Where to find Services: Navigate to your organization settings → Services
Available Services
Detection
Automated scanning for threats
Monitoring & Reporting
Continuous threat intelligence
Reviewing
Expert threat validation
Admin Approval
Internal approval workflow
Wallet Blocking
Real-time wallet protection
Takedowns
Professional threat removal
Automated Takedowns
Instant takedown submission
Detection
- What It Does
- Who Needs It
- When to Enable
- Requirements
The Detection service automatically scans various sources across the internet to identify potentially malicious assets targeting your brand or organization. This includes monitoring domain registrations, social media platforms, and other channels where threats commonly appear.
Monitoring & Reporting
- What It Does
- Who Needs It
- When to Enable
- Requirements
This service continuously monitors the web for new threats to your brand, including phishing sites, scams, and impersonation attempts. When potential threats are detected, they’re automatically reported to ChainPatrol’s review system for validation and action.
Reviewing
- What It Does
- Who Needs It
- When to Enable
- Requirements
The Reviewing service ensures that ChainPatrol’s security experts manually review all detected threats for your organization. This adds a layer of human validation to confirm threats are genuine and not false positives.
Obligatory Organization Admin Approval
- What It Does
- Who Needs It
- When to Enable
- Requirements
- Configuration
This service requires your organization’s administrators to review and approve all threats validated by ChainPatrol staff before they’re added to your organization’s blocklist. You can configure which types of assets (social media, domains, wallets, etc.) require this approval.
Wallet Blocking
- What It Does
- Who Needs It
- When to Enable
- Requirements
Approved threats are added to ChainPatrol’s global blocklist, which is consumed by major cryptocurrency wallets and platforms, including Coinbase, MetaMask, and others. This prevents users from interacting with malicious addresses, domains, or contracts in real-time.
Takedowns
- What It Does
- Who Needs It
- When to Enable
- Requirements
For approved threats, ChainPatrol submits professional takedown requests to hosting providers, domain registrars, and platform administrators on your behalf. Our team handles the entire takedown process, including follow-ups and documentation.
Automated Takedowns
- What It Does
- Who Needs It
- When to Enable
- Requirements
Takedown requests are submitted automatically to hosting providers immediately after a threat is approved by ChainPatrol staff (and your organization, if Obligatory Organization Admin Approval is enabled). This provides the fastest possible response time for threat removal.
Approval Process
Service Enable Request Flow
Request Submission
Organization Members and Staff:
- Submit a request to enable the service
- Organization Owners receive an email notification
- Request appears as “Pending” in the Services page
- No changes take effect until approved
Owner Approval
Organization Owners:
- Can enable services immediately without approval
- Can approve pending requests from team members
- Receive email notifications for all service change requests
Disabling Services
Owner Actions
Organization Owners can disable any service at any time
Member Requests
Members with OrganizationServices:update permission can request to disable services
Immediate Effect
Disabling services takes effect immediately for the requesting owner
Data Preservation
Service data and history are preserved when disabled
Legal Requirements
Required Documentation by Service
| Service | Documents Required | When Needed |
|---|---|---|
| Detection | None | - |
| Monitoring & Reporting | None | - |
| Reviewing | None | - |
| Obligatory Organization Admin Approval | None | - |
| Wallet Blocking | None (but verification required) | - |
| Takedowns | Trademark proof, Authorized representative details | Before enabling |
| Automated Takedowns | Power of Attorney, Trademark registration, Main website URL | Before enabling |
Power of Attorney Requirements
For Automated Takedowns, your Power of Attorney document must:Authorization Scope
Authorization Scope
Signature Requirements
Signature Requirements
Be signed by an authorized representative of your organization
Organization Details
Organization Details
Include your organization’s legal name and contact information
Validity Period
Validity Period
Be dated within the last 12 months (recommended)
File Format
File Format
Be uploaded in PDF format to your organization settings
Trademark Documentation
For both Takedowns and Automated Takedowns:Registration Numbers
Provide trademark registration numbers or pending applications
Jurisdictions
Include jurisdictions where trademarks are registered
Ownership Proof
Demonstrate clear ownership of brand assets
Commercial Use
Provide evidence of legitimate use in commerce
Service Dependencies
Configure Your Services
Log in to your dashboard to enable and configure services for your organization