Start the Threat Cloud server
Launch the server on your chosen port:
The API key is auto-generated on first start and stored in your Panguard configuration. Use it to authenticate all API requests.
Understand the architecture
Threat Cloud uses a lightweight stack designed for single-server deployment:
| Component | Technology | Purpose |
|---|---|---|
| Database | SQLite | Stores IoCs, campaigns, and feed data |
| API | REST + JSON | CRUD operations for all resources |
| Auth | API key (Bearer token) | Authenticates all requests |
| Rate limiting | 100 req/min default | Prevents abuse; configurable |
SQLite is the default backend. For high-volume deployments (10+ agents), consider placing the database on an SSD and adjusting WAL mode:
panguard threat start --db-wal.Manage indicators of compromise
Add IoCs manually or let Guard agents push them automatically:IoCs added by Guard agents include full context: the triggering event, honeypot interaction data, and the profiling results.
Configure feed endpoints
Threat Cloud exposes feed endpoints that downstream tools (SIEMs, firewalls, other Panguard instances) can subscribe to:Example: fetch the IP blocklist:
Privacy and data handling
Threat Cloud is designed with privacy as a core principle:
- Self-hosted: All data stays on your infrastructure
- Anonymized data: IP addresses in shared feeds can be hashed
- Zero telemetry: No data is sent to Panguard AI servers
- Data retention: Configurable TTL for IoCs (default: 90 days)
What to do next
Threat Cloud product reference
Full documentation of the Threat Cloud platform and architecture.
Privacy model
Detailed explanation of data handling, anonymization, and retention policies.
Threat Cloud API
Complete API reference for IoC, feed, and campaign endpoints.
Deploy with Docker
Run Threat Cloud in a containerized environment.