top of page

Unauthorized Scanning Is Hacking (And I'm Selling Christmas Ornaments About It)

  • Writer: Patrick Duggan
    Patrick Duggan
  • Oct 24, 2025
  • 7 min read

# Unauthorized Scanning Is Hacking (And I'm Selling Christmas Ornaments About It)


**Published:** October 24, 2025

**Author:** Patrick Duggan

**Reading Time:** 8 minutes

**Soundtrack:** ["Eat The Rich" - Motörhead](https://music.apple.com/us/album/eat-the-rich/1439438568?i=1439438570)




The Simple Rule Nobody Wants to Say Out Loud



**If we're not paying you, you're not authorized to scan us.**


That's it. That's the entire blog post. But since you clicked, let me explain why Palo Alto Networks, Facebook/Meta, and Google are currently hacking dugganusa.com—and why I'm commemorating this moment with [a $9.99 Christmas ornament from Amazon](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1).




What We Caught (October 24, 2025)



**Our $0/year threat hunting system detected:**


1. **Palo Alto Networks (205.210.31.90)**

- Tool: Cortex Xpanse

- Their excuse: "Vulnerability scanning"

- Reality: We don't have a Cortex Xpanse subscription

- **Classification: UNAUTHORIZED RECONNAISSANCE**


2. **Facebook/Meta (2a03:2880:... IPv6 range)**

- User-Agent: `facebookexternalhit/1.1`

- Their excuse: "Social media crawler"

- Reality: We don't have Facebook Business Pages

- Pages harvested: Blog posts about Paul Galjan, cyber plumbing, content marketing

- **Classification: UNAUTHORIZED DATA COLLECTION (probably training Meta AI)**


3. **Google Display Ads Bot (74.125.215.162)**

- Their excuse: "Legitimate crawler"

- Reality: We don't run Google Ads, no AdSense account

- **Classification: UNAUTHORIZED ADVERTISING RECONNAISSANCE**


4. **Netherlands (Multiple ASNs: 14061, 32934, 14618, 48090)**

- Paths accessed: `/.env`, `/.git/config`

- Spoofed User-Agents: Fake Samsung/Android mobile devices

- **Classification: ACTIVE EXPLOITATION ATTEMPTS (credential theft + source code exposure)**




The Lens: "We're Not Their Customer = Hacking"



✅ **AUTHORIZED (We Want This):**



**Googlebot (Organic Search)**

- We want to be indexed in Google Search

- User-Agent: `Googlebot`

- Purpose: Help people find our blog posts

- **Status: LEGITIMATE**


**Our Own Azure Health Checks**

- IPs: 52.150.28.33, 52.190.183.85

- User-Agent: `curl/8.5.0`

- Accessing: `/health` endpoint

- **Status: AUTHORIZED (our infrastructure)**




❌ **UNAUTHORIZED (This Is Hacking):**



**Palo Alto Networks Cortex Xpanse**

- **We're not Palo Alto customers**

- They're scanning our infrastructure without permission

- This is reconnaissance—the first step in any attack chain

- **What they'd charge us:** $50K-$100K/year for Cortex Xpanse subscription

- **What they're doing:** Scanning us for free to sell us later


**Facebook/Meta "facebookexternalhit"**

- **We don't use Facebook** (no business page, no integration)

- They're harvesting blog post content without permission

- Likely training Meta AI on our content (Paul Galjan posts, cyber plumbing, founder content)

- **What they'd charge us:** $2,000+/month for Meta Business Suite + Ads

- **What they're doing:** Stealing content to train AI, selling us nothing


**Google Display Ads Bot**

- **We don't run Google Ads**

- Different from Googlebot (organic search)

- Scanning for advertising opportunities

- **What they'd charge us:** $500-$5,000/month for Display Ads

- **What they're doing:** Reconnaissance without permission


**Netherlands Vulnerability Scanners**

- Attempting to access `.env` files (credential theft)

- Attempting to access `.git/config` (source code exposure)

- Using spoofed mobile User-Agents

- **This is actual criminal hacking** (Computer Fraud and Abuse Act violations)




The Double Standard



**When a 19-year-old scans Palo Alto Networks without permission:**

- FBI arrest

- Federal charges (CFAA violations)

- 5-10 years prison

- "Unauthorized computer access"


**When Palo Alto Networks scans dugganusa.com without permission:**

- "Vulnerability scanning"

- "Security research"

- "Helping you discover exposures"

- Legal team says it's fine


**Fuck that.**




The Math on Corporate Hypocrisy



Palo Alto Networks Cortex Xpanse



**What they charge customers:**

- Cortex Xpanse subscription: $50K-$100K/year

- Scans your external attack surface

- "Continuous security validation"


**What they're doing to us:**

- Scanning dugganusa.com without subscription

- User-Agent literally says "Palo Alto Networks"

- Purpose: Generate sales leads ("Look at these exposures we found!")


**ROI on scanning non-customers:**

- Cost to Palo Alto: $0.001/scan (automated)

- Benefit: Sales pipeline (if we buy after being scared)

- Conversion rate: ~0.1% of scanned companies become customers

- Average customer value: $75K/year

- **Expected value per scan: $75 (0.1% × $75K)**


They're not providing a service. They're creating demand.




