Skip to main content

Documentation Index

Fetch the complete documentation index at: https://chainpatrol.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

Why ChainPatrol

ChainPatrol combines automated detection, AI‑assisted analysis, and human review to protect brands and users from phishing and abuse — across 50+ platforms — and pushes block decisions to the places your users actually are (wallets, browsers, DNS resolvers, hosting providers). Fast path to protection: suspicious content is detected, analyzed, reviewed, and when confirmed as a threat, protection is deployed across all major platforms within seconds to minutes. Threat Detection Pipeline

1) How threats enter the system

  • Human reports (web & Slack)
    • Your team can submit suspicious URLs, addresses, and profiles through our web interface or directly from Slack
    • We verify submissions and provide instant feedback if content is already being monitored
    • Each submission becomes a report for our team to review
  • Automated detection (50+ platforms)
    • We continuously scan major platforms (Google, YouTube, Twitter, app stores, Telegram, TikTok, and more) for threats targeting your brand
    • When we find suspicious content, we automatically create reports for review

2) Content processing

  • We analyze and categorize all submitted content (URLs, addresses, social profiles, etc.) into our threat database
  • We identify relationships between different pieces of content to build a complete picture of threats
  • Duplicate submissions are automatically merged to avoid redundant work
  • Invalid or inappropriate submissions are filtered out automatically

3) Report creation and tracking

  • Each threat becomes a report that our team reviews and tracks through completion
  • Reports include all relevant evidence (screenshots, metadata, related content)
  • You can see the status of all reports in your dashboard (Pending → In Review → Completed)
  • Reports are processed immediately, even for automatically detected threats

4) Threat analysis

  • We gather additional information about each threat (website content, domain details, social media activity, etc.)
  • Our AI analyzes the content to determine threat type (phishing, brand impersonation, etc.) and confidence level
  • We set custom threat thresholds for your organization to match your risk tolerance
  • We automatically discover and analyze related threats to build a complete threat picture

5) Block decisions

  • When we confirm a threat, we immediately update our blocklist and begin the process of protecting your users
  • This decision triggers automatic distribution to all our partner platforms and services

6) Protection distribution

Within minutes of detecting a malicious domain, ChainPatrol data is sent across integrations to send warnings to end users
  • Blocklist Integrations
    • Once a domain is identified as malicious, it goes on the ChainPatrol block list.
    • These domains are blocked across 20+ crypto wallets in minutes, including Metamask and Phantom.
    • We also blocklist domains across Google Safe Browsing, reaching Chrome and other browsers.
    • DNS providers like Quad9 and others increase the reach of our network
    • Any user visiting the malicious link is shown a warning.
  • Blocklist Speed
    • Wallets and many other integration partners blocklist domains within minutes
    • Google Safe Browsing takes a 1-2 hours to show warnings from initial flagging
  • Public Blocklist API
    • We maintain a public list of blocked threats that any service can use, our goal is to work with security partners to protect every user

7) Protection verification

  • We continuously monitor that our blocks are active across all partner platforms
  • You can see exactly where your threats are being blocked and how quickly protection was deployed
  • This gives you confidence that your users are protected everywhere they go

8) Automated takedowns

  • We automatically request takedowns from hosting providers, domain registrars, and social platforms
  • We work with major providers including Cloudflare, Vercel, GoDaddy, Squarespace, Firebase, and many others
  • For social platforms like Telegram and Twitter, we combine human analysts and automated reporting systems
  • We track takedown progress and avoid duplicate requests

9) Metrics and Executive reporting

  • We generate clear, executive-ready reports showing threats detected and actions taken
  • Reports use plain language suitable for sharing with stakeholders and management
  • You can customize reporting frequency and content to match your needs

10) 24/7 infrastructure

  • Our systems run continuously with automatic failover and redundancy
  • We use rate limiting and security measures to protect against abuse
  • All actions are logged and auditable for compliance and transparency
  • We maintain strict security standards for all data and operations

What to expect as a customer

  • Coverage: 50+ platforms with rapid additions upon request.
  • Speed: seconds to minutes from approval to ecosystem propagation, depending on partner SLAs.
  • Control: per‑org thresholds, allow/block decisions, and automated takedowns toggles.
  • Clarity: snapshots and dashboards that speak in plain language, ready to forward to stakeholders.

Glossary

  • Asset: normalized representation of content (URL, address, profile, etc.).
  • Proposal: a requested status change (Block/Allow/Unknown) on an Asset.
  • Enrichment: structured metadata collected during scans (DNS/HTTP/WHOIS/etc.).
  • Consumption: evidence that a downstream consumer has adopted our block.

Integrations (sample)

  • Wallets/browsers/resolvers: MetaMask (Eth‑Phishing‑Detect), Google Safe Browsing, Quad9
  • Hosting/DNS: Cloudflare, Vercel, GoDaddy, Registrar.eu, Hostinger, Porkbun, OpenProvider, OVH, Webflow, Weebly, Netlify, Firebase, Squarespace, and more
  • Community lists: SEAL‑ISAC, Polkadot Phishing
If you need a new provider or platform covered, reach out — we typically add integrations in days, not weeks.