{"id":93353,"date":"2026-01-20T21:10:55","date_gmt":"2026-01-20T18:10:55","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=93353"},"modified":"2026-01-20T21:15:13","modified_gmt":"2026-01-20T18:15:13","slug":"chainalysis-unveils-tool-for-automating-blockchain-threat-monitoring","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/chainalysis-unveils-tool-for-automating-blockchain-threat-monitoring\/","title":{"rendered":"Chainalysis Unveils Tool for Automating Blockchain Threat Monitoring"},"content":{"rendered":"<p>Chainalysis <a href=\"https:\/\/www.chainalysis.com\/blog\/workflows-no-code-automation-blockchain-insights\/\" title=\"\">announced<\/a> the Workflows feature, which automates the process of on-chain analysis and the detection of network vulnerabilities.<\/p>\n<p>The tool enables researchers and blockchain security teams to initiate pre-programmed actions without coding, reducing reliance on custom databases using <span data-descr=\"a standardized query language for managing and working with relational databases\" class=\"old_tooltip\">SQL<\/span> or Python.<\/p>\n<p>According to Chainalysis, the solution is designed to standardize common investigative processes through pre-built templates.<\/p>\n<p>Workflows incorporates no-code interactive tools that assist users in conducting in-depth blockchain analysis through a simple interface.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"542\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747-1024x542.png\" alt=\"image\" class=\"wp-image-273704\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747-1024x542.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747-300x159.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747-768x406.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747-1536x812.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-52b2138f547bc53b-4146826186726747.png 1902w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Workflows interface. Source: Chainalysis.<\/figcaption><\/figure>\n<p>The feature already supports several workflows:\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>time and amount analysis:<\/strong> narrows down potential matches when funds are deposited\/withdrawn from a platform for quick tracking of transactions of interest;<\/li>\n<li><strong>common counterparties analysis:<\/strong> identifies interaction patterns among blockchain users;<\/li>\n<li><strong>targeted search for wallets and clusters:<\/strong> helps find addresses that precisely match the &#8220;fingerprints&#8221; of malicious actors.<\/li>\n<\/ul>\n<p>Over time, Chainalysis plans to expand the toolset to hundreds of workflows and mini-applications.\u00a0<\/p>\n<p>Earlier, Chainalysis experts <a href=\"https:\/\/forklog.com\/en\/news\/losses-from-crypto-hacks-reached-3-4bn-in-2025\">estimated<\/a> the damage from hacks in 2025 at $3.4 billion, with over $2 billion attributed to North Korean hackers.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chainalysis announced the Workflows feature, automating on-chain analysis and network vulnerability detection.<\/p>\n","protected":false},"author":1,"featured_media":93354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Chainalysis introduces Workflows for automated blockchain threat monitoring.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[274,1111],"class_list":["post-93353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-chainalysis","tag-cybersecurity"],"aioseo_notices":[],"amp_enabled":true,"views":"182","promo_type":"1","layout_type":"1","short_excerpt":"Chainalysis introduces Workflows for automated blockchain threat monitoring.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=93353"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93353\/revisions"}],"predecessor-version":[{"id":93355,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93353\/revisions\/93355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/93354"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=93353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=93353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=93353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}