Skip to main content
Glama
KasperskyLab

Kaspersky OpenTIP MCP Server

Official
by KasperskyLab

search_domain

Analyze web domains for security threats using Kaspersky's threat intelligence data to identify potential risks and malicious activity.

Instructions

Get threat intelligence data about a web domain

Input Schema

NameRequiredDescriptionDefault
domainYes

Input Schema (JSON Schema)

{ "properties": { "domain": { "title": "Domain", "type": "string" } }, "required": [ "domain" ], "type": "object" }

Implementation Reference

  • MCP tool registration for 'search_domain' using @mcp.tool decorator with description and ToolAnnotations.
    @mcp.tool( description="Get threat intelligence data about a web domain", annotations=ToolAnnotations( title="Investigate a domain", readOnlyHint=True, openