Documentation
Whisper Security Docs
Everything you need to query the Whisper Knowledge Graph and integrate with your security tools.
Quick Links
Getting Started
Set up your account and run your first query
Cypher API Reference
Query the Knowledge Graph via the Cypher API
MCP Client Setup
Connect your AI assistant to WhisperGraph
Splunk Integration
IOC enrichment, threat intel, and attack surface monitoring
Knowledge Graph
Introduction to Whisper Knowledge Graph
Overview of the Whisper Knowledge Graph — what it is, how it works, what data it contains, and what you can do with it.
Getting Started
Get an API key, authenticate, and run your first Cypher query against WhisperGraph.
Cypher API Reference
HTTP endpoints for querying WhisperGraph — POST, GET, stats, threat intel status, infrastructure status, and error handling.
Cypher Language Reference
Graph schema, Cypher syntax, functions, procedures, threat intelligence, and best practices for querying WhisperGraph.
Cypher Query Cookbook
Ready-to-use Cypher query recipes organized by role — SOC analysts, threat intel, pentesters, brand protection, DNS/email, BGP, compliance, insurance, law enforcement, and researchers.