1.Used for Rule updates and predective threat intel.

2.Used for IRT for threat analysis.

3.Threat intel data are crowd sourced currently.