Product Introduction
- Definition: Whisper Internet Infrastructure AI Context is a Model Context Protocol (MCP) server and a comprehensive Internet Intelligence Platform. It is a specialized cybersecurity tool that provides real-time, graph-based context on global internet infrastructure, including BGP routing, DNS, WHOIS, GeoIP, and threat intelligence data.
- Core Value Proposition: It exists to unify fragmented internet infrastructure data into a single, queryable knowledge graph, enabling security teams and AI agents to perform complex investigations and enrich alerts with sub-millisecond latency. The core value is providing "God Mode" visibility into the interconnected relationships of IPs, domains, and networks to accelerate threat intelligence and infrastructure analysis.
Main Features
- Whisper Graph: A real-time, continuously updated knowledge graph containing 46.4 billion data points. It maps 7.4 billion nodes (IPs, domains, ASNs, etc.) and 39 billion edges (relationships like
RESOLVES_TO,ANNOUNCED_BY,REGISTERED_BY). The graph is queried using the Cypher query language, enabling complex, multi-hop relationship analysis across infrastructure layers in milliseconds. - Whisper Query (Natural Language Interface): Allows users to ask questions about internet infrastructure in natural language. This feature abstracts the complexity of the underlying Cypher query language, making the platform's powerful graph data accessible to analysts without deep technical expertise in graph databases.
- MCP (Model Context Protocol) Server Integration: This is a key deployment feature. The platform can plug into AI assistants like Claude or Cursor in under two minutes, providing these AI agents with real-time, structured internet context. This allows AI to generate investigation reports, answer infrastructure questions, and perform analysis with current data, moving beyond static knowledge cut-offs.
- Multi-Access Integration Layer: The platform provides three primary access methods: a Direct REST API for custom pipelines and automation, native integrations for existing security platforms (SIEMs, SOARs), and the AI-focused MCP server. This ensures the same unified data can be consumed in the workflow most suitable for the user.
Problems Solved
- Pain Point: The manual, time-consuming "stitching together" of ten or more separate APIs (for DNS, BGP, WHOIS, threat feeds) to get a complete picture of an infrastructure asset. This leads to slow investigations, alert fatigue, and missed connections between disparate data sources.
- Target Audience: Security Operations Center (SOC) Analysts, Threat Intelligence Researchers, External Attack Surface Management (EASM) Teams, Incident Responders, Fraud Investigators (especially in crypto/off-chain), Government and Regulatory Compliance Teams, and Developers building security tools or enrichment pipelines.
- Use Cases:
- Instant Alert Enrichment: Automatically augment security alerts with ownership, hosting history, peer networks, and threat reputation data before an analyst reviews the ticket.
- Adversary Infrastructure Mapping: Start with a single indicator (like a C2 domain) and rapidly map the full campaign infrastructure by tracing shared nameservers, registrants, and hosting patterns via graph queries.
- External Attack Surface Discovery: Identify all domains, subdomains, IPs, and associated networks belonging to an organization, including forgotten staging servers or shadow IT assets.
- AI-Assisted Reporting: Directly power AI agents to generate detailed investigation reports on domains or IPs, including ownership, risk scoring, and historical changes, in seconds.
Unique Advantages
- Differentiation: Unlike traditional threat intelligence platforms or isolated lookup tools, Whisper connects infrastructure layers (DNS, BGP, WHOIS) that are typically treated separately. It focuses on relationships between entities, not just isolated indicators of compromise (IOCs). This allows for pattern detection (e.g., BGP routing changes consistent with bulletproof hosting) that other tools miss.
- Key Innovation: The consolidation of 46.4 billion real-time data points from over 60 sources (including 39 threat feeds) into a single, coherent knowledge graph with a unified Cypher query interface. This architectural approach, combined with the sub-millisecond query performance and the pioneering integration via the MCP protocol for AI agents, represents a significant technical innovation in internet intelligence.
Frequently Asked Questions (FAQ)
- What is the Whisper MCP server and how do I use it with Claude? The Whisper MCP server is a software component that connects the Whisper Internet Intelligence graph to AI assistants using the Model Context Protocol. To use it with Claude, you typically configure the MCP server URL and authentication in your Claude desktop or development environment, enabling Claude to query real-time BGP, DNS, and WHOIS data directly within the conversation.
- How does Whisper's internet data graph differ from a standard WHOIS or DNS lookup tool? Standard tools provide isolated, siloed information. Whisper's graph connects all data types: a WHOIS lookup for a domain also instantly shows you the IPs it resolves to, the ASN hosting those IPs, the BGP prefixes announcing them, the reputation of those IPs across 40+ threat feeds, and the historical changes to all these relationships.
- What is the free tier of Whisper Internet Infra AI Context? The free tier provides access to the core platform with a limited query rate, allowing users to explore the graph, perform basic infrastructure lookups, and integrate with AI agents via MCP for personal or small-scale evaluation. Detailed rate limits and feature comparisons are available on the official Whisper Security pricing page.
- Is Whisper available for on-premises deployment? Yes, according to the documentation, Whisper is available both as a cloud-hosted service (SaaS) and as an on-premises deployment. This is crucial for organizations with strict data sovereignty requirements or those needing to integrate the platform deeply within air-gapped or highly sensitive network environments.
- What kind of queries can I run with the Whisper Cypher API? You can run complex graph queries to find, for example, all domains sharing a nameserver with a known malicious domain, trace the hosting migration of an IP block over the last 90 days, or identify all assets registered to a specific organization across different jurisdictions. The Cypher language allows for multi-hop relationship traversal that is impossible with traditional REST APIs.
