats (7-day window, no filtering) 3. Pulls HIGH-CONFIDENCE threats (30-day window, 70%+ confidence) 4. Processes 350+ threat indicators per request 5. Does this from a Microsoft datacenter in Iowa


They started November 17 and haven't stopped.


This isn't a test. This isn't a proof-of-concept. This is production.


The Creepy Part


They never asked permission. They never attributed us. They never said "hey, we're using your feed."


They just... started consuming it. Silently. Automatically. Daily.


A Fortune 10 company is operationalizing threat intelligence from our $75/month platform.


That's exactly what open standards are for. But it's still weird to watch it happen in real-time.




🚫 Consumer #2: The Blocked Attacker Who Still Wants Protection


IP: 9.169.121.184 Location: Washington, Virginia (Azure US East Datacenter) Organization: AS8075 Microsoft Corporation Abuse Score: 36 (medium-high threat) Usage Type: Data Center/Web Hosting/Transit Blocked: November 22, 2025 at 15:50 UTC (TODAY) VirusTotal Detections: 0


What They Did


This IP triggered our auto-blocker with an abuse score of 36. We blocked them from accessing our infrastructure.


And then they pulled 559 indicators from our STIX feed.


Let me say that again: An IP address we blocked for malicious behavior is still downloading our threat intelligence.


The Philosophy Test



• Block attackers from accessing our infrastructure

• Give them the data to defend themselves


Blocking someone from attacking you ≠ denying them threat intelligence.


But seeing it happen in production is... uncomfortable.


The Creepy Part


This could be: 1. A compromised Azure VM — Someone hacked it, we blocked it, but the automated STIX consumer is still running 2. A malicious Azure tenant — Running attacks but also consuming threat intel to avoid detection 3. A legitimate security tool — Happened to trigger our abuse threshold but is actually benign


We have no idea which.



• They're running from a Microsoft datacenter in Virginia

• They have an abuse score of 36 (that's not nothing)

• They're using our threat feed to... do something

• VirusTotal hasn't flagged them yet (we might be first)


An attacker we blocked is learning from our defenses.



• ✅ Ethical security (Democratic Sharing in action)

• ⚠️ Intelligence leak (telling attackers what we know)


I'm still deciding how I feel about it.




🏠 Consumer #3: The New Jersey Ghost


IP: 108.35.157.59 Location: Dumont, New Jersey ISP: Verizon FiOS (residential connection) Hostname: `pool-108-35-157-59.nwrknj.fios.verizon.net` Requests: 1 (single pull) Indicators Served: 565


What They Did


Single request. November 18, 2025. Pulled 565 indicators. Never came back.


Who They Are


This is someone's home computer. Not a datacenter. Not a cloud provider. A Verizon FiOS residential connection in suburban New Jersey.


Someone in Dumont, NJ pulled military-grade threat intelligence from our feed and vanished.


The Theories


1. Security researcher — Testing STIX feed integration at home 2. Hobbyist — Building a personal threat intel dashboard 3. Student — Cybersecurity capstone project 4. Attacker — Reconnaissance on our defenses 5. Random curiosity — Googled "free STIX feed" and clicked


We'll never know.


The Creepy Part


They have the data. We don't know what they're building with it.


Dumont, NJ is 15 miles from New York City. It's commuter suburbia. It's someone's house.


What are they doing with 565 threat indicators?




🏡 Consumer #4: The North Carolina Phantom


IP: 2605:a601:a634:7700:92d4:f256:f8af:f9ff Location: Raleigh, North Carolina ISP: Google Fiber (residential) Network: IPv6 Requests: 1 (single pull) Indicators Served: 578


What They Did


Single request. November 21, 2025. Pulled 578 indicators. Never returned.


Who They Are


Google Fiber residential customer in Raleigh, NC. Using IPv6 (fancy).



• Red Hat headquarters

• IBM research facilities

• Massive cybersecurity industry presence

• Tech startup hub


The Theories


This could be: 1. A Red Hat security engineer — Testing STIX integration from home 2. An IBM researcher — Building a threat intel aggregator 3. A startup — Building a security product 4. Some random person — Who Googled "free STIX feed"


We'll never know.


The Creepy Part


IPv6. Residential. Single request. Gone.


Someone in the Raleigh tech corridor pulled our threat intel and disappeared into the ether.


What are they building?




📊 The Pattern Summary


Real Consumers: 4 Total Requests: 31 Total Indicators Served: ~11,666



• 90% of requests: Microsoft Des Moines (production automation)

• 3% of requests: Microsoft Virginia (blocked attacker)

• 3% of requests: New Jersey residential (ghost)

• 3% of requests: North Carolina residential (phantom)


What We Learned: 1. One company is actually using our feed in production (Microsoft) 2. We're helping people we blocked (philosophy win?) 3. Two residential IPs pulled our data and vanished (unsettling) 4. We have zero visibility into what anyone does with the data after they download it




💀 The Uncomfortable Truths


Truth #1: Microsoft Uses Our Feed in Production


A Fortune 10 company with a $20 billion security division is consuming threat intelligence from our $75/month Minnesota platform.


They didn't ask. They didn't pay. They didn't attribute.


