Why ChainPatrol
ChainPatrol combines automated detection, AI‑assisted analysis, and human review to protect brands and users from phishing and abuse — across 50+ platforms — and pushes block decisions to the places your users actually are (wallets, browsers, DNS resolvers, hosting providers). Fast path to protection: suspicious content is detected, analyzed, reviewed, and when confirmed as a threat, protection is deployed across all major platforms within seconds to minutes.
1) How threats enter the system
-
Human reports (web & Slack)
- Your team can submit suspicious URLs, addresses, and profiles through our web interface or directly from Slack
- We verify submissions and provide instant feedback if content is already being monitored
- Each submission becomes a report for our team to review
-
Automated detection (50+ platforms)
- We continuously scan major platforms (Google, YouTube, Twitter, app stores, Telegram, TikTok, and Web3 sources) for threats targeting your brand
- When we find suspicious content, we automatically create reports for review
2) Content processing
- We analyze and categorize all submitted content (URLs, addresses, social profiles, etc.) into our threat database
- We identify relationships between different pieces of content to build a complete picture of threats
- Duplicate submissions are automatically merged to avoid redundant work
- Invalid or inappropriate submissions are filtered out automatically
3) Report creation and tracking
- Each threat becomes a report that our team reviews and tracks through completion
- Reports include all relevant evidence (screenshots, metadata, related content)
- You can see the status of all reports in your dashboard (Pending → In Review → Completed)
- Reports are processed immediately, even for automatically detected threats
4) Threat analysis
- We gather additional information about each threat (website content, domain details, social media activity, etc.)
- Our AI analyzes the content to determine threat type (phishing, brand impersonation, etc.) and confidence level
- We set custom threat thresholds for your organization to match your risk tolerance
- We automatically discover and analyze related threats to build a complete threat picture
5) Block decisions
- When we confirm a threat, we immediately update our blocklist and begin the process of protecting your users
- This decision triggers automatic distribution to all our partner platforms and services
6) Protection distribution
Within minutes of detecting a malicious domain, ChainPatrol data is sent across integrations to send warnings to end users-
Blocklist Integrations
- Once a domain is identified as malicious, it goes on the ChainPatrol block list.
- These domains are blocked across 20+ crypto wallets in minutes, including Metamask and Phantom.
- We also blocklist domains across Google Safe Browsing, reaching Chrome and other browsers.
- DNS providers like Quad9 and others increase the reach of our network
- Any user visiting the malicious link is shown a warning.
-
Blocklist Speed
- Wallets and many other integration partners blocklist domains within minutes
- Google Safe Browsing takes a 1-2 hours to show warnings from initial flagging
-
Public Blocklist API
- We maintain a public list of blocked threats that any service can use, our goal is to work with security partners to protect every user
7) Protection verification
- We continuously monitor that our blocks are active across all partner platforms
- You can see exactly where your threats are being blocked and how quickly protection was deployed
- This gives you confidence that your users are protected everywhere they go
8) Automated takedowns
- We automatically request takedowns from hosting providers, domain registrars, and social platforms
- We work with major providers including Cloudflare, Vercel, GoDaddy, Squarespace, Firebase, and many others
- For social platforms like Telegram and Twitter, we combine human analysts and automated reporting systems
- We track takedown progress and avoid duplicate requests
9) Metrics and Executive reporting
- We generate clear, executive-ready reports showing threats detected and actions taken
- Reports use plain language suitable for sharing with stakeholders and management
- You can customize reporting frequency and content to match your needs
10) 24/7 infrastructure
- Our systems run continuously with automatic failover and redundancy
- We use rate limiting and security measures to protect against abuse
- All actions are logged and auditable for compliance and transparency
- We maintain strict security standards for all data and operations
What to expect as a customer
- Coverage: 50+ platforms with rapid additions upon request.
- Speed: seconds to minutes from approval to ecosystem propagation, depending on partner SLAs.
- Control: per‑org thresholds, allow/block decisions, and automated takedowns toggles.
- Clarity: snapshots and dashboards that speak in plain language, ready to forward to stakeholders.
Glossary
- Asset: normalized representation of content (URL, address, profile, etc.).
- Proposal: a requested status change (Block/Allow/Unknown) on an Asset.
- Enrichment: structured metadata collected during scans (DNS/HTTP/WHOIS/etc.).
- Consumption: evidence that a downstream consumer has adopted our block.
Integrations (sample)
- Wallets/browsers/resolvers: MetaMask (Eth‑Phishing‑Detect), Google Safe Browsing, Quad9
- Hosting/DNS: Cloudflare, Vercel, GoDaddy, Registrar.eu, Hostinger, Porkbun, OpenProvider, OVH, Webflow, Weebly, Netlify, Firebase, Squarespace, and more
- Community lists: SEAL‑ISAC, Polkadot Phishing