Unclear, but I think it might have been something like, find out (via reverse IP lookups) which big companies depend on which gems, and then use that information to market consulting services to those companies.
That description is not sinister. Its just marketing. An example of sinister would be to sell those logs to someone who could instigate a supply chain attack targeting some of those companies.