Server data from the Official MCP Registry
13 security recon tools for AI agents — DNS, SSL, HTTP, email, ports, ASN. Health Score 0-100.
13 security recon tools for AI agents — DNS, SSL, HTTP, email, ports, ASN. Health Score 0-100.
Valid MCP server (5 strong, 11 medium validity signals). 1 known CVE in dependencies Package registry verified. Imported from the Official MCP Registry.
11 files analyzed · 2 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: DECHONET_URL
Environment variable: DECHONET_LOCALE
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-node-man-dechonet-mcp": {
"env": {
"DECHONET_URL": "your-dechonet-url-here",
"DECHONET_LOCALE": "your-dechonet-locale-here"
},
"args": [
"-y",
"dechonet-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
Domain security reconnaissance tools for AI agents via Model Context Protocol.
13 security tools — DNS, SSL, HTTP headers, email auth, port scan, propagation, reverse DNS, ASN/BGP, RDAP/WHOIS, subnet calc, and comprehensive security scan — callable from Claude Desktop and any MCP-compatible AI agent.
Add to your claude_desktop_config.json:
{
"mcpServers": {
"dechonet": {
"command": "npx",
"args": ["-y", "dechonet-mcp"]
}
}
}
Or if installed locally:
{
"mcpServers": {
"dechonet": {
"command": "node",
"args": ["/path/to/dechonet/mcp/build/index.js"]
}
}
}
Config file location:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonRestart Claude Desktop. You'll see the DechoNet tools icon in the input area.
# Via npx (no install needed)
npx dechonet-mcp
# Or install globally
npm install -g dechonet-mcp
| Tool | Description |
|---|---|
security_scan | Comprehensive scan — 9 checks in parallel, 0-100 Health Score, A-F grade |
dns_lookup | DNS records + DNSSEC + SPF/DMARC validation |
ssl_check | SSL/TLS certificate, chain, TLS version, A-F grade |
http_security | HTTP redirect trace + 10 security headers audit, A-F grade |
email_auth | SPF, DMARC, DKIM, BIMI, MTA-STS, DANE + blacklist check |
port_scan | Open TCP ports with service identification |
dns_propagation | DNS propagation across 8+ global resolvers |
reverse_dns | PTR record + FCrDNS verification |
asn_lookup | ASN/BGP network identification + abuse contact |
whois_lookup | RDAP/WHOIS domain registration data |
ip_info | Public IP, ISP, ASN, proxy detection |
email_header_analysis | Email delivery route tracing + auth results |
subnet_calc | CIDR subnet calculator (offline) |
Once connected, try asking Claude:
For remote/HTTP-based MCP connections:
cd mcp
npm run start:sse
# Server runs on http://localhost:3100
# SSE endpoint: http://localhost:3100/sse
cd mcp
npm install
npm run build # TypeScript → build/
npm run dev # Run with tsx (stdio)
npm run start:sse # Run SSE server
The MCP server calls DechoNet's public API (https://dechonet.com/api/util/*) and returns structured results with:
All data comes from public sources (DNS, HTTP headers, SSL certificates, RDAP). No active exploitation.
| Variable | Default | Description |
|---|---|---|
DECHONET_URL | https://dechonet.com | API base URL |
DECHONET_LOCALE | en | Response language (en or ko) |
PORT | 3100 | SSE server port |
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.