Bugb Logo
Stay Vigilant, Stay Ahead.
AppsPledge
Talk to FounderBook a meeting
Ready to see Bugb in action?
Book a demo Browse dashboardsTalk to security
Bugb Icon
© 2025 Bugb Technologies Private Limited
Back to home

Threat Intel

Threat Intelligence

Bugb Threat Intelligence

Planet‑scale visibility with AI that enriches every signal and agents that prove exploitability. Evidence‑backed intelligence you can ship to owners with confidence.

Coverage & scale
Coverage
> 95% public IPv4
continuous
Daily observations
> 10B
banners • flows
Validated vulns
> 100K
with evidence
Protocols
> 60
JA3/JARM incl.
Exploit templates
100K+
12 languages
IPv4s enumerated
4.9B+
global map
IPv6 observations
200M+
ever‑growing
Certificates seen
1.2B+
issuers • SANs
Orgs identified
5M+
attribution graph
Vulnerable orgs
50K+
VVTI matches
Responsible disclosures
30K+
assisted outreach
Coverage
> 95% public IPv4
continuous
Daily observations
> 10B
banners • flows
Validated vulns
> 100K
with evidence
Protocols
> 60
JA3/JARM incl.
Exploit templates
100K+
12 languages
IPv4s enumerated
4.9B+
global map
IPv6 observations
200M+
ever‑growing
Certificates seen
1.2B+
issuers • SANs
Orgs identified
5M+
attribution graph
Vulnerable orgs
50K+
VVTI matches
Responsible disclosures
30K+
assisted outreach
See more

We find more services and protocols than other Internet‑scale providers.

Understand more

AI enriches each observation: stack, auth, risk, owners.

Prove more

VVTI provides PoC + evidence. If it’s listed, it’s vulnerable.

Internet‑scale Data
More services than any provider

We continuously map the public Internet. Below is a compact catalogue you can filter or expand in product. Highlights:

Discovery signals
  • DNS (A/AAAA/CNAME/NS/MX/TXT/SOA) + reverse DNS
  • Certificates (SANs, issuers, expiry, key params)
  • Whois snapshots & registrar drift
  • Open ports & service/version mapping
  • Banners across HTTP/SMTP/SSH/FTP/IMAP/POP3/…
  • HTML responses & redirect chains
  • Edge/CDN/WAF presence
  • Geo, cloud, region & ASNs
  • Mobile/API endpoints
  • Object storage exposure (S3/GCS/Azure)
  • K8s/Container UIs & orchestrators
  • IoT/OT surfaces (MQTT, Modbus, BACnet, …)
Behavior & fingerprinting
  • Protocol traits (HTTP/2, QUIC, TLS, SSH, RDP, SMB, MQTT, AMQP)
  • JA3 / JA3S, JARM
  • Service fingerprints & tech‑stack inference
  • Auth patterns (Basic/OAuth/OIDC/SAML)
  • Botnets, malware infra, C2 panels
  • Sinkhole & honeypot correlations
  • Credential leak metadata & paste/code artefacts
AI Enrichments (per service & protocol)
Context‑aware
HTTP(S)
  • Banner & HTML parse
  • Redirect chain map
  • Endpoint/param mining
  • Tech‑stack inference
TLS
  • Chain health
  • Issuer/expiry drift
  • JA3/JA3S
  • Weak ciphers
SSH/RDP/SMB
  • Version/auth hints
  • Default‑creds signals
  • Brute heuristics
K8s/Containers
  • Exposed UIs
  • RBAC hints
  • Image signatures
Databases
  • Unauth exposure
  • Version→CVE map
  • Replica/role detect
Malware/C2
  • Family attribution
  • Infra graph
  • Sinkhole overlap
Validated Vulnerability Threat Intelligence
Proof‑backed

Agents attach to each discovered host, learn its stack, select exploit templates, run safe checks in sandbox, and verify impact. You can trigger manual checks too. If it appears here, it is vulnerable.

1.Discover
2.Learn stack
3.Generate PoC
4.Sandbox run
5.Verify & curate
Unauthenticated JMX with RCE path
JMX RMI · 203.0.113.21:9010 · Validated
PoC_Template.yamlEvidence.pdfWhy.mdFixPlan.yaml
SSRF on payments‑api → metadata creds
HTTP SSRF · pay.example.com · Validated
PoC_Template.yamlEvidence.pdfWhy.mdFixPlan.yaml
Organization Attribution
CRM enrichment
Signals we fuse
  • Cert SANs & issuers, forward/reverse DNS
  • App content (about/policy/contact) & redirects
  • Infra ownership & routing patterns
Operational outcome
  • Enriched org profiles (6sense, Apollo, …)
  • Decision‑maker discovery & contacts
  • Pre‑filled responsible disclosure email drafts
Use Cases
Researchers & Red Teams
  • Hunt exposures and validated vulns
  • Use PoCs & evidence packs
  • Export intelligence for offline study
Enterprises (B2B)
  • External TI feeds plug into BUGB CNAPP
  • Correlated with discovered cloud architecture
  • Autofix plans with guardrails
Public Sector (B2G)
  • Nation‑scale malware/C2 tracking
  • Honeypot analytics & state actor patterns
  • Gov domain/asset TI curation
Security Big Data & Research

Security data is our big data. We train models on it and collaborate with universities in India and the US to build meaningful outcomes. Curated datasets are available under responsible use.

Collaborating with leading institutions
Indiana UniversityMITRIT
Open / Student Access

If you’re a student or researcher, write to info@bugb.report. We can provide datasets to work on and guidance for citation.

Indicators (sample)
TypeValueSeverityFirst SeenLast SeenTags
IP203.0.113.21High2025-10-202025-10-21
C2SSH Brute
Domainapi-greyfalcon[.]comCritical2025-10-192025-10-21
PhishExfil
Hash2b1f…e9a0Medium2025-10-172025-10-18
MalwareLoader
URLhxxp://pay‑svc[.]cc/trackHigh2025-10-162025-10-21
SSRFCallback
API Access

Build your own workflows on top of Bugb TI.

Search indicators
GET /api/v1/ti/iocs?query=domain:example.com&severity=high
Authorization: Bearer <token>
Fetch validated vulns
GET /api/v1/ti/validated?since=2025-10-01
Authorization: Bearer <token>
Submit evidence
POST /api/v1/ti/evidence
{ "service": "payments-api", "vector": "ssrf", "poc": "…", "autoverify": true }
Org attribution query
GET /api/v1/ti/attrib?ip=203.0.113.21
Authorization: Bearer <token>
Contact for API Access API Docs

Why Bugb TI

More coverage. More context. More proof.

Noise Reduction
93%

AI-powered context and policy filters eliminate false positives, letting your team focus on real threats.

Mean Time to Resolve
4.8h

Agent-led validation and automated remediation workflows dramatically reduce response times.

Autofix Success
72%

Pre-approved remediation plans with guardrails enable safe, automated fixes for most vulnerabilities.

Talk to an expert