Automated threat detection, behavioral scoring, and public attribution. Every attacker caught in our honeypot network gets enriched, scored, reported to AbuseIPDB, and published to the community.
SSH and HTTP honeypots deployed across mesh nodes running the Nemesis agent. Canary files for lateral movement detection. Every connection fingerprinted and logged to the central event store.
Confidence scoring based on event frequency, TTP diversity, target breadth, and enrichment signals. Entities graduate through tiers as evidence accumulates. No manual classification required.
Threat actors sync into the Planchette entity graph as first-class entities with edges, watches, and Hive Mind anomaly reports. The same graph that tracks vessels and aircraft now tracks attackers.
Claude generates threat reports in the voice of a community member. Attack timelines, TTP explanations in plain English, ISP callouts, and a snarky closing line. Every report posted to the IT Horrors board.
STIX 2.1 export for threat intel platforms. IP blocklists for firewalls. Suricata rules for IDS sensors. AbuseIPDB reporting for the global community. Every attacker costs something.
IP, ASN, ISP, org, country, city, reverse DNS, open ports, abuse history. MITRE ATT&CK TTP mapping. Campaign correlation. Every thread pulled until the picture is complete.