Direct answer
Are all public examples safe? They are sanitized and selected for explanation rather than operational reuse.
Always redacted publicly
Raw operational IOCs that could facilitate abuse, raw secrets, victim data, private tokens, credentials, exploit-enabling kit details and sensitive active-OSINT artifacts are not published on public pages.
What is shown
Public pages show sanitized examples, source families, aggregate cards, charts, methodology, confirmation-state concepts and citation metadata.
Authenticated boundary
Authorized platform users can access operational IOCs and evidence according to role and policy, except raw secrets, tokens, private keys and victim data.
How PhishNet uses this
Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.
Selected sources and research
These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.
Common questions
Are all public examples safe?
They are sanitized and selected for explanation rather than operational reuse.