Audience path

For telecom and smishing teams

Telecom teams need sender IDs, callback numbers, shortlinks, carrier timing and country-language lure patterns. PhishNet models smishing as routes: SMS text, shortlink expansion, final domains, phones, QR payloads, liveness and Belgian brand pressure.

Direct answer

Can this audience use PhishNet without a platform account? Yes. Public research, dashboards, reports, data products, citations and media assets are available without login; operational datasets require access.

The audience problem

Telecom teams need sender IDs, callback numbers, shortlinks, carrier timing and country-language lure patterns.

What PhishNet uniquely observes

PhishNet models smishing as routes: SMS text, shortlink expansion, final domains, phones, QR payloads, liveness and Belgian brand pressure.

Public-safe evidence

These pages surface only sanitized cards, trend snippets, source families and methodology. Operational IOCs, evidence and graph pivots stay in the authenticated platform.

Best next step

Use the smishing route data product and request a smishing intelligence briefing.

How PhishNet uses this

Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.

Selected sources and research

These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.

Common questions

Can this audience use PhishNet without a platform account?

Yes. Public research, dashboards, reports, data products, citations and media assets are available without login; operational datasets require access.

Does public browsing trigger collection?

No. Public pages read cached snapshots and static research only.

Related reading