All Posts
ThreatStream
1
min read

Improve Email Threat Protection with Abusix Guardian Intel: Now Available in ThreatStream

Abusix Guardian Intel is now available to trial and activate in the ThreatStream APP Store, enabling security teams to correlate Guardian Intel with other intelligence sources in ThreatStream.
Published on
November 26, 2025
Table of Contents

About Abusix Guardian Intel

Abusix Guardian Intel delivers live, actionable threat data sourced from a global sensor network monitoring abuse, spam, phishing, and malware infrastructure. Guardian Intel is particularly effective for email threat protection through the identification of compromised IPs via specialized mechanisms and monitoring of high volumes of malicious email to determine responsible IPs. Key sources of data include:

  • Honeypots - deceptive systems designed to attract and log malicious activity
  • Spamtraps - email addresses that should never receive legitimate mail
  • Sinkholes - network resources configured to capture traffic intended for malicious or defunct systems
  • SMTP Transaction Feeds - real-time and batch data collected from mail server interactions
  • Policy Blocklist Scanners & Welcomelists - tools that actively validate server behavior against policy expectations
  • Partners, ISPs, and Customer Contributions - data provided directly from trusted partners, ISPs, and customers

While many threat intelligence providers begin from network traffic or endpoint telemetry, Abusix Guardian Intel focuses on email protection. This gives Guardian Intel early visibility into phishing campaigns, spam runs, botnet proliferation, and malware distribution infrastructure, often before it hits broader discovery. For more information, check out the Guardian Intel documentation.

Activating the Abusix Feed in ThreatStream

Activating the Abusix feed in ThreatStream allows CTI teams to correlate Guardian Intel with other active intelligence sources in ThreatStream. Anomali provides additional context about the severity/confidence of potential threats, deduplicates any indicators of compromise (IoCs) that are present in other active intelligence feeds, and can seamlessly distribute this intelligence to other security tools.

Activating the feed in ThreatStream requires an active subscription for Abusix Guardian Intel, though a free trial is available and can be requested via the ThreatStream APP Store. To enable the feed, users must click on the “Abusix Threat Intelligence” tile within the ThreatStream APP Store and submit their credentials provided by Abusix.

The Abusix integration within the ThreatStream APP Store.

Get Started with Anomali ThreatStream

If you’d like to see how Anomali ThreatStream can help to contextualize, enrich, deduplicate, and distribute Abusix's Guardian Intel along with 200+ other intelligence feeds available in the ThreatStream APP Store, request a demo today.

FEATURED RESOURCES

January 27, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more

Evelyn Stealer Abuses Developer Tooling to Harvest Credentials. Stealthy Backdoor Abuse: PDFSider Malware Evades Detection and Enables Persistent Access. Social Media Phishing Campaign Leverages Open-Source Tools to Deploy RAT. And More..
Read More
January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
Explore All