Free. Open Source. One Command.

Stop paying $2K/month for a SIEM

Enterprise-grade security monitoring with AI-powered threat detection, 52 detection rules, and tamper-proof blockchain log anchoring. Installs in 60 seconds.

Install the SIEM Server
curl -sSL https://threatchain.io/install | sudo bash
Ubuntu 22+, Debian 12+, RHEL 9+, Fedora 38+, macOS 13+. Takes ~60 seconds.
Install an Agent (on each server you monitor)
curl -sSL https://threatchain.io/install-agent | sudo bash -s -- --server https://YOUR_SIEM_IP:8403 --token YOUR_TOKEN
Mutual TLS. Agent generates its own key pair. Token is single-use.
View source on GitHub →

What You Get

🤖

AI Security Analyst

Claude, GPT, Ollama, or any OpenAI-compatible LLM. Triage alerts, hunt threats, analyze events in natural language.

🛡

52 Detection Rules

Sigma-compatible YAML rules. SSH brute force, privilege escalation, lateral movement, data exfiltration, and more.

🔍

AV Scanner

Scans against 9M+ known malware hashes. Batch processing at 1,591 files/sec. No signature updates needed.

📊

Vulnerability Scanner

Checks installed packages against 27K+ CVEs. Auto-generates remediation commands for your package manager.

Blockchain Anchoring

Merkle root of all log hashes anchored on Arbitrum every 5 minutes. Tamper-proof. Auditor-verifiable.

🔒

mTLS Everywhere

EC P-256 certificates. Private CA generated at install. Agent keys never leave the host. Zero trust by default.

📋

STIG Compliance

50 DISA STIG checks (15 CAT I, 20 CAT II, 15 CAT III). Reads actual system configs. Real compliance, not checkboxes.

📁

File Integrity Monitor

SHA-256 baselines of critical files. Alerts on any change. Catches backdoors, config tampering, unauthorized modifications.

📡

Multi-Tenancy

Isolate teams, agents, and data. RBAC with 5 roles and 47 permissions. SSO/LDAP/SAML 2.0 authentication.

ThreatChain vs Enterprise SIEMs

ThreatChainSplunkElastic SIEM
PriceFree$2K+/mo$1K+/mo
Install time60 secondsDays-weeksHours-days
AI AnalystBuilt-inAdd-on ($$$)Limited
AV Scanner9M+ hashesNoNo
Vuln Scanner27K+ CVEsNoLimited
Log IntegrityOn-chain proofTrust the serverTrust the server
Open SourceMIT LicenseNoPartial
Agent AuthmTLS (EC P-256)Token-basedToken-based

How It Works

1

Install the server

One command. Generates your private CA, creates TLS certificates, sets up the database, starts the dashboard on port 8403. You get admin credentials and an enrollment token.

2

Enroll agents

Run the agent installer on each server. It generates a key pair, enrolls with the server using the one-time token, receives a signed certificate, and starts monitoring. All traffic is mTLS-encrypted.

3

Monitor everything

Agents collect syslog, watch files, monitor processes, scan for vulnerabilities and malware, and check STIG compliance. The server correlates events, fires detection rules, and the AI triages alerts.

4

Prove it happened

Every 5 minutes, a Merkle root of all log hashes is anchored on Arbitrum. Anyone — auditors, regulators, incident responders — can independently verify a log existed at a specific time.

Get Started — View on GitHub

MIT License. Free forever. No signup required.

Want lifetime Pro access? Become a Founding Member →