Projects

The AbuseIO Foundation serves as an umbrella for several critical software projects and services designed to automate the detection, reporting, and resolution of internet abuse. While its core platform remains the primary toolkit for ISPs, the foundation has expanded its portfolio to include specialized tools for sensitive material and spam intelligence.

AbuseIO (Core Platform)

The flagship open-source toolkit for network operators. It automates the intake of abuse reports from over 30 external feeds, parses them into actionable tickets, and links them to customer data via IPAM/CRM integrations. It significantly reduces “time-to-resolution” by automatically notifying customers and providing them with a self-help portal to fix vulnerabilities. 

SCARt (Sexual Child Abuse Reporting Tool)

A specialized, free-to-use software solution developed by AbuseIO to assist CSAM organisations and law enforcement. 
  • Automates the processing of Child Sexual Abuse Material (CSAM) reports.
  • Sends Notice to Takedown (NTD) messages to site owners/hosters and automatically verifies if the illegal content has been removed.
  • Unlike the core platform, SCARt’s anti-CSAM specific code is restricted to verified organizations (such as INHOPE members) to prevent malicious misuse. 

SpamHattan

SpamHattan stands as AbuseIO’s high-capacity intelligence engine, functioning as a massive, distributed “spam trap” and honeypot network designed to capture and analyze global email threats at scale. By ingesting millions of emails daily, it provides a real-time window into the evolving tactics of malicious actors.
  • Large-Scale Ingestion: Operating as a global sensor network, SpamHattan receives millions of emails across a vast array of monitored domains, providing a statistically significant view of the current threat landscape.
  • Automated Classification: The system utilizes advanced heuristics and machine learning to instantly categorize incoming traffic into distinct threat types, such as unsolicited bulk email (spam), targeted phishing, and malware delivery.
  • Phishing URL Extraction: One of its most critical functions is the automated scraping of URLs from message bodies. These links are extracted and verified to identify active phishing sites and credential harvesting portals.
  • Malicious Content Extraction: Beyond links, SpamHattan analyzes and extracts “bad content,” including malicious attachments, suspicious headers, and forensic artifacts that reveal the origin and infrastructure behind the attacks.
  • Threat Intelligence Export: The gathered data is converted into actionable intelligence feeds (IoCs), which are shared with the security community via platforms like MISP and integrated directly into the AbuseIO ecosystem to protect network operators.

AITE (AbuseIO Threat Exchange)

AITE is a collaborative ecosystem for the secure, large-scale sharing of actionable threat data. It acts as a central hub where network operators, registrars, and security researchers exchange real-time intelligence to preemptively block infrastructure-level abuse.
  • Automated Data Exchange: AITE provides a standardized interface for members to programmatically upload and retrieve threat indicators (IPs, URLs, and malicious domains) in real-time.
  • Reputation Scoring & Validation: To ensure high data quality, the system validates incoming reports against known-good “white-lists” and assigns reputation scores to prevent false positives and “notification fatigue.”
  • Privacy-Preserving Sharing: The platform allows organizations to share sensitive abuse data with granular permissions, ensuring that intelligence reaches the right responders without compromising legal or privacy constraints.
  • Integration with MISP: AITE is deeply integrated with the Malware Information Sharing Platform (MISP), allowing for seamless synchronization of indicators of compromise (IoCs) across global security operations centers.
  • Actionable Notifications: Rather than just providing raw data, AITE converts intelligence into “ready-to-act” notifications that can be directly ingested by a provider’s firewall or AbuseIO core instance for automated mitigation.