isitsp.am
Is it spam?
Paste the email. The graph reads its infrastructure. One verdict in seconds.
How it works
01
Read
Every email carries an infrastructure fingerprint. Domains, IPs, URLs, authentication headers. The page reads them out.
02
Cross-check
Each identifier is placed on the graph: registrar, MX, SPF, DNSSEC, ASN, threat history. In parallel.
03
Call it
The signals compose into a verdict. The rules are public. The graph is the authority.
Full methodology: how it works
You just used Whisper's Infrastructure Context. The same graph runs inside production security platforms and AI agents. 3.67 billion nodes. Sub-millisecond queries. Bring it into your stack.