Provides file and URL reputation analysis across 70+ antivirus engines, enabling comprehensive malware detection and threat assessment through natural language queries.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@FastMCP ThreatIntelcheck the reputation of 8.8.8.8 and give me a summary"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
π‘οΈ FastMCP ThreatIntel - AI-Powered Threat Intelligence
π MCP AI Powered Threat Intelligence - Revolutionizing Cybersecurity Built by
A comprehensive Model Context Protocol (MCP) server that provides enterprise-grade threat intelligence capabilities through natural language AI prompts. Analyze IPs, domains, URLs, and file hashes across multiple threat intelligence platforms with advanced APT attribution and interactive reporting.

β¨ Why FastMCP ThreatIntel?
π― Purpose-Built for Modern Security Teams
π€ AI-First Design: Natural language queries with intelligent IOC detection
π MCP Integration: Seamless integration with Claude Desktop, VSCode (Roo-Cline), and other AI assistants
β‘ Lightning Fast: UV-powered development with optimized async processing
π’ Enterprise Ready: Production-grade Docker containers and Kubernetes support
π Multi-Source Intelligence
VirusTotal: File and URL reputation analysis with 70+ antivirus engines
AlienVault OTX: Community-driven threat intelligence and IOC feeds
AbuseIPDB: IP reputation and geolocation with abuse confidence scoring
IPinfo: Enhanced geolocation, ASN, and infrastructure data
π€ AI-Powered Analysis
Natural Language Interface: Query threats using plain English
Advanced APT Attribution: Confidence-scored attribution with MITRE ATT&CK mapping
Intelligent IOC Detection: Auto-detects IP addresses, domains, URLs, and file hashes
Context-Aware Reporting: Generates comprehensive threat intelligence reports
π Rich Reporting & Visualization
Interactive HTML Reports: Modern, responsive design with dark/light modes
D3.js Network Graphs: Visual IOC relationship mapping
Multiple Output Formats: Markdown, JSON, HTML, and STIX-compliant outputs
Export Capabilities: PDF, CSV, and JSON export for integration
π Flexible Deployment Options
π MCP Server: Direct integration with AI assistants
π» Standalone CLI: Interactive and batch processing modes
π³ Docker Container: Production-ready containerization
π¦ Python Package: Embed in your applications and workflows
ποΈ Architecture
graph TB
A[AI Assistant] --> B[MCP Protocol]
C[CLI Interface] --> D[Core Engine]
B --> D
D --> E[IOC Processor]
D --> F[Attribution Engine]
D --> G[Report Generator]
E --> H[VirusTotal API]
E --> I[OTX API]
E --> J[AbuseIPDB API]
E --> K[IPinfo API]
F --> L[APT Patterns]
F --> M[MITRE ATT&CK]
G --> N[HTML Reports]
G --> O[JSON Export]
G --> P[STIX Output]π Quick Start
Choose your preferred installation method and get started in minutes:
π pip (Fastest)
# Install from PyPI
pip install fastmcp-threatintel
# Interactive setup wizard
threatintel setup
# Analyze your first IOC
threatintel analyze 8.8.8.8 --output-format table --verboseπ³ Docker (Production Ready)
# Pull and run with your API keys
docker pull arjuntrivedi/fastmcp-threatintel:latest
docker run -e VIRUSTOTAL_API_KEY=your_key \
-e OTX_API_KEY=your_key \
arjuntrivedi/fastmcp-threatintel:latest \
analyze 192.168.1.1π₯ UV (Developer Recommended)
# Clone and install with UV
git clone https://github.com/4R9UN/fastmcp-threatintel.git
cd fastmcp-threatintel
uv sync
# Run interactive setup
uv run threatintel setup
# Start analyzing
uv run threatintel interactiveπ¦ Poetry (Traditional)
# Clone and install with Poetry
git clone https://github.com/4R9UN/fastmcp-threatintel.git
cd fastmcp-threatintel
poetry install
# Activate and run
poetry shell
threatintel analyze example.com --output-format html --open-browserβοΈ Configuration
