Intellectual honesty is a core principle of this site. Every data source is documented here with its origin, update frequency, and known limitations. If something is uncertain, we say so. If a source has caveats, we surface them. CyberGrind does not fabricate data, manufacture threat scores, or present third-party feeds as proprietary intelligence.
Contents
  1. Live Threat Data
  2. Vulnerability Data
  3. CTI Pipeline (api.cybergrind.org)
  4. Reference & Educational Content
  5. Methodology
  6. Known Limitations
  7. Licensing & Attribution
1 — Live Threat Data
The authoritative catalog of vulnerabilities confirmed to have been actively exploited in the wild, maintained by the Cybersecurity and Infrastructure Security Agency. Federal agencies are mandated to remediate KEV entries within defined timelines under Binding Operational Directive 22-01. CyberGrind fetches this feed to power the CISA KEV Checker tool and the Blue Team Resources page.
Update Freq.
As published by CISA
Cache TTL
1 hour (Cloudflare Worker)
Format
JSON via CISA API
Used In
KEV Checker, Blue Team Resources
Live API
A community-driven database of IP addresses reported for malicious activity including brute force attacks, port scanning, spam, and DDoS participation. Each IP carries a confidence-of-abuse score (0–100) based on report volume, recency, and reporter reputation. CyberGrind uses the AbuseIPDB API for the IP Reputation Check tool and as one of two data layers in the Global Threat Map.
Update Freq.
Continuous (community)
Cache TTL
6 hours (threat map)
Format
REST API (JSON)
Used In
IP Reputation Check, Threat Map
Live Public
An open source daily-updated blocklist aggregating malicious IPs from multiple threat intelligence sources. IPsum assigns a threat level (1–10) based on how many independent sources have flagged an IP. CyberGrind uses IPsum as one component of the OSINT Feeds layer in the Global Threat Map.
Update Freq.
Daily
Cache TTL
1 hour (OSINT worker)
Format
Plaintext blocklist
Used In
Threat Map (OSINT tab)
Live Public
Proofpoint's open source threat intelligence feed providing IDS/IPS rules and IP blocklists for known malicious infrastructure. The compromised IPs feed covers hosts confirmed to be participating in attack campaigns. CyberGrind uses the open Emerging Threats blocklist as a component of the OSINT Feeds threat map layer.
Update Freq.
Daily
Cache TTL
1 hour (OSINT worker)
Format
Plaintext blocklist
Used In
Threat Map (OSINT tab)
Live Public
Abuse.ch's tracker for botnet command-and-control infrastructure associated with banking trojans and ransomware families including Emotet, TrickBot, QakBot, and Dridex. Feodo Tracker provides a blocklist of active C2 IPs with malware family attribution. CyberGrind uses this feed as the third component of the OSINT Feeds threat map layer.
Update Freq.
Continuous
Cache TTL
1 hour (OSINT worker)
Format
JSON / plaintext
Used In
Threat Map (OSINT tab)
On-Demand API Key
A MAC address OUI (Organizationally Unique Identifier) lookup service maintained by maclookup.app. OUI prefixes are registered with the IEEE and identify the hardware manufacturer associated with the first three octets of a MAC address. CyberGrind proxies lookup requests through a Cloudflare Worker to protect the API key and keep the key server-side. Results include vendor name, address, and block type (MA-L, MA-M, MA-S).
Trigger
User-initiated (per lookup)
Cache TTL
None (per-request)
Auth
MAC_LOOKUP_API_KEY (Worker secret)
Used In
MAC Address OUI Lookup tool
2 — Vulnerability Data
A data-driven probability model maintained by FIRST (Forum of Incident Response and Security Teams) that estimates the likelihood a given CVE will be exploited in the wild within the next 30 days. EPSS scores range from 0.0 to 1.0 and are updated daily based on threat intelligence and exploitation telemetry. CyberGrind uses EPSS scores in the CVE Research tool and the dedicated EPSS Scanner to help practitioners prioritize remediation beyond CVSS severity alone.
Update Freq.
Daily
Cache TTL
Per worker config
Format
REST API (JSON)
Used In
CVE Research, EPSS Scanner
Live U.S. Gov Public Domain
The U.S. government repository of standards-based vulnerability management data. NVD enriches CVE records published by MITRE with CVSS scores, CWE classifications, CPE applicability statements, and remediation references. CyberGrind queries the NVD CVE API v2.0 through the EPSS Worker to provide full CVE detail in the CVE Research tool.
Update Freq.
Continuous
Cache TTL
Per worker config
Format
REST API v2.0 (JSON)
Used In
CVE Research, EPSS Scanner
Static Snapshot Public
The globally recognized knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. CyberGrind loads both the Enterprise and ICS ATT&CK matrices from local STIX 2.1 JSON snapshots to power the ATT&CK Browser tool. Snapshots are refreshed manually using scripts/fetch_attck.py when MITRE publishes a new version; GitHub Actions automation is planned to handle this on build.
Update Freq.
