Skip to main content

Platform Architecture

Chainara is composed of four integrated systems that form a closed-loop threat intelligence platform: from autonomous threat hunting all the way through to analyst tooling and downstream API distribution.

The Four Systems

SystemPurposePrimary Users
Chainara PlatformThreat operations: wallet risk scoring, domain detection, fraud intelligence, APISecurity analysts, compliance teams, developers
Chainara IntelThreat collection: AI personas gathering scammer IOCs from social platformsThreat researchers, SOC teams
Chainara DiscoveryProactive threat hunting: passively hunts new scam infrastructure, social media impersonation, and wallet IOCs across the internetRuns automatically; findings flow into Platform
Domain EngineAutomated domain analysis: 8-stage pipeline classifying and scoring every discovered domainRuns automatically; configurable by admins

How They Work Together

The Intelligence Loop

The power of this architecture is the closed-loop intelligence cycle:

  1. Discovery hunts proactively: passively queries Shodan, OTX, crt.sh, ChainAbuse, and scans social media for emerging scam infrastructure before any victim reports it
  2. Intel deploys personas: AI personas engage scammers on Discord, Twitter, and Telegram, extracting wallets, domains, and campaign details directly from threat actors
  3. Both feed the Domain Engine: every discovered domain passes through the 8-stage automated analysis pipeline
  4. Platform gets enriched: scored threats appear instantly in the threat database, visible to analysts and available via API
  5. Analysts investigate: security teams dig deeper, submit reports, and export intelligence
  6. API distributes: verified threats flow out via the Threat Feed and webhooks to SIEMs, exchanges, and compliance tools
  7. Loop continues: new intelligence sharpens future detection accuracy across all four systems

Chainara Platform

The Platform is the single pane of glass for security operations:

  • Dashboard: live threat metrics, recent activity, and KPIs
  • Wallet Analysis: deep-dive risk profiles for any blockchain address
  • Domain Intelligence: searchable database of analyzed domains with full enrichment data
  • Fraud Intelligence: aggregated fraud reports with verification workflow
  • Flow Analytics: visualize fund movements between wallets
  • Network Graph: interactive transaction relationship mapping
  • Metrics: enterprise impact tracking and reporting
  • API: full REST API for integration with SIEMs, exchanges, and custom workflows

→ Platform Documentation


Chainara Intel

The Intel platform is the active threat collection engine: AI personas deployed on social platforms engage real scammers and extract IOCs directly from their campaigns:

  • Personas: AI identities deployed across social platforms
  • Monitor: real-time feed of all active persona sessions
  • Conversations: full transcript archive with IOC extraction
  • Threats: discovered threat actors, campaigns, and artifacts
  • Artifacts: extracted wallets, domains, URLs, and invite links
  • Maps: infrastructure visualizations of scammer networks
  • Dark Web Hunter: autonomous Tor-based threat intelligence collection
  • Reports: structured intelligence reports on campaigns

→ Intel Documentation


Chainara Discovery

Discovery is the passive threat hunting engine: it proactively hunts for new scam infrastructure across the internet before any victim reports it. All reconnaissance is passive: Discovery only queries API-cached data and never makes direct connections to target infrastructure, which avoids alerting scam operators.

Discovery capabilities

What Discovery finds:

CapabilityDescription
Shodan huntingQueries Shodan's cached scan data for crypto scam patterns: XRP giveaways, wallet phishing, fake exchanges
Infrastructure pivotingGiven one known-bad domain or IP, pivots on favicon hash, SSL certificate, JARM fingerprint, and passive DNS to find all related infrastructure
Social media scanningDetects fake Instagram and YouTube accounts impersonating Ripple executives; extracts embedded wallet addresses and malicious links via OCR
ChainAbuse syncImports community-submitted blockchain scam reports
XUMM blacklist syncSyncs known-bad XRP addresses from the XUMM community blacklist
NEAR Intents analysisAnalyzes cross-chain swap transactions for money laundering patterns
Campaign systemRuns structured threat hunting campaigns (XRP phishing, wallet drainer hunting, compromised router DNS hijacking)

Output: Discovered threats are automatically routed to the Platform and Domain Engine for scoring and monitoring, with no manual intervention required.


Domain Engine

The Domain Engine runs fully automated: analysts configure rules and thresholds; the engine handles the rest:

  • 43 configurable detection rules (15 condition types)
  • 9 parallel enrichment modules completing in ~2 seconds
  • LLM-powered threat classification
  • 4-component weighted risk scoring (0–99)
  • Detection accuracy: 94.2% true positive rate, 2.1% false positive rate

→ How Domain Detection Works → Risk Scoring → Threat Categories


Data Flow Summary

Data TypeOriginDestination
Scammer walletsIntel conversationsPlatform wallet database
Scam domains / IPsDiscovery huntingDomain Engine → Platform
Social impersonation IOCsDiscovery social scannerPlatform fraud intelligence
Blockchain scam reportsChainAbuse / XUMM syncPlatform + Domain Engine
Suspicious domainsIntel artifacts + Domain Engine inputDomain Engine → Platform domain database
Fraud reportsAnalyst submissions + IntelPlatform fraud intelligence feed
Risk scoresDomain Engine scoringPlatform UI + API
Threat indicatorsPlatform verificationThreat Feed API + Webhooks
IOC intelligenceAll systemsExternal SIEMs, exchanges, compliance tools