Tuesday, February 17, 2026

Monday Market Intelligence The Stutzman Report.

Monday Market Intelligence

The Stutzman Report.

Your weekly dose of NH real estate intel. Just the facts, ma'am.

Monday, February 17, 2026

JS
Jeff Stutzman
MBA, REALTOR®

I'm a couple of days late, buy Happy Presidents' Day, everyone, and now, Happy Lunar New Year. Hope you're doing something more fun than I am — which is staring at 550 property records and getting unreasonably excited about price-per-square-foot anomalies. (My wife says I need a hobby. I have a hobby.)

Here's the headline: 26% of active NH listings have been on the market for 90+ days, and price reductions are showing up across the board. That's not a prediction — that's just what the data says this week.

Let's dig in.

This Week by the Numbers

550 active NH listings. Here's what jumped out at us.

550
active
listings
115
avg days
on market
144
listings
90+ days
9
FSBO
listings

26% of active listings have been on the market 90+ days. 9 are listed as For Sale By Owner (FSBO).

Six Notable Listings This Week

Every week I screen the entire NH market for pricing data points that stand out — price per square foot vs. city medians, days on market, and listing type. These six had the most notable data signals this week.

Property in ManchesterBelow Median $/SF#1
Key Data Points
Listed at $211/sf • Manchester median: $306/sf
$224K delta from city median $/sf
••• Mammoth Road
Manchester, NH
Asking
$499,000
Get the Full Story
Property in NashuaBelow Median $/SFFSBO#2
Key Data Points
Listed at $298/sf • Nashua median: $407/sf
For Sale By Owner (FSBO)
$174K delta from city median $/sf
••• Black Oak Dr
Nashua, NH
3 bd • 2 ba • 1,595 sf
Asking
$475,000
Get the Full Story
Property in NashuaBelow Median $/SF#3
Key Data Points
Listed at $307/sf • Nashua median: $407/sf
$98K delta from city median $/sf
••• Brook Village Road #38
Nashua, NH
Asking
$299,900
Get the Full Story
Property in ManchesterBelow Median $/SF61 Days#4
Key Data Points
Listed at $265/sf • Manchester median: $306/sf
61 days on market
••• River Front Drive #3
Manchester, NH
Asking
$435,000
Get the Full Story
Property in BedfordFSBO#5
Key Data Points
For Sale By Owner (FSBO) • $1.5M listing
Bedford, NH • 4bd/4ba • 3,200 sf
••• Westview Rd
Bedford, NH
4 bd • 4 ba • 3,200 sf
Asking
$1,499,900
Get the Full Story
Property in WiltonFSBO#6
Key Data Points
For Sale By Owner (FSBO)
Wilton, NH • 5bd/2ba • 2,500 sf
••• Intervale Rd
Wilton, NH
5 bd • 2 ba • 2,500 sf
Asking
$550,000
Get the Full Story

Extended Days on Market

Properties with the highest days-on-market counts in our database this week. DOM is one of several data points buyers use when evaluating listings.

Residential
••• Lisbon Road, Bath NH
Single Family • 1.17 acres
$599,000
731 days
••• Francestown Road, Bennington NH
Single Family • Bennington
$700,000
213 days
••• Hawthorne Street, Plymouth NH
Single Family • 0.27 acres
$369,900
374 days
••• Highland Avenue, Claremont NH
Single Family • 0.18 acres
$279,500
371 days
Commercial
••• Main Street, Keene NH
Commercial • Now At Auction
$2,200,000
888 days
••• Hanover Street, Portsmouth NH
Mixed Use • 12,780 sf
$5,300,000
214 days
••• Newmarket Road, Durham NH
Commercial • Durham
$2,495,000
310 days
JSJeff's Corner

The data story this week: Nashua has a FSBO cluster — 9 active for-sale-by-owners across the southern tier. That's a notable concentration in one market. Our data also shows that several of those FSBOs are listed at price-per-square-foot rates well below their city's median. Make of that what you will.

On the commercial side, 64 Main Street in Keene has moved to auction after 888 days on the market. That's two and a half years. It's one of the longest-running active listings in our database.

A note on methodology: all the $/sf comparisons in this report are calculated against city-level medians from public listing data. They are not appraisals, CMAs, or broker price opinions. They're data points. Think of it as a metal detector — it beeps, you dig. What you do next is up to you and your agent.

That's all for this week. If you'd like to explore any property in more detail, our search portal has the full dataset on all 550 active NH listings.

