Release Date: March 12, 2026
Theme: Unified Search Architecture & Enhanced Investigation Workflows
We have completely redesigned the search experience to provide a more cohesive and powerful discovery tool.
Warning: To support the new unified search schema, Meilisearch indexes created with AIL versions before v6.7 will be automatically removed during the update.
Action: Users must rebuild their indexes after the update to re-populate them using the new architecture.
viewed, done, and rejected (false positive) statuses for objects in both Retro Hunt and Tracker modules..gz extension handling).domhash extraction timeout to prevent performance issues on malformed HTML.For technical support or detailed migration steps regarding the Meilisearch rebuild, please refer to the official AIL documentation.
Want to help shape the future of the project? The AIL core team will be at Hackathon.lu on April 14th & 15th, 2026 in Luxembourg.
Come hack with us, share your feedback on v6.7, and collaborate on the next generation of analysis tools. Whether you are a contributor or a power user, weâd love to see you there!
AIL is developed and maintained with the support of the European Union as part of the HOPLITE European Project.
HOPLITE aims to strengthen the capacity of law enforcement authorities to gather, analyse, and share open-source and closed-source intelligence, integrating AI-driven analysis to enhance real-time threat detection and response workflows. The project builds on previous EU-funded initiatives and enhances key components such as AIL and MISP to deliver scalable, responsible, and actionable threat intelligence capabilities for cybersecurity and public safety across EU Member States.
Law enforcement agencies willing to discover and leverage the MISP/AIL-LEA platforms can apply on the misp-lea.org website.

This version significantly expands AILâs document-processing and data-collection capabilities by introducing a hardened PDF ingestion pipeline where all PDFs are converted to PDF/A and stripped of embedded metadata before ingestion to remove malicious content.
It also allows users to browse content locally with Lacus and send captured pages directly to AIL as crawler data, along with associated browser cookies and local storage imported as a cookiejar for reuse by the crawler, while continuing to improve reliability, scalability, and analyst workflows.
The example below is an automatic conversion of PDF document processed in AIL from a chat channel where the translation is done automatically and displayed as an overlay on the original text.
The PDF metadata are also now considered as new pivot data points (e.g. author name) in AIL to allow correlation among those selectors.
PDF content is extracted and processed as markdown.
reply and forwarded_from metadata in message viewersThis release includes a large number of bug fixes across:
Dependency updates include:
A big thank you to everyone who contributed to AIL v6.6 through code, reviews, testing, and feedback.
Special thanks to: @cavedave, and @alexandercronin
AIL is developed and maintained with the support of the European Union as part of the HOPLITE European Project.
HOPLITE aims to strengthen the capacity of law enforcement authorities to gather, analyse, and share open-source and closed-source intelligence, integrating AI-driven analysis to enhance real-time threat detection and response workflows. The project builds on previous EU-funded initiatives and enhances key components such as AIL and MISP to deliver scalable, responsible, and actionable threat intelligence capabilities for cybersecurity and public safety across EU Member States.
Law enforcement agencies willing to discover and leverage the MISP/AIL-LEA platforms can apply on the misp-lea.org website.

AIL v6.5 introduces several major improvements to strengthen dark web monitoring and analysis workflows:
I2P Crawling Support
The crawler now supports I2P, extending coverage beyond Tor and traditional web sources.
Enhanced Search with Description Indexing
Search capabilities have been improved with description indexing, making it easier to discover and correlate relevant content across large datasets.
Improved Image Analysis Workflows
Image analysis has been optimized to provide more efficient processing, categorization, and contextual enrichment of visual material.
.b32.i2p).update_thirdparty.sh to installing_deps.sh for consistency.MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.

MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.
AIL now integrates with Passive SSH, allowing:
This enables deanonymization of onion services through infrastructure fingerprinting based on shared SSH keys.
None domains.psl_faup.be (Belarusian).feeder_name and pattern.psl_faup.MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.
Among the highlights are a fully revamped search engine powered by MeiliSearch, improved language detection for short text, local AI-driven image descriptions, and a yara-hunting editor tool.
Alongside the new features, AIL 6.2 brings a wave of improvements to existing functionalities:
As with every release, AIL 6.2 includes a multitude of bug fixes to improve stability and reliability. Some notable areas include:
This release wouldnât have been possible without our dedicated community and contributors. Special thanks to Sami Mokaddem, Thirion AurĂŠlien, Aaron Kaplan, NMD03 for their extensive work and valuable contributions to this version.
We encourage you to update to AIL 6.2 to take advantage of these new features and improvements.
đ Download & Documentation: AIL Project GitHub
đĄ Feedback & Contributions: As always, we welcome community feedback and contributions to make AIL even better!
MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.
At the FIRST CTI Conference 2025 in Berlin, we presented our recent work on practical pivoting strategies in threat intelligence, based on threat intelligence experiments with the AIL and MISP platforms.
The talk explores how less conventional indicatorsâsuch as cookie names, QR codes, HTTP headers (HHHash), DOM structure, and even reused Google Analytics IDsâcan uncover surprising links between threat actor infrastructure and behavior.
We also shared observations from real-world crawling and analysis using AIL, including:

Thanks to everyone who attended and shared feedback!
This work is co-funded by CIRCL and co-funded by the ECCC under the FETTA (Federated European Team for Threat Analysis) project aims to address this issue by creating a federated team that spans across borders, providing Cyber Threat Intelligence (CTI) products and tooling.
]]>AIL introduced a pre-filtering mechanism to limit the risk of potential crawling of unsafe content. This feature is now enabled by default, allowing administrators to decide whether to enable or disable it according to their specific needs.
This release significantly enhances the usability, performance, and stability of AIL Project. We encourage users to update to v6.1 for the latest improvements.
đ Download & Documentation: AIL Project GitHub
đĄ Feedback & Contributions: As always, we welcome community feedback and contributions to make AIL even better!
MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.
]]>Release Date: 2025-01-23
This release includes several new features, improvements, and bug fixes. We recommend users to upgrade to the latest version.
nb_max issue for chat messages by year.Mp4 UnidentifiedImageError.MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The projectâs central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserverâs ransomware and C2 infrastructure tracking.
Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.
]]>
redis_logger has been retired for a more modern and reliable implementation.This release is a leap forward for dark web analysts and cybersecurity professionals. With a more intuitive dashboard, enhanced tracking capabilities, and support for new object types, AIL v6.0 empowers users to handle complex investigations with greater speed and accuracy.
To upgrade, after the update, the launch script can be called doing the update automatically. Detailed instructions and documentation are available in our official repository.
Letâs shape the future of open-source dark web analysis together. Stay tuned for more updates, and as always, your feedback is invaluable to us!
]]>