isitsp.am

Is it spam?

Paste the email. The graph reads its infrastructure. One verdict in seconds.

We never store the input. Processed in-memory and discarded.

01
Read

Every email carries an infrastructure fingerprint. Domains, IPs, URLs, authentication headers. The page reads them out.

02
Cross-check

Each identifier is placed on the graph: registrar, MX, SPF, DNSSEC, ASN, threat history. In parallel.

03
Call it

The signals compose into a verdict. The rules are public. The graph is the authority.

Full methodology: how it works

You just used Whisper's Infrastructure Context. The same graph runs inside production security platforms and AI agents. 3.67 billion nodes. Sub-millisecond queries. Bring it into your stack.