Access

Three ways in. One graph.

Native connectors for your security stack. Full Cypher API for your pipelines. MCP for AI agents. Pick whichever fits — or use all three.

01 · Platform Connectors

Already in your security stack

Install from the marketplace. Authenticate. Whisper intelligence flows into your existing workflows — no custom code required.

PlatformStatus
SplunkReal-time infrastructure enrichment inside Splunk. Install from Splunkbase.Shipped
Microsoft SentinelNative connector for Azure Sentinel. SaaS transactable via Azure Marketplace.Shipping now
OpenCTIInfrastructure intelligence as STIX observables inside OpenCTI.Early Q2 2026
Cortex XSOARAutomate infrastructure investigation playbooks with Whisper data inside XSOAR.Early Q2 2026

More connectors in development. Using a platform we don’t support yet? Request a connector →

Whisper Console — native connector cards with status badges
Request
POST https://graph.whisper.security/api/query
Authorization: Bearer sk_live_...

{
  "query": "MATCH (h:HOSTNAME { name: $domain })
    -[:RESOLVES_TO]->(ip:IPV4)
    -[:BELONGS_TO]->(asn:ASN)
    RETURN h, ip, asn",
  "params": {
    "domain": "suspicious-domain.xyz"
  }
}
200 OK· 0.3ms
{
  "data": [
    {
      "h.name": "suspicious-domain.xyz",
      "ip.name": "185.234.xx.xx",
      "ip.threatScore": 87,
      "asn.name": "AS399629",
      "asn.org": "BL Networks"
    }
  ],
  "meta": { "nodes": 3, "edges": 2, "ms": 0.3 }
}
02 · Direct API

Full Cypher access. Any query. Any depth.

Write any Cypher query against WhisperGraph and get structured JSON back in under a millisecond. Parameterized queries, full schema introspection, and built-in procedures like explain() and whisper.history() — everything you need to build intelligence into your own pipelines.

API capabilities

  • Cypher queriesFull graph traversal with parameterized inputs
  • Built-in proceduresexplain() for threat assessment, whisper.history() for historical data
  • Graph schema introspectionDiscover entity types and relationships programmatically
Direct HTTP — standard REST. Send Cypher queries, get JSON back. No SDK required.

Prefer a visual interface?

Open the Console to explore the graph interactively — search domains, run queries, visualize relationships, and export results.

Open the Console
03 · AI Context

Give any AI agent internet intelligence

Connect your AI tools to WhisperGraph via MCP (Model Context Protocol). Your AI agent gets real-time access to internet infrastructure data — domains, IPs, certificates, hosting relationships — as live context, not stale training data.

Connect in one command
$ claude mcp add \
    --transport http \
    whisper-graph \
    https://mcp.whisper.security

We’re actively building AI Context into a full service — structured graph context for any LLM workflow, not just MCP. If you’re building AI-powered security tools, we’d love to talk.

Works with

ClaudeOpenAICursorVS CodeWindsurfAntigravity
AI + WhisperGraph
U
What’s the blast radius of 185.234.xx.xx? Which domains resolve to it and what else is hosted on the same ASN?
whisper-graphquerying…

185.234.xx.xx resolves to 14 domains, 9 of which have threat scores above 70.

The IP belongs to AS399629 (BL Networks), which hosts 1,247 other IPs. Cross-referencing shows 6 domains sharing infrastructure patterns consistent with the same campaign…

Based on live WhisperGraph data

Connect Whisper to your stack

Install a connector, query the API, or connect your AI agent. Start in under a minute.

Need help with enterprise access? Book a demo