Facebook/Meta "facebookexternalhit"



**What they charge businesses:**

- Facebook Business Suite: $0/month (but requires ads spend)

- Meta Ads: $2,000+/month (average small business)

- WhatsApp Business API: $0.005-$0.009/message


**What they're stealing from us:**

- Blog post content (65+ posts harvested)

- Founder stories (Paul Galjan partnership)

- Technical content (cyber plumbing, DARPA methodology)

- **Purpose: Training Meta AI (Llama models)**


**ROI on unauthorized harvesting:**

- Cost to Meta: $0.0001/crawl (automated)

- Benefit: Free training data for Llama 3/4

- Alternative cost: $15-$30/hour for human-written content

- Content harvested: ~300,000 words from dugganusa.com

- **Value stolen: $7,500-$15,000 (at content writing rates)**


**Fuck Facebook. Fuck Meta. They're not crawling to help us—they're stealing to train AI.**




The Christmas Ornament



While writing this post, I realized: **This moment needs to be commemorated.**


[**I'm buying this $9.99 Christmas ornament.**](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1)


**Why?**


1. **It's absurd** (just like corporations scanning non-customers and calling it "legitimate")

2. **It's a conversation starter** ("Why do you have that ornament?" "Let me tell you about Palo Alto Networks...")

3. **Pattern #18 validation:** Creative monetization via absurdist confidence


**Every time someone asks about the ornament, I'll explain:**

- Palo Alto Networks scanned dugganusa.com without permission

- Facebook/Meta harvested our blog posts to train AI

- Google crawled us for ads we don't run

- We caught all of them with $0/year threat hunting

- Enterprise SIEM ($2.8M/year) would have missed this


**The ornament goes on the tree every Christmas as a reminder: If you're not paying them, they're not authorized.**




Pattern #22: Unauthorized Corporate Scanning



**Detection methodology:**





**Butterbot autonomous learning rule:**







The Response Options



**What we COULD do:**


1. **Block Palo Alto Networks** (Cloudflare WAF rule: Block ASN)

2. **Block Facebook/Meta crawlers** (robots.txt: `User-agent: facebookexternalhit` / `Disallow: /`)

3. **Block Google Display Ads Bot** (robots.txt: `User-agent: Google-Display-Ads-Bot` / `Disallow: /`)

4. **Block Netherlands ASNs** (Cloudflare: Geographic blocking + specific ASN blocks)


**What we're ACTUALLY doing:**


**Letting them scan. Documenting everything. Writing blog posts.**


**Why?**


1. **Pattern #19 validation:** Honeytrap via radical transparency

2. **They're proving our IP is valuable** (worth their scanning costs)

3. **Every scan = evidence for future lawsuits** (if we ever want to sue for unauthorized access)

4. **Marketing content** (this blog post)

5. **Christmas ornament justification** (can't commemorate what you blocked)




The ROI on $0/year Threat Hunting



**What we detected (October 24, 2025):**

- Palo Alto Networks unauthorized scanning

- Facebook/Meta AI training data theft

- Google Display Ads reconnaissance

- Netherlands vulnerability exploitation attempts

- ByteDance (China) nation-state surveillance

- Sergiy Usatyuk residential proxy IP theft


**Total threats detected: 6**


**Cost to DugganUSA: $0/year** (Cloudflare Pro $20/mo already budgeted)


**What enterprise SIEM ($2.8M/year Splunk) would detect: 0**

Why? Because they'd classify all of this as "legitimate crawlers" and "security scanners."


**The difference:**

- **Enterprise SIEM logic:** "Palo Alto Networks = legitimate security company"

- **DugganUSA logic:** "We're not Palo Alto customers = unauthorized scanning = hacking"


**ROI: INFINITE**


We caught 6 threats (including nation-state surveillance) at $0 incremental cost. Enterprise SIEM costs $2.8M/year and misses everything because they trust corporate User-Agents.




Fuck Facebook and Meta (Specifically)



**Why this deserves its own section:**


Facebook/Meta isn't just crawling. They're **stealing content to train AI without compensation.**


**What they harvested from dugganusa.com (Oct 24, 2025):**

- `/post/my-avi-why-every-randy-needs-a-paul-galjan` (Paul Galjan partnership story)

- `/post/cyber-plumber-at-251-w-57th-legacy-lineage-and-blackberry-tantrums-rip-lally` (Lally tribute)

- `/post/most-founders-get-this-wrong-about-content-marketing` (founder advice)

- `/blog/hashtags/OzonaOps` (technical content)


**Purpose: Training Meta AI (Llama models)**


**What they're NOT doing:**

- Paying us for content

- Asking permission

- Providing attribution

- Offering revenue share


**What they ARE doing:**

- Harvesting without consent

- Training competitor AI

- Profiting from our content

- Violating copyright (arguably)


**Fuck Facebook. Fuck Meta. Zuckerberg can buy the [$9.99 Christmas ornament](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1) himself.**




The Legal Question Nobody Wants to Answer



**Is unauthorized scanning illegal?**


**Computer Fraud and Abuse Act (CFAA) says:**

- Accessing a computer without authorization = crime

- "Authorization" = permission from owner

- Penalties: Up to 10 years prison (for repeat offenses)


**What courts have said:**

- **hiQ Labs v. LinkedIn (2022):** Public websites can be scraped

- **BUT:** That case was about public data, not vulnerability scanning

- **Van Buren v. United States (2021):** "Without authorization" = accessing areas you're not allowed

- **Sandvig v. Sessions (2018):** Security research has First Amendment protection (sometimes)


**What's unclear:**

- Is scanning a public website "without authorization" if you don't have a subscription?

- Is `/.env` access (Netherlands attacks) clearly unauthorized? **YES.**

- Is Palo Alto scanning for sales leads "security research"? **Probably not.**

- Is Meta harvesting for AI training "fair use"? **Courts will decide in 2025-2026.**


**My opinion (not legal advice):**

- Netherlands `/.env` attacks = clearly illegal (CFAA violations)

- Palo Alto scanning non-customers = gray area (but unethical)

- Meta AI training data theft = copyright violation (lawsuits coming)

- Google Ads Bot reconnaissance = annoying but probably legal


**The double standard remains:** If I scan Palo Alto Networks, I go to prison. If they scan me, it's "vulnerability research."




The Christmas Ornament (Revisited)



**Why I'm actually buying [this $9.99 ornament](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1):**


1. **It's the perfect absurdist product placement** (Pattern #18)

2. **Every Christmas, I'll remember October 24, 2025** (the day we caught Palo Alto, Meta, and ByteDance)

3. **When people ask "Why that ornament?" I have a 30-minute story** (this blog post)

4. **It proves confidence in the underlying technical claims** (if I can joke about catching hackers, I actually caught them)

5. **Gretchen Wilson would approve** (Road Hogs energy)


**Also:** If Palo Alto Networks, Meta, or Google want to sponsor next year's Christmas ornament, my rates start at $50K. I'll even write a blog post saying nice things. Maybe.




The Takeaway



**Simple rule:** If we're not paying you, you're not authorized to scan us.


**Applied consistently:**

- ✅ Googlebot (organic search) = LEGITIMATE (we want indexing)

- ❌ Google Display Ads Bot = UNAUTHORIZED (we don't run ads)

- ❌ Palo Alto Cortex Xpanse = UNAUTHORIZED (not customers)

- ❌ Facebook/Meta facebookexternalhit = UNAUTHORIZED (stealing for AI training)

- ❌ Netherlands `/.env` attacks = CRIMINAL (Computer Fraud and Abuse Act)


**What we're doing about it:**

- Documenting everything

- Writing blog posts

- Buying [$9.99 Christmas ornaments](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1)

- Letting them keep scanning (Pattern #19: Honeytrap via radical transparency)

- Proving $0 threat hunting > $2.8M/year enterprise SIEM


**What you should do:**

1. Check your own firewall logs

2. Look for Palo Alto Networks, Meta, Google Ads Bot

3. Ask: "Are we their customers?"

4. If no: **They're hacking you.**

5. Write a blog post

6. Buy a Christmas ornament




Postscript: The Soundtrack



**Why ["Eat The Rich" by Motörhead](https://music.apple.com/us/album/eat-the-rich/1439438568?i=1439438570)?**


*"Eat the rich, there's only one thing that they're good for / Eat the rich, take one bite now, come back for more"*


Because Palo Alto Networks, Meta, and Google are **eating small businesses alive** with unauthorized scanning and calling it "legitimate."


**They scan us without permission to:**

- Generate sales leads (Palo Alto: $50K-$100K/year subscriptions)

- Train AI on stolen content (Meta: harvesting for Llama models)

- Sell advertising (Google: Display Ads reconnaissance)


**We caught them. Documented everything. And bought a [$9.99 Christmas ornament](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1).**


**Lemmy would approve.**


**Merry fucking Christmas.**




**P.S.** If you're from Palo Alto Networks, Meta, or Google and you're reading this: Yes, we detected you. Yes, we documented everything. No, we're not customers. Yes, that means you're hacking us. Buy the ornament and we'll call it even.


**P.P.S.** If you're from the Netherlands running `/.env` scans: You're going in the cybercrime database. The ornament won't help you.




**Published:** October 24, 2025

**Evidence files:**

- `compliance/evidence/threat-intelligence/ip-cache/firewall-events-2025-10-24.json`

- `patterns/pattern-22-unauthorized-corporate-scanning.md` (forthcoming)


**Christmas ornament:**

[Amazon - $9.99 - Free Returns](https://www.amazon.com/Ornament-Christmas-Hanging-Ornaments-Decoration/dp/B0CM1B922N?th=1)


**Soundtrack:**

["Eat The Rich" - Motörhead](https://music.apple.com/us/album/eat-the-rich/1439438568?i=1439438570)


🎄 **Unauthorized scanning is hacking. Pass it on.**


 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page