My investigation also revealed government servers directly interfacing with AI products, creating yet another disturbing risk to national security that is extremely difficult to reverse or mitigate.
On February 6, the Washington Post reported that DOGE fed sensitive data into AI systems while auditing the Department of Education. The specific AI product used by DOGE was not known to the Post at the time.
However, my investigation reveals that Inventry[.]ai may be one of the AI products in question, with multiple U.S. government IP addresses pointing to its REST API. This indicates a massive flow of government data being sent to the AI company’s servers.
Proof: 8 IP addresses on Amazon’s GovCloud now point to Inventry.ai’s REST API, indicating a massive firehose of data being sent to the AI company’s servers. The IP addresses are: 18.253.166.131, 182.30.117.29, 18.253.153.187, 182.30.154.252, 18.254.229.158, 18.253.160.247, 18.254.175.18, 18.254.191.201
This is a stunning breach of Americans’ privacy that likely breaks multiple federal laws, including the 1974 Privacy Act, the Federal Information Security Management Act, the E-Government Act, and the Computer Fraud and Abuse Act, among others.
As early as January 24, Elon Musk and his DOGE entourage may have had partial access to Treasury Department systems, and then obtained full access on February 2. From there, he specifically targeted the Secure Payment System housed under the Bureau of Fiscal Services, which is responsible for disbursing billions of dollars of federal funds totaling more than 20% of the entire U.S. economy. (Southern District of NY Complaint, 2025).
That same day, Treasury Department servers linked to the Secure Payment System were observed on Shodan. Reasons for the Secure Payment System’s appearance on Shodan could include server configuration changes or new services that were not previously accessible. Ultimately, we’re left with more questions than answers–why are our nation’s most sensitive systems being exposed on Beyonce’s Internet?
Further vulnerable Treasury Department systems discovered include:
1. Comptroller of the Currency’s Citrix NetScaler Gateway – enables remote access to internal applications, desktops, and data. It acts as a VPN (Virtual Private Network) or proxy for users connecting to a corporate or government network.
2. The U.S. Treasury Inspector General for Tax Administration (TIGTA) is responsible for investigating fraud within IRS programs, with divisions fighting cybercrime, fraud, and insider risk. On January 14 and continuing to present, TIGTA’s server used for conducting meetings are publicly exposed.
3. The Treasury Department’s Office of Inspector General’s Outlook Web login page is now publicly exposed. This allows attackers to attempt brute force password attacks. Once inside, hackers could exploit CVE-2024-21413 to send malicious emails that further compromise government systems. Another Treasury mail server is observed here.

Add new comment