π API Keys Setup
Get your free API keys and unlock the full potential:
Service | Status | Free Tier Limit | Get Your Key |
VirusTotal | Required | 1,000 requests/day | |
OTX | Required | Unlimited | |
AbuseIPDB | Optional | 1,000 requests/day | |
IPinfo | Optional | 50,000 requests/month |
π οΈ Environment Configuration
Create a .env file in your project directory:
# Required API Keys
VIRUSTOTAL_API_KEY=your_virustotal_api_key
OTX_API_KEY=your_alienvault_otx_api_key
# Optional API Keys (for enhanced functionality)
ABUSEIPDB_API_KEY=your_abuseipdb_api_key
IPINFO_API_KEY=your_ipinfo_api_key
# Performance Tuning
CACHE_TTL=3600 # Cache duration (seconds)
MAX_RETRIES=3 # API retry attempts
REQUEST_TIMEOUT=30 # Request timeout (seconds)π» Usage Examples
CLI Analysis
# Quick single IOC analysis
threatintel analyze 192.168.1.1 --verbose
# Batch analysis from file
threatintel batch iocs.txt --output-file report.html --output-format html
# Interactive threat hunting session
threatintel interactive
# Start MCP server for AI integration
threatintel server --host 0.0.0.0 --port 8000π MCP Integration
Integrate with AI assistants for natural language threat intelligence:
VSCode with Roo-Cline
{
"mcpServers": {
"threatintel": {
"command": "threatintel",
"args": ["server", "--port", "8001"],
"env": {
"VIRUSTOTAL_API_KEY": "your_key",
"OTX_API_KEY": "your_key"
}
}
}
}Claude Desktop
{
"mcpServers": {
"threatintel": {
"command": "threatintel",
"args": ["server"],
"env": {
"VIRUSTOTAL_API_KEY": "your_key",
"OTX_API_KEY": "your_key"
}
}
}
}π
π― AI Prompt Examples
"Analyze IP 8.8.8.8 for security threats and provide geolocation data"
"Check if domain example.com has any malicious associations"
"Perform comprehensive threat analysis on 185.220.101.1 with APT attribution"
"Generate a security incident report for these IOCs: [list]"π Documentation
π User Guides
MCP Integration - Connect with AI assistants
Python API - Programmatic integration
Performance Guide - Optimization and scaling
π οΈ Developer Resources
Development Setup - Contributing and building
API Reference - Complete API documentation
Examples Repository - Sample implementations
π What Makes It Special
**π₯ MCP Functionality **
MCP AI Powered: Cutting-edge threat intelligence automation
Revolutionizing Cybersecurity: Enterprise-grade AI-powered platform
Community-Focused: Open source with professional quality
π Production-Ready Features
Multi-Architecture Docker: ARM64 and AMD64 support
Kubernetes Ready: Helm charts and deployment manifests
Comprehensive Testing: 80%+ code coverage with CI/CD pipeline
Security First: Secure by design with best practices
β‘ Performance Optimized
Async Everything: Non-blocking I/O for maximum throughput
Intelligent Caching: Redis-compatible caching layer
Rate Limiting: Built-in API rate limit management
Batch Processing: Efficient bulk IOC analysis
π€ Contributing
We welcome contributions from the cybersecurity community!
Quick Start
# Fork and clone
git clone https://github.com/YOUR_USERNAME/fastmcp-threatintel.git
cd fastmcp-threatintel
# Setup development environment
uv sync --dev
uv run pre-commit install
# Make your changes and test
uv run pytest
uv run ruff format . && uv run ruff check .
# Submit your PR
git push origin feature/your-featureπ Complete Contributing Guide β
π License
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.
π Acknowledgments
Special thanks to the cybersecurity community and these amazing projects:
FastMCP - Excellent MCP framework foundation
VirusTotal - Comprehensive malware analysis platform
AlienVault OTX - Open threat intelligence sharing
AbuseIPDB - IP reputation and abuse reporting
MITRE ATT&CK - Threat intelligence framework
π Links & Resources
π Star this repo if you find it useful! π
π
π¦
Built with β€οΈ by