Threat Detection & Capture documents how Formant’s monitoring linked a
harassment submission to live network activity. The sender spoofed an email identity, but
did not spoof location—letting us associate their form post with real
geolocation pings and Cloudflare request details. This ties the message to a Mount Royal
University student footprint and correlates with the same time-window probes recorded in our logs.
For months, analytics quietly logged automated probes (primarily from an Ireland-based
botnet). On August 7, 2025, the pattern escalated—human-driven hits and a targeted
strike originating from Los Angeles appeared alongside these artifacts, all preserved here.
Tracked, Logged, Preserved
Our custom bot trap systems and firestoreMirror.js logging recorded everything: IP address, geo-location, timestamp, and user agent — down to the second. This entry is now part of our active threat report archive.