Audience path

For abuse desks and infrastructure providers

Abuse teams need prioritized evidence, hosting/ASN recurrence, liveness, takedown context and repeat infrastructure patterns. PhishNet turns raw reports into evidence-ready cases with graph context, source provenance, screenshots, redirects and exportable handoff packs.

Direct answer

Can this audience use PhishNet without a platform account? Yes. Public research, dashboards, reports, data products, citations and media assets are available without login; operational datasets require access.

The audience problem

Abuse teams need prioritized evidence, hosting/ASN recurrence, liveness, takedown context and repeat infrastructure patterns.

What PhishNet uniquely observes

PhishNet turns raw reports into evidence-ready cases with graph context, source provenance, screenshots, redirects and exportable handoff packs.

Public-safe evidence

These pages surface only sanitized cards, trend snippets, source families and methodology. Operational IOCs, evidence and graph pivots stay in the authenticated platform.

Best next step

Use the evidence and takedown pages, then request an abuse-desk workflow demo.

How PhishNet uses this

Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.

Selected sources and research

These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.

Common questions

Can this audience use PhishNet without a platform account?

Yes. Public research, dashboards, reports, data products, citations and media assets are available without login; operational datasets require access.

Does public browsing trigger collection?

No. Public pages read cached snapshots and static research only.

Related reading