Server data from the Official MCP Registry
Unified threat intel - OTX, AbuseIPDB, GreyNoise, abuse.ch, Feodo Tracker
Unified threat intel - OTX, AbuseIPDB, GreyNoise, abuse.ch, Feodo Tracker
Valid MCP server (2 strong, 4 medium validity signals). 2 known CVEs in dependencies (0 critical, 2 high severity) Package registry verified. Imported from the Official MCP Registry. Trust signals: trusted author (9/9 approved).
3 files analyzed · 3 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: OTX_API_KEY
Environment variable: ABUSEIPDB_API_KEY
Environment variable: GREYNOISE_API_KEY
Environment variable: ABUSECH_AUTH_KEY
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-aplaceforallmystuff-mcp-threatintel": {
"env": {
"OTX_API_KEY": "your-otx-api-key-here",
"ABUSECH_AUTH_KEY": "your-abusech-auth-key-here",
"ABUSEIPDB_API_KEY": "your-abuseipdb-api-key-here",
"GREYNOISE_API_KEY": "your-greynoise-api-key-here"
},
"args": [
"-y",
"mcp-threatintel-server"
],
"command": "npx"
}
}
}From the project's GitHub README.
MCP server providing unified access to multiple threat intelligence sources for security research and analysis.
If you're doing security research, incident response, or threat analysis, this MCP server lets you:
| Category | Capabilities |
|---|---|
| Unified Lookups | Query IPs, domains, file hashes, URLs across all sources |
| AlienVault OTX | Threat pulses, indicators of compromise, community intelligence |
| AbuseIPDB | IP reputation, abuse reports, confidence scores |
| GreyNoise | Internet noise vs targeted attacks, scanner identification |
| abuse.ch | URLhaus, MalwareBazaar, ThreatFox, Feodo Tracker |
npx mcp-threatintel-server
Or install globally:
npm install -g mcp-threatintel-server
git clone https://github.com/aplaceforallmystuff/mcp-threatintel.git
cd mcp-threatintel
npm install
npm run build
Add to your Claude Desktop config file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"threatintel": {
"command": "npx",
"args": ["-y", "mcp-threatintel-server"],
"env": {
"OTX_API_KEY": "your-otx-api-key",
"ABUSEIPDB_API_KEY": "your-abuseipdb-api-key",
"GREYNOISE_API_KEY": "your-greynoise-api-key",
"ABUSECH_AUTH_KEY": "your-abusech-auth-key"
}
}
}
}
Add to ~/.claude.json:
{
"mcpServers": {
"threatintel": {
"command": "npx",
"args": ["-y", "mcp-threatintel-server"],
"env": {
"OTX_API_KEY": "your-otx-api-key",
"ABUSEIPDB_API_KEY": "your-abuseipdb-api-key",
"GREYNOISE_API_KEY": "your-greynoise-api-key",
"ABUSECH_AUTH_KEY": "your-abusech-auth-key"
}
}
}
}
| Service | Required | Free Tier | Get Key |
|---|---|---|---|
| AlienVault OTX | Optional | Yes (unlimited) | otx.alienvault.com |
| AbuseIPDB | Optional | Yes (1,000/day) | abuseipdb.com |
| GreyNoise | Optional | Yes (limited) | greynoise.io |
| abuse.ch | Optional | Yes | auth.abuse.ch |
| Feodo Tracker | No | Yes | Public JSON feeds |
Note: Tools are dynamically enabled based on which API keys you provide. Feodo Tracker works without authentication (public JSON feeds).
"What threat intel sources are configured?"
"Show me threatintel status"
"Check if 185.220.101.1 is malicious"
"Look up this IP across all threat intel sources"
"Is evil-domain.com known to be malicious?"
"Check domain reputation"
"Look up this SHA256 hash in threat intel"
"Is this file hash known malware?"
"Check if this URL is in any blocklists"
"Show me active botnet C2 servers"
"Get Feodo tracker data for Emotet"
"Search OTX for recent ransomware pulses"
"Get latest threat intelligence pulses"
| Tool | Description |
|---|---|
threatintel_status | Check which threat intelligence sources are configured |
| Tool | Description |
|---|---|
threatintel_lookup_ip | Look up IP across all configured sources |
threatintel_lookup_domain | Look up domain across all configured sources |
threatintel_lookup_hash | Look up file hash (MD5/SHA1/SHA256) across sources |
threatintel_lookup_url | Look up URL across sources |
| Tool | Description |
|---|---|
abuseipdb_check | Check IP reputation and abuse history |
| Tool | Description |
|---|---|
otx_get_pulses | Get recent threat intelligence pulses |
otx_search_pulses | Search pulses by keyword |
| Tool | Description |
|---|---|
greynoise_ip | Check if IP is internet noise or targeted threat |
| Tool | Description |
|---|---|
urlhaus_lookup | Look up URL, domain, or IP in URLhaus |
urlhaus_recent | Get recent malware URLs |
| Tool | Description |
|---|---|
malwarebazaar_hash | Look up malware sample by hash |
malwarebazaar_recent | Get recent malware samples |
malwarebazaar_tag | Search samples by tag |
| Tool | Description |
|---|---|
threatfox_iocs | Get recent IOCs from ThreatFox |
threatfox_search | Search ThreatFox IOCs |
| Tool | Description |
|---|---|
feodo_tracker | Get active botnet C2 servers (QakBot, Emotet, Dridex, etc.) |
# Watch mode for development
npm run watch
# Build TypeScript
npm run build
# Run locally
node dist/index.js
You can use the server without any API keys - Feodo Tracker will still work. For other sources, add the appropriate API keys to your configuration.
Your API key is invalid or expired. Generate a new one from the respective service.
You've exceeded the rate limit for a service. Wait a while or upgrade your API tier.
If some sources return errors, the unified lookup tools will still return results from working sources. Check threatintel_status to see which sources are configured correctly.
Open Threat Exchange - community-driven threat intelligence platform with pulses containing indicators of compromise.
Crowdsourced IP reputation database with abuse reports from network administrators worldwide.
Identifies IPs scanning the internet vs targeted attacks. Helps reduce false positives in threat detection.
Contributions are welcome! Please see CONTRIBUTING.md for guidelines.
MIT - see LICENSE for details.
For additional threat intelligence capabilities, consider:
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by mcp-marketplace · Finance
Free stock data and market news for any MCP-compatible AI assistant.