— Jeff Stutzman, MBA, REALTOR®
Market Analyst, Monadnock Cyber, LLC | eXp Realty | NH #072365

See Something Interesting?

Get the full REFax intelligence on any property. No obligation. No pressure. Just the data.

Thursday, February 12, 2026

Superhuman Intelligence: How Beadwindow Delivers Hours of SOC Analysis in Milliseconds

Seven analytical engines, all firing in parallel, all showing their work -- and the SOC analyst walks into a finished intelligence product instead of a raw data dump. The Machine is doing more analytical work in 200ms than most commercial SIEMs do in their entire investigation workflow. That's what Superhuman Intelligence is all about.

The Problem Every SOC Analyst Knows

You're staring at an alert. "AI Detection: Port Scanning -- HIGH." The badge is red. The IP is 192.168.1.1. Now what?


If you're a human analyst, the next 45 minutes look something like this:

  1. Open a terminal. Run whois 192.168.1.1. Realize it's RFC-1918. Close the terminal.

  2. Check the DHCP table. Figure out it's the gateway.

  3. Open Wireshark. Filter by IP. Wait for it to load. Scroll through 6,000 flows.

  4. Notice 24 unique destination ports. Manually count them.

  5. Open the MITRE ATT&CK Navigator. Search for T1046. Read the technique description.

  6. Check if this IP has been seen before. Query the SIEM. Wait. Scroll. Count.

  7. Check the firewall logs. Did Firewalla see this? Did the ASA block it?

  8. Check if any external IPs were involved. Parse through NAT translations.

  9. Correlate timestamps. Build a timeline. Write it up.

  10. Brief your team lead.

That's an hour of work. Per alert. And you have 800 more in the queue.-----What If the Machine Did All of That -- On Every Alert -- Before You Even Clicked?


That's what Beadwindow v12 does. When you click into an alert investigation page, seven analytical engines fire simultaneously. By the time the page renders -- roughly 200 milliseconds later -- you're looking at the finished intelligence product.


Not raw data. Not a log dump. A synthesized assessment with reasoning.


Here's what the system produces for that same port scanning alert, automatically:Neural Analysis


Anomaly Score: 0.85

Models Used: mranv/siem-llama-3.1:v1 (Fred, SIEM Analyst)


Threat Indicators:

 - 20 ports scanned from single source [HIGH]

   "Horizontal port scanning indicates network reconnaissance"

 - 1 unique target host [LOW]

   "Single target -- could be targeted attack or service probe"

 - MITRE ATT&CK: T1046 (Network Service Discovery) [HIGH]

   "Behavioral pattern matches known adversary technique"

 - Detection confidence: 40% [MEDIUM]

   "Confidence derived from behavioral pattern matching against known attack signatures"

 - Source: 192.168.1.1 [INFO]

   "Originating IP captured from SPAN port mirror on USW-Pro-48"


Every indicator comes with a reason. Not just "what" -- why.


AI Assessment with Full Reasoning Chain"Detection engine identified Port Scanning originating from 192.168.1.1. Mapped to MITRE ATT&CK T1046 (Network Service Discovery) -- this technique is used by adversaries to enumerate network services and identify exploitable entry points. Observable evidence: 20 ports probed, 1 target host. Fred (SIEM Analyst, siem-llama-3.1) scored 85/100: HIGH confidence threat requiring immediate SOC attention. Ethel (Risk Analyst) has not yet validated this finding -- single-model assessment only. FLAGGED: Queued for manual SOC analyst review and triage."


This isn't a template. It's generated dynamically from the actual evidence, AI scores, MITRE mapping, and verdict state of each individual alert. Different alert? Different narrative. Every time.Network Evidence: PCAP-Level Pattern Analysis


The system pulls 50 related network flows and analyzes them for patterns:


PORT SCAN: 24 unique destination ports contacted --

 indicates systematic service enumeration


MULTI-TARGET: traffic to 9 distinct hosts --

 suggests automated scanning or lateral movement


Protocol breakdown: UDP: 29 flows, TCP: 21 flows


Data volume: 51.9 KB transferred (51.9 KB out, 0.0 KB in)


That asymmetric traffic pattern (51.9 KB out, 0.0 KB in) tells its own story -- outbound probing with no responses. Classic reconnaissance.Source Intelligence: Who Is This IP?