They just integrated it.


That means the data is valuable. Companies don't automate daily pulls of useless data.


Truth #2: We're Helping Attackers Defend Themselves


We blocked IP 9.169.121.184 for malicious behavior (abuse score 36).


They're still pulling our threat intel.


This is exactly what Democratic Sharing means: help everyone, even the bad guys.


But it's weird to see it happen. An attacker you blocked is learning from your defenses.


Truth #3: Two Ghosts Haunt Our Feed


New Jersey and North Carolina. Residential connections. Single requests. Gone.



• Who they are

• What they're building

• Why they needed 565 threat indicators

• If they'll ever come back


They have our data. We have their IP address. That's it.


Truth #4: Open Standards Mean Zero Control


Once you publish a STIX feed, you have no idea what people do with it.



• Blocking threats based on our indicators

• Training ML models on our data

• Feeding it into Azure Sentinel

• Reselling it to customers


We'll never know.



• Building the next Recorded Future

• Writing a master's thesis

• Running a botnet command-and-control

• Satisfying curiosity


We'll never know.




🤔 Why We Do This Anyway


The philosophy hasn't changed:


We built a free STIX feed because: 1. Zero marginal cost — Sharing digital goods costs nothing 2. Network effects — The data gets better when more people use it 3. Democratic Sharing — Standing on shoulders, lifting others up 4. Hoarding is sabotage — Every indicator we share is an attack someone else won't experience


What changed:


Now we know it's actually working.


Microsoft is operationalizing it. An attacker is consuming it. Two ghosts pulled it and vanished.


That's 11,666 indicators in the wild, protecting... someone.


Maybe they're protecting Azure customers. Maybe they're protecting New Jersey suburbs. Maybe they're protecting North Carolina tech startups.


We'll never know.


And that's the point.




📈 What This Means for the Business


VC Question #1: "If your feed is free, what's your revenue model?"


Answer: The feed proves the data is production-grade. Microsoft is using it. The upgrade is real-time auto-blocking with 5% false positives at $49-$249/month.


VC Question #2: "What if competitors steal your data?"


Answer: Microsoft already did. For free. And I'm celebrating it.


The differentiator isn't the data. It's the orchestration — auto-blocking, Hall of Shame publishing, blog generation, MITRE mapping, D&D-themed threat actor tracking.


You can't clone orchestration by reading a STIX feed.


VC Question #3: "Don't you feel weird that you have zero control over what people do with your data?"


Answer: Yes. Extremely.


But that's what open standards are for.


If someone builds something better using our data, good. That's how progress works.


The alternative is hoarding, paywalls, and enterprise contracts.


We chose Democratic Sharing instead.




🎭 The Final Takeaway


Yesterday's blog post: "We're helping Microsoft, Google, and Cloudflare!" Today's reality: "We're helping Microsoft, a blocked attacker, and two residential ghosts."


Which is more interesting?


The corrected version.



• ONE company is actually using it (Microsoft)

• They're using it in PRODUCTION (6 days, 28 requests, automated)

• We're helping people we blocked (philosophy win)

• Two ghosts pulled our data and vanished (unsettling but cool)


And we have zero idea what any of them are building.


That's Democratic Sharing. That's open standards. That's the internet working as designed.


It's also kind of creepy.




🔍 The Methodology (Because Receipts Matter)



• Added classification logic to `scripts/analyze-stix-feed-consumers.js`

• Filters: Self-referential traffic (dashboard embeds), search crawlers (googlebot/msnbot), testing traffic (curl from AT&T residential IPs)

• Classification types: REAL, SELF, CRAWLER, TESTING



• Team Cymru WHOIS lookups (ASN, BGP prefix, geolocation)

• RIPE database queries (network details)

• ipinfo.io API (city, region, coordinates)

• Azure Table Storage analytics (all 28 Microsoft requests analyzed)

• Reverse DNS lookups (hostnames)


Data Transparency: All findings based on production logs. No exaggeration. No marketing spin.


Code: `scripts/analyze-stix-feed-consumers.js` (committed to repo)


Run it yourself: ```bash node scripts/analyze-stix-feed-consumers.js --days 7 ```


Judge Dredd approved. Epistemic humility maintained. 95% confidence we're still 5% wrong about something.




DugganUSA LLC Born Without Sin. Running on $75/Month. Being Consumed by Microsoft.


STIX Feed: https://analytics.dugganusa.com/api/v1/stix-feed Attribution (Optional): https://www.dugganusa.com


*"We stand on the shoulders of giants. We lift others up. Even when it's creepy."*




P.S. If you're the person in Dumont, New Jersey who pulled 565 indicators on November 18... hi. I see you. What are you building? (Genuinely curious, not mad.)


P.P.S. If you're the Microsoft engineer in Des Moines running the automated Node.js script... thank you for using our feed. No attribution required. But if you want to tell us what you're building with it, we'd love to know. (Email: [email protected])


P.P.P.S. If you're the blocked IP in Virginia (9.169.121.184)... I hope you're using our threat intel to clean up your act. Seriously. We blocked you from attacking us, but we're still trying to help you protect yourself. That's the philosophy.


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page