That's completely unrelated to cyber threat intelligence, except in situations like spear phishing, where the government (or anyone else trying to protect against attacks) might want to know what domains the attempts originated from or where the malicious links point back to.
Your linked article is completely irrelevant to this conversation. Why do you think they're related? Because the government is involved in both, and both have to do with the Internet?
I get the sense you don't know what cyber threat intelligence is, which is fine, but I recommend learning a little bit more.