Introduction to Whisper Knowledge Graph

Overview of the Whisper Knowledge Graph — what it is, how it works, what data it contains, and what you can do with it.

Updated April 2026

Introduction to Whisper Knowledge Graph Documentation

Whisper Knowledge Graph maps the global internet into a single queryable graph. DNS records, IP addresses, BGP routing, WHOIS registration, web links, threat intelligence feeds -- all connected, all searchable, all in one place.

You query it with Cypher over a REST API at https://graph.whisper.security. See the Getting Started guide to run your first query, the Cypher Language Reference for the full schema and syntax, or the Query Cookbook for ready-to-run recipes by use case.


How It Works

Every entity on the internet becomes a node. Every observed relationship becomes an edge. A hostname resolves to an IP. That IP sits inside a network prefix. That prefix is routed by an autonomous system. That AS peers with others, operates in a country, and may show up in threat feeds. Whisper Graph captures all of it.

Whisper Graph OverviewWhisper Graph Overview

The graph contains billions of nodes and tens of billions of edges, covering DNS, BGP routing, WHOIS registration, GeoIP, web hyperlinks, SPF/DNSSEC configurations, and 40+ threat intelligence feeds.


What's in the Graph

Node types

DNS & Web: HOSTNAME, TLD, TLD_OPERATOR

IP & Routing: IPV4, IPV6, PREFIX, ASN, ASN_NAME, RIR

Registration: REGISTRAR, ORGANIZATION, EMAIL, PHONE

Geography: COUNTRY, CITY

Threat Intel: FEED_SOURCE, CATEGORY

BGP (live): REGISTERED_PREFIX, ANNOUNCED_PREFIX

DNSSEC: DNSSEC_ALGORITHM

Relationships

DNS: RESOLVES_TO, CHILD_OF, NAMESERVER_FOR, MAIL_FOR, ALIAS_OF, SIGNED_WITH

SPF: SPF_INCLUDE, SPF_IP, SPF_A, SPF_MX, SPF_EXISTS, SPF_REDIRECT

IP & Routing: BELONGS_TO, ANNOUNCED_BY, ROUTES, PEERS_WITH, HAS_NAME

Registration: HAS_REGISTRAR, PREV_REGISTRAR, REGISTERED_BY, HAS_EMAIL, HAS_PHONE, OPERATES

Geography: LOCATED_IN, HAS_COUNTRY

Web: LINKS_TO

Threat Intel: LISTED_IN


Threat Intelligence

The graph indexes 40+ threat intelligence feeds across 18 categories. IPs and hostnames that appear in threat feeds are connected to FEED_SOURCE nodes via LISTED_IN edges. Each FEED_SOURCE belongs to one or more categories (e.g., "C2 Servers", "Phishing", "General Blacklists").

The CALL explain() procedure gives a full threat and reputation assessment for any IP, domain, ASN, or CIDR prefix. It computes a composite score that factors in feed count, feed weights, recency, and network-level threat density.

-- Check which threat feeds list an IP
MATCH (ip:IPV4 {name: "185.220.101.1"})-[:LISTED_IN]->(f:FEED_SOURCE)
RETURN ip.name, f.name

-- Get a scored threat assessment
CALL explain("185.220.101.1")

ASN nodes also carry aggregate threat statistics across all their routed prefixes, so you can quickly gauge the reputation of an entire network with CALL explain("AS60729").


Historical Data

The CALL whisper.history() procedure gives you WHOIS and BGP routing history for any indicator. For domains, that means registrar changes, nameserver changes, and registration dates over time. For IPs, prefixes, and ASNs, it returns BGP origin changes, prefix announcements, and withdrawals.


Use Cases

SOC analysts and incident responders -- Triage suspicious IPs, trace network ownership, check threat feeds, and build evidence chains for incident reports.

Threat intelligence analysts -- Map campaign infrastructure through shared hosting, WHOIS pivots, nameserver clustering, and domain history analysis.

Penetration testers and red teams -- Passive reconnaissance: subdomain enumeration, IP range discovery, mail server mapping, SPF chain analysis, and CNAME following.

Brand protection teams -- Find lookalike domains, map phishing clusters, check threat feed status, and trace shared infrastructure.

DNS and email security engineers -- Audit nameserver configurations, trace SPF authorization chains, check DNSSEC deployment, and batch-audit domain portfolios.

Network and BGP engineers -- Profile ASN routing footprints, analyze peering relationships, track prefix announcements, and investigate allocation blocks.

Compliance and risk teams -- Verify domain registrars, check jurisdictional exposure, build security profiles, and pull WHOIS history for audit trails.

Cyber insurance and third-party risk -- External posture snapshots, threat exposure checks, hosting provider identification, and standardized threat scores.

Law enforcement investigators -- Document IP attribution chains, ownership records, related domain discovery, and timestamped evidence for legal process.

Security researchers -- Explore graph schema, study internet topology, analyze peering degree distributions, and measure web graph properties.


Getting Started

Ready to start querying? Check out the Getting Started guide to get an API key and run your first query. Then explore the Cypher Language Reference for the full schema and syntax, or jump straight to the Query Cookbook for ready-to-run recipes. If you prefer natural language queries, set up the MCP Client to query WhisperGraph directly from Claude, Cursor, or your favorite AI tool.