All Posts
ThreatStream
1
min read

Improve Email Threat Protection with Abusix Guardian Intel: Now Available in ThreatStream

Abusix Guardian Intel is now available to trial and activate in the ThreatStream APP Store, enabling security teams to correlate Guardian Intel with other intelligence sources in ThreatStream.
Published on
November 26, 2025
Table of Contents

About Abusix Guardian Intel

Abusix Guardian Intel delivers live, actionable threat data sourced from a global sensor network monitoring abuse, spam, phishing, and malware infrastructure. Guardian Intel is particularly effective for email threat protection through the identification of compromised IPs via specialized mechanisms and monitoring of high volumes of malicious email to determine responsible IPs. Key sources of data include:

  • Honeypots - deceptive systems designed to attract and log malicious activity
  • Spamtraps - email addresses that should never receive legitimate mail
  • Sinkholes - network resources configured to capture traffic intended for malicious or defunct systems
  • SMTP Transaction Feeds - real-time and batch data collected from mail server interactions
  • Policy Blocklist Scanners & Welcomelists - tools that actively validate server behavior against policy expectations
  • Partners, ISPs, and Customer Contributions - data provided directly from trusted partners, ISPs, and customers

While many threat intelligence providers begin from network traffic or endpoint telemetry, Abusix Guardian Intel focuses on email protection. This gives Guardian Intel early visibility into phishing campaigns, spam runs, botnet proliferation, and malware distribution infrastructure, often before it hits broader discovery. For more information, check out the Guardian Intel documentation.

Activating the Abusix Feed in ThreatStream

Activating the Abusix feed in ThreatStream allows CTI teams to correlate Guardian Intel with other active intelligence sources in ThreatStream. Anomali provides additional context about the severity/confidence of potential threats, deduplicates any indicators of compromise (IoCs) that are present in other active intelligence feeds, and can seamlessly distribute this intelligence to other security tools.

Activating the feed in ThreatStream requires an active subscription for Abusix Guardian Intel, though a free trial is available and can be requested via the ThreatStream APP Store. To enable the feed, users must click on the “Abusix Threat Intelligence” tile within the ThreatStream APP Store and submit their credentials provided by Abusix.

The Abusix integration within the ThreatStream APP Store.

Get Started with Anomali ThreatStream

If you’d like to see how Anomali ThreatStream can help to contextualize, enrich, deduplicate, and distribute Abusix's Guardian Intel along with 200+ other intelligence feeds available in the ThreatStream APP Store, request a demo today.

FEATURED RESOURCES

February 17, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more

Zero-Click Remote Code Execution Flaw Affects Claude Desktop Extensions. Threat Actors Exploit SolarWinds Web Help Desk Vulnerabilities to Deploy Velociraptor. Fake 7-Zip Site Distributes Trojanized Installer Converting Systems to Proxy Nodes. ZeroDayRAT Commercial Mobile Spyware Targets Android and iOS. And more..
Read More
February 10, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more

Notepad++ Supply Chain Attack Delivers Chrysalis Backdoor. Android RAT Uses Hugging Face Platform to Host Malicious Payloads. Fancy Bear Exploits Microsoft Office Flaw in Ukraine. Nitrogen Ransomware Decryptor Fails Due to Coding Error. And more...
Read More
February 16, 2026
IT Operations
Security Operations

Data Hygiene for AI Security: Stop Ingesting Everything, Start Engineering Signal

Read More
Explore All