Manual (on MITRE release)
Format
STIX 2.1 JSON (local snapshot)
Files
static/data/attck-enterprise.json, attck-ics.json
Used In
ATT&CK Browser
3 — CTI Pipeline (api.cybergrind.org)
About the pipeline: CyberGrind runs a self-hosted threat intelligence backend at api.cybergrind.org. Collectors are Python scripts running on a scheduled basis inside Docker, storing results in a local SQLite database served via FastAPI. The pipeline is exposed through a Cloudflare Tunnel. Current status is always available at /api/health.
Live U.S. Gov Public
A dedicated collector pulls the full CISA KEV catalog into the pipeline database on a 24-hour cycle, independently of the Cloudflare Worker used by the KEV Checker tool. This copy powers the Live CVEs tool, which provides filterable table views with overdue remediation highlighting.
Collector
app/collectors/cisa.py
Schedule
Every 24 hours
Endpoint
/api/cves
Used In
Live CVEs tool
Live Public
URLhaus tracks malware distribution URLs reported by the security community. The collector fetches abuse.ch's public CSV export every hour and loads new IOC records into the pipeline database. Deduplication is applied before insert; inactive URLs are retained for historical reference.
Collector
app/collectors/abusech.py
Schedule
Every 1 hour
Endpoint
/api/iocs
Used In
Threat Intel Feeds (IOCs tab)
RSS Security News Feeds
Live Public
A news collector aggregates RSS/Atom feeds from five security-focused publications every two hours: Krebs on Security, Bleeping Computer, The Hacker News, CISA Advisories, and SANS Internet Storm Center. Article bodies are not stored — only the title, link, source, publication date, and feed-provided summary excerpt. Deduplication is performed by URL hash.
Collector
app/collectors/news.py
Schedule
Every 2 hours
Endpoint
/api/news
Used In
Threat Intel Feeds (News tab)
MalwareBazaar is abuse.ch's repository of malware samples contributed by the security community. The collector fetches recent sample metadata every six hours — SHA256, MD5, SHA1, filename, file type, tags, malware family signature, first seen date, and reporter. Binary files are not downloaded or stored; metadata only.
Collector
app/collectors/malwarebazaar.py
Schedule
Every 6 hours
Auth
Free API key (BAZAAR_API_KEY env var)
Endpoint
/api/hashes
On-Demand API Key
VirusTotal file reports are proxied on-demand through the pipeline API to protect the API key and enforce free-tier quota. When a user submits a hash in the VT Lookup tool, the request is forwarded to VirusTotal's v3 file report endpoint and the result is returned directly — no caching is currently applied, so each lookup consumes quota.
Trigger
User-initiated (per lookup)
Rate Limit
500 lookups/day (free tier)
Auth
VT_API_KEY env var (server-side only)
Endpoint
/api/vt/lookup/{hash}
A self-hosted MISP instance running in Docker on a local Ubuntu environment, subscribed to four community threat intelligence feeds: CIRCL OSINT Feed, Botvrij.eu, abuse.ch URLhaus, and Feodo Tracker. The pipeline collector queries MISP every six hours for actionable indicators (to_ids=True), pulling attributes including IP addresses, domains, URLs, and file hashes. IOCs are stored in the pipeline database with a source column to distinguish MISP-sourced indicators from abuse.ch direct feeds. On startup, a 30-day historical backfill is performed.
Collector
app/collectors/misp.py
Schedule
Every 6 hours
Endpoints
/api/misp/iocs, /api/misp/search, /api/misp/threat
Used In
Threat Intel Feeds (MISP tab), MISP IOC Lookup tool
4 — Reference & Educational Content
Reference U.S. Gov Public Domain
Primary source publications from the National Institute of Standards and Technology used as the factual foundation for Orange Book educational content. This includes NIST Cybersecurity Framework 2.0 (NIST CSWP 29), Special Publication 800-53 Rev. 5, FIPS 197 (AES), and supporting documents. NIST publications are in the public domain. All Orange Book articles derived from NIST sources include full reference lists with direct links to the primary documents.
Type
Primary reference
License
U.S. Public Domain
Format
PDF / HTML publications
Used In
Orange Book articles
Live API
A news aggregation API used to fetch cybersecurity headlines for the daily news posts published in the News section. Headlines are pulled from a curated set of security-focused publications and processed locally using Ollama (Llama 3.2) to generate practitioner commentary. The AI commentary is clearly identified and is generated from the provided headlines only — the model is explicitly instructed not to reference events outside the provided input to reduce hallucination risk.
Update Freq.
Daily (11am CT, automated)
Commentary
Llama 3.2 (local, Ollama)
Format
REST API (JSON)
Used In
Daily News posts
5 — Methodology
6 — Known Limitations
This page was last reviewed April 2026. Sources and methodology are updated as the site evolves. If you identify an inaccuracy or have questions about data sourcing, the GitHub repository is publicly available.
7 — Licensing & Attribution
CyberGrind is a non-commercial personal portfolio and educational resource. No data collected through these sources is sold, redistributed, or used for purposes outside of site functionality and security education.