Documentation Index
Fetch the complete documentation index at: https://chainpatrol.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The watchlist is a set of assets that we monitor to see if we can action on them further in the future.Think of the watchlist as a “middle ground” between blocking and allowing: assets that need continued observation before a final decision can be made.
Why Would We Need to Watchlist Something?
Assets are added to the watchlist for two primary reasons:Inconclusive Evidence
Sometimes when we process an asset to see if it’s malicious, we don’t find enough red flags to block the asset, but we also don’t find enough green flags to allow the asset. The Gray Area:- Not Enough to Block - Insufficient evidence of malicious intent, weak or ambiguous threat indicators, could be legitimate but suspicious
- Not Enough to Allow - Asset isn’t clearly official or trusted, some concerning patterns detected, uncertainty about legitimacy
Monitoring for Takedowns
When we start the takedown process, we want to make sure that we keep tabs on the asset in order to determine when the takedown has been completed. We place every asset onto the watchlist when the takedown is in progress. This enables automated monitoring (continuous scanning to detect when asset goes offline), completion detection (automatically mark takedown as complete when asset is inaccessible), resource efficiency (no manual checking required for takedown status), and faster response (immediate notification when takedown succeeds). The Takedown Monitoring Flow:- Takedown request submitted to hosting provider or platform
- Asset automatically added to watchlist for monitoring
- Asset is scanned periodically to check liveness status
- Asset goes offline, gets suspended, or becomes inaccessible
- Takedown marked as complete, asset removed from watchlist
- Liveness Status - Is the asset still accessible, HTTP status codes, DNS resolution failures, server responses
- Provider Actions - “Suspended by provider” messages, account termination notices, content removal confirmations, domain suspension indicators
- Content Changes - Malicious content removed, page replaced with error message, redirect to different content, complete site removal
Who Would Watchlist Something?
Watchlisting can be done either manually or automatically:Manual Watchlisting
When an analyst reviews a reported asset and encounters inconclusive evidence, they can manually add it to the watchlist. Decision factors include threat indicators present but not conclusive, asset appears suspicious but needs more time to develop, waiting for asset to become accessible, and need to observe behavior over time. Who can do this: ChainPatrol security analysts, customer administrators (for their organization), and trusted reviewers.Automatic Watchlisting
Every asset is automatically added to the watchlist when a takedown is initiated. Triggers include takedown request submitted, takedown status changes to “IN_PROGRESS”, and asset needs monitoring for completion. No manual intervention required: system automatically adds to watchlist, monitoring begins immediately, and removal happens automatically when offline.How the Watchlist Works
Monitoring Frequency
Assets on the watchlist are scanned at different frequencies based on how long they’ve been monitored and their current status: UNKNOWN/ALLOWED Assets (more frequent monitoring for uncertain assets):| Time on Watchlist | Scan Frequency |
|---|---|
| < 6 hours | Hourly |
| < 24 hours | Every 2 hours |
| < 2 days | Every 4 hours |
| < 7 days | Every 6 hours |
| < 2 weeks | Every 12 hours |
| < 1 month | Daily |
| < 2 months | Every 2 days |
| > 2 months | Every 4 days |
| Time on Watchlist | Scan Frequency |
|---|---|
| < 6 hours | Every 3 hours |
| < 24 hours | Every 6 hours |
| < 2 days | Every 12 hours |
| < 7 days | Every 18 hours |
| < 2 weeks | Every 36 hours |
| < 1 month | Every 3 days |
| < 2 months | Every 6 days |
| > 2 months | Every 12 days |
Removal from Watchlist
Assets are automatically removed from the watchlist when:- Status Changes to ALLOWED - Asset confirmed as legitimate
- Asset Comes Online - Previously dead asset becomes accessible (pushed to review queue)
- 30 Days in UNKNOWN - Decay factor removes long-term uncertain assets
- Takedown Success - Asset goes offline during takedown
- Provider Suspension - Hosting provider suspends the asset
- Manual Removal - Analyst decides monitoring is no longer needed
Key Takeaways
- Watchlist solves the gray area problem: When you suspect an asset might be malicious but lack evidence to block, watchlisting lets you monitor for changes without premature action
- Automatic takedown monitoring saves manual work: Every takedown automatically adds the asset to watchlist, eliminating the need to manually check if content has been removed
- Adaptive frequency optimizes resources: Recent additions scan frequently to catch rapid changes, while stable assets scan less often to avoid wasting resources on unlikely updates
- 30-day decay prevents bloat: Assets that stay UNKNOWN for a month without becoming malicious are automatically removed, keeping monitoring focused on active threats