This is where it gets interesting. The system doesn't just tell you the IP address. It tells you who it is:


192.168.1.1

 [RFC-1918 Internal] [Ubiquiti USG/Gateway] [gateway]

 Reverse DNS: unifi.localdomain

 Behavior: High port and destination diversity -- consistent with

   NAT gateway or router (6,037 outbound flows, 6,805 inbound,

   4,711 unique dest ports)

 Alert History: 800 alerts (Port Scanning: 600, Reconnaissance: 200)

   First seen: 2026-02-10 | Last seen: 2026-02-11


For an internal IP, the system automatically traces external contacts -- who was this host talking to outside the network in the 30-minute window around the alert? It enriches each external contact with reverse DNS, Firewalla GeoIP data, and cross-references against the alert database.


For an external IP like 160.79.104.10 (150 alerts on file), the intelligence is even more pointed:


160.79.104.10

 [Public Internet] [scanner]

 Reverse DNS: none (hiding behind privacy/CDN)

 Behavior: Elevated port diversity suggests scanning or enumeration

 Targeted internal hosts: 192.168.1.102 (Mac Mini M4 SIEM) -- 132 flows


An external IP with no reverse DNS, scanner behavior, and 132 flows aimed directly at our SIEM server. That's actionable intelligence. That's a candidate for an abuse notification to the ISP. That's a future SWARM escalation target. IOC Cross-Referencing..


Every alert is automatically correlated against:

  • The alert corpus: "This IP has appeared in 800 total alerts"

  • Block actions: "IP was blocked via auto-response on 2026-02-10"

  • Firewall logs: "Firewall observed 47 flows, actions: allow. GeoIP: US"

  • Behavioral indicators: "20 ports scanned targeting 1 host -- moderate intensity"

Full Event Timeline


Not just "alert created." A complete chain of custody:

  1. SPAN Capture: "SPAN port (en11) captured suspicious traffic from 192.168.1.1 via USW-Pro-48 port mirror"

  2. Detection: "Alert generated: AI Detection: Port Scanning"

  3. Fred Analysis: "Fred (AI SIEM Analyst) completed analysis -- threat score: 85/100. HIGH confidence: attack pattern matches known signatures."

  4. AI Verdict: "Flagged for MANUAL REVIEW -- analyst must confirm or dismiss."

If a block action was taken, it's in the timeline. If an audit log entry exists, it's there. The full story, chronologically, with severity ratings on every event.-----The Philosophy: Show Your Work


Here's the thing about AI in security operations. The industry has spent years building black boxes. "Trust the score." "It's AI." "The algorithm detected it."


That's not good enough for a SOC.


When a human analyst investigates an alert, they build a mental model. They trace connections. They form hypotheses. They document their reasoning. And when they brief their team lead, they don't say "the score was 85." They say why.


Beadwindow v12 does the same thing. Every score has a reason. Every indicator has context. Every assessment has a narrative. The AI doesn't just detect -- it explains.


This isn't about replacing analysts. It's about giving them the finished product so they can make decisions instead of doing data entry.


The difference between a Level 1 analyst and a Level 3 analyst isn't knowledge -- it's speed. A Level 3 knows what to look for and where to find it. Beadwindow gives every analyst Level 3 speed on every alert, from their first day.-----The Numbers


Task

Human Analyst

Beadwindow v12

Identify source IP role

5-10 min

Instant

Reverse DNS + GeoIP

2-5 min

2 seconds

MITRE technique mapping

5-10 min

Instant

Network flow analysis

15-30 min

Instant

IOC cross-referencing

10-20 min

Instant

External contact tracing

15-30 min

Instant

Build investigation timeline

10-15 min

Instant

Write assessment narrative

10-15 min

Instant

Total

~90 minutes

~200 ms

That's not an optimization. That's a paradigm shift.-----What's Next?


This is the foundation. The source intelligence pipeline is ready for:

  • Abuse notifications: Automated emails to ISP abuse contacts for US-based providers hosting scanners

  • SWARM escalation: AI-coordinated multi-model threat hunting and defense on high-confidence alerts --2ndAmendmentCyber.

  • Temporal analysis: "This IP scans us every Tuesday at 3 AM" -- pattern-of-life detection

  • Reputation scoring: Aggregated threat scores that improve over time as the corpus grows

The alert investigation page isn't just a viewer anymore. It's the SOC analyst's co-pilot.-----Beadwindow is an on-premise SIEM/XDR platform built on FastAPI, running on Apple Silicon, with dual-AI analysis (Fred + Ethel), SPAN port capture, and synthesized intelligence that shows its work. Every alert. Every time.


By Jeffery Stutzman, Beadwindow Project, https://2ndAmendmentCyber.com

"F**KIN A"