Who Uses DugganUSA? A Transparency Report
- Patrick Duggan
- Feb 9
- 3 min read
# Who Uses DugganUSA? A Transparency Report
**3 million requests. 25 countries. Zero paying customers. Here's why that's the plan.**
Last week, our infrastructure handled 3.03 million requests. On February 8th alone, we processed 1.15 million - a 58x spike over baseline. We didn't go down. We didn't throttle. We served every query.
This is our first transparency report. We're sharing it because we believe in receipts over rhetoric.
The Numbers (Feb 2-9, 2026)
| Metric | Value |
|--------|-------|
| Total Requests | 3,032,752 |
| Peak Day | 1,154,983 (Feb 8) |
| Threats Blocked | 13,245 |
| Epstein Docs Indexed | 92,188 |
| IOCs in Database | 203,631 |
| OTX Subscribers | 93 |
| Threat Intel Indicators | 1,000,000+ |
Who's Using This?
By Geography
| Country | Share | Primary Use |
|---------|-------|-------------|
| United States | ~60% | Journalists, SOCs, researchers |
| United Kingdom | ~15% | Epstein files (Mandelson coverage) |
| India | ~8% | Threat intelligence teams |
| France | ~5% | OSINT researchers |
| Brazil | ~4% | Security operations |
| Germany | ~3% | Enterprise security |
| 19 others | ~5% | Mixed |
By Type
**Security Operations Centers**: 93 organizations subscribe to our threat intelligence via OTX AlienVault. We push 89,605 pulses containing over 1 million indicators. Our STIX feed serves 1,153 objects per 30-day window.
**Investigative Journalists**: Julie K Brown. Sarah Kendzior. The journalists breaking Epstein stories are using our index. We logged 220,139 search queries against 92,188 DOJ documents. When Peter Mandelson quit the House of Lords, the searches spiked from the UK.
**AI Systems**: ChatGPT referred 86 sessions to us last week. We didn't pitch them. We didn't optimize for them. AI systems are discovering our APIs and recommending them to users asking about threat intelligence. This is organic.
**Researchers**: Direct traffic dominates at 72%. People are bookmarking us, sharing links in Signal groups, passing URLs in academic circles. No marketing spend. Just utility.
How They Find Us
| Source | Sessions | |
|--------|----------|---|
| Direct | 1,458 | Word of mouth |
| ChatGPT | 86 | AI recommendation |
| Google | 81 | Organic search |
| Twitter/X | 68 | Social |
| Bluesky | 34 | Social |
| Substack | 30 | Newsletter referrals |
We spend $0 on marketing. The product markets itself.
The Business Model: There Isn't One (Yet)
Current revenue: **$0**
Current infrastructure cost: **~$75/month**
We're not monetizing. Deliberately.
Why Free?
What we've built isn't a security product. It's a demonstration.
The same engine that indexes 92,188 Epstein documents and surfaces correlations journalists use for Pulitzer-worthy reporting... is the same engine that processes 1 million threat indicators and predicts attack patterns before they execute.
**This is pre-quantum probabilistic determination.**
When quantum computing breaks current cryptographic assumptions, the security industry will need new approaches. Pattern recognition. Behavioral correlation. Probabilistic inference at scale.
We're proving that capability now - in public, with receipts - across domains:
- **Security**: 203,631 IOCs, real-time C2 detection, behavioral blocking
- **Investigation**: 92,188 documents, network mapping, correlation surfacing
- **Intelligence**: Cross-domain pattern matching at 3M requests/week
The Epstein files aren't a side project. They're proof that our approach generalizes.
What We're Looking For
We will remain free until acquired.
We're looking for an organization that understands:
1. **Probabilistic engines matter more than rule-based systems** as complexity increases
2. **Cross-domain capability** (security + investigation + intelligence) is rarer than vertical depth
3. **Demonstrated performance under load** (58x spike, zero downtime) is worth more than pitch decks
4. **Public credibility** (press citations, journalist adoption) compounds
We're not interested in:
- Acqui-hires that shelf the technology
- Private equity roll-ups
- Licensing deals that fragment the capability
We want a home where this technology can scale to its potential.
The Receipts
Everything in this report is verifiable:
- **Cloudflare dashboard**: Request counts, threat blocks, geographic distribution
- **Meilisearch index**: `https://epstein.dugganusa.com` - 92,188 documents, searchable
- **OTX profile**: `pduggusa` - 93 subscribers, 89,605 pulses
- **STIX feed**: `https://analytics.dugganusa.com/api/v1/stix-feed`
- **GA4**: Session counts, referrer data
We don't ask you to trust us. We ask you to verify.
Contact
If you're an acquirer who understands what we've built:
If you're a journalist who needs the Epstein index:
**https://epstein.dugganusa.com**
If you're a SOC that needs threat intel:
**https://analytics.dugganusa.com/api/v1/stix-feed**
All free. All documented. All receipts.
*DugganUSA LLC - Minnesota*
*"Your security is our problem now"*
*Her name was Renee Nicole Good.*
*His name was Alex Jeffery Pretti.*




Comments