Skip to main content

Threat Intelligence

Threat intelligence provides structured information about known attackers, malicious IPs, domains, URLs, and malware signatures. Panguard automatically queries these databases to determine whether activity on your system is linked to known threats.
You do not need to understand the technical details. Guard handles the queries automatically, and Chat explains the results in plain language.

5 Built-in Threat Intelligence Feeds

abuse.ch Suite

SourceIndicator TypesDescription
ThreatFoxIP, domain, URL, hashDatabase of indicators of compromise (IoCs) linked to malware campaigns
URLhausURLDatabase of malware distribution URLs
Feodo TrackerIPBotnet Command and Control (C2) server tracking

Additional Sources

SourceIndicator TypesDescription
GreyNoiseIPDistinguishes targeted attacks from mass internet scanning
AbuseIPDBIPCommunity-reported malicious IP database with confidence scoring

Feed Update Schedule

FeedUpdate FrequencyQuery Type
ThreatFoxEvery 6 hoursCached locally
URLhausEvery 6 hoursCached locally
Feodo TrackerEvery 6 hoursCached locally
GreyNoiseReal-time per queryAPI call
AbuseIPDBReal-time per queryAPI call
The 6-hour update interval is configurable. For high-security environments, you can reduce it to 1 hour. For bandwidth-constrained systems, increase it to 24 hours.

Local Caching

Query results are cached locally to avoid redundant lookups:
  • Cache duration: 1-24 hours depending on the source
  • Cache location: Guard data directory
  • Expired entries are cleaned up automatically

Indicators of Compromise (IoCs)

Threat intelligence tracks the following types of indicators:
TypeDescriptionExample
IP AddressKnown malicious IP203.0.113.50
DomainMalicious domain namemalware.example.com
URLMalicious URLhttp://evil.com/payload.exe
File HashMalware fingerprint (SHA-256)e3b0c44298fc1c149a...
EmailPhishing email addressphish@attacker.com

Automatic Querying

Guard automatically queries threat intelligence when it detects suspicious activity:
Suspicious IP 203.0.113.50 connection detected
       |
       v
  Query ThreatFox  -> Known C2 server
  Query AbuseIPDB  -> Reported 1,247 times
  Query GreyNoise  -> Mass scanner
       |
       v
  Conclusion: High risk -- auto-block + notify

Threat Cloud — Collective Intelligence

Beyond public feeds, Panguard users contribute to and benefit from the Threat Cloud, a community-driven collective intelligence network.
  Your Panguard           Threat Cloud          Other Users' Panguard
       |                      |                         |
  Detect threat  --upload-->  Collect+Verify  --push-->  Preemptive protection

How It Works

  1. Your Guard detects a new threat indicator
  2. The indicator is anonymized and uploaded to Threat Cloud
  3. Threat Cloud verifies and correlates across all submissions
  4. Verified indicators are distributed to all participating Panguard instances

IoC Reputation Scoring

Every indicator in Threat Cloud receives a reputation score from 0 to 100:
Score RangeClassificationAction
80-100Confirmed maliciousAuto-block eligible
50-79SuspiciousAlert + manual review
20-49Low confidenceMonitor only
0-19InformationalLogged, no action

Campaign Tracking and Correlation

Threat Cloud correlates indicators across submissions to identify attack campaigns:
  • Multiple users reporting the same IP within a time window triggers campaign detection
  • Campaign indicators receive an elevated reputation score
  • Related indicators (same ASN, same domain family) are linked automatically

Privacy and Data Protection

Privacy guarantee: Only threat indicators (IPs, hashes, patterns) are uploaded. No system information, usernames, internal IPs, file contents, or personally identifiable information is ever shared.
Privacy MeasureDetails
IP anonymizationSource IPs are /16-anonymized before upload
GDPR complianceNo personal data is collected or stored
Zero raw dataNo log content, file content, or system details are transmitted
Zero telemetryNo usage analytics, crash reports, or behavioral tracking
Opt-out availableThreat Cloud can be fully disabled

Offline Mode

Panguard works fully offline. When threat intelligence feeds are unreachable:
  • Layer 1 rule engine continues operating with locally cached rules
  • Previously cached feed data remains available until expiration
  • New detections rely on Sigma/YARA rules and behavioral baselines only
  • Score adjustments reflect reduced intelligence coverage
# Disable all external intelligence (rules-only mode)
panguard guard start --offline
Offline mode disables Threat Cloud participation and real-time feed queries. Cached data is still used until it expires.

Viewing Threat Intelligence

Guard Status

panguard guard status
  -- Threat Intelligence --------------------

  Feeds:        5 active, last update 2h ago
  IoC matched:  3 in last 24h
  Blocked IPs:  12 total

Chat Notifications

When threat intelligence matches activity on your system, Chat notifies you in a format tailored to your user role:
[Panguard AI Security Alert]

Your server was communicating with a known malicious server.
That IP has been reported 1,247 times globally.
The connection has been automatically blocked. No action needed.

Risk level: High
Status: Automatically resolved