LunarChain
Menu
Scroll

Building a continuously expanding open threat intelligence graph

Drag to rotate
Click to interact
Arcs show shared entities
Linked Reports
No intelligence, consider adjusting filters

LunarChain's Mission

Making open-source threat intelligence easier to search, connect, and operationalize

Large-Scale Ingestion

LunarChain continuously ingests high-volume global intelligence from open web, specialist feeds, and hard-to-monitor channels across cyber and physical security domains.

New intelligence sources are continuously onboarded to expand coverage and reduce blind spots.

Entity Correlation & Prioritization

Our intelligence graph links related entities, highlights high-signal patterns, and helps analysts prioritize the activity that matters most.

IOCs, threat actors, infrastructure, campaigns, locations, and attack patterns are linked in one model for deeper investigation and alerting.

Operational Intelligence Delivery

Intelligence is delivered through the platform and agent-ready interfaces, enabling fast lookups, automated workflows, and analyst-ready decision support.

Teams can operationalize this intelligence through structured query workflows, alerting pipelines, and real-time analysis surfaces.

Platform Architecture

How the platform turns raw reporting into usable intelligence.

Queries
Natural-Language and Structured Intelligence Queries
Query the intelligence graph with natural language, or build repeatable scheduled queries in the LunarChain platform.

Examples

Give me the latest IOCs associated with APT41
Ask the LunarChain agent to search the graph, retrieve the relevant entities, and return the intelligence in one workflow.
Give me the latest reporting on malware activity relevant to Ford in Europe
Run the request through the LunarChain agent, or schedule it through the query builder and receive alerts when new intelligence matches.
Targets
Multiple Queries, Common Intelligence Goal
A target can be built from multiple queries, allowing for deeper reporting and alerting capabilities.

Setting up targets provides richer context and enables reporting
Targets let you monitor an organization, asset, or region from multiple angles and generate reports around the findings that matter to that target.
Our Intelligence Agent
Use the LunarChain Intelligence Agent for Fast Investigations
Use natural language to query the intelligence graph, interpret results, and return linked IOCs, entities, and relationships in seconds.

Alerts
Set up automated alerting and reporting.
Real-time alerts can be triggered when new intelligence matches saved queries, enabling immediate investigation and response.

Manage the Alert Lifecycle
Alerts can be assigned, updated, commented on, and handed off across the team so investigations move with clear ownership.

A closer look at how LunarChain works

From large-scale collection to high-context threat intelligence

Reconnaissance

Broad intelligence collection

Open-source and hard-to-monitor signals are ingested, normalized, and enriched before they enter the intelligence graph.

RSS & advisoriesForums & dark webSocial chatterPaste & leaksMalware sandboxesCVE & vuln feeds
RSS & Blogs
Forums & Dark Web
Social Signals
CVE & Vuln Feeds
LunarChain
Reporting
Alerting
Intelligence

Investigation

From raw reporting to usable threat intelligence

Automated Investigation & Threat Correlation

LunarChain automates key parts of the threat intelligence pipeline, from IOC, location, tool, infrastructure, and threat actor extraction through to correlation and contextual analysis.

Threat ActorsDeployed Malware XAffecting Infrastructure Yfrom Location Z

Our Specialities

Rich IOC Extraction

LunarChain extracts and correlates a wide range of entities, from IP addresses and malware families to threat actors, locations, and attack patterns.

Deep Correlation of Intelligence

LunarChain correlates intelligence across sources to uncover hidden patterns at scale, improve signal quality, and surface activity that warrants deeper investigation.

Signal-to-Noise Optimization

LunarChain filters irrelevant chatter and low-value noise so analysts can focus on the intelligence most relevant to their organization, sector, or target set.

Agent-Assisted Investigations

LunarChain supports natural-language querying over the intelligence graph so analysts can investigate faster without losing access to structured underlying data.

Alerting

Real-time alerting for relevant threat activity across saved targets and queries

Alerting Example

Alerting Capabilities

Automated Alerting

LunarChain supports automated alerting around specific intelligence requirements, with new matches delivered as they are detected.

Alert Delivery

Receive real-time alerts through platform notifications, email, messaging, and customized reporting workflows.

Intelligent Filtering

Advanced algorithms filter out false positives and ensure you only receive actionable, high-confidence alerts.

Target Reporting

Generate reporting on tracked targets as relevant intelligence surfaces over time.

LunarChain MCP Server

Model Context Protocol access to LunarChain's intelligence graph for agentic workflows

MCP Capabilities

Protocol-Native Access

Connect any MCP-compatible client to query and traverse LunarChain graph intelligence with structured tool calls.

Agentic Investigation

Enable multi-step agents to chain retrieval, follow-up graph exploration, and contextual enrichment in one workflow.

Live Intelligence Surface

Expose near real-time cyber, geopolitical, and military intelligence context through a single MCP endpoint.

Graph-Correlated Context

Return rich entities and relationships across IOCs, actors, infrastructure, campaigns, locations, and attack patterns.

Integrate with LunarChain via MCP

Open our API docs for MCP usage, setup, and test workflows.

Open API Docs

Contact Us

Talk to us about intelligence requirements, alerting workflows, or platform access

Email

[email protected]

General inquiries, product questions, and support

Location

London, UK

Headquarters and core operations

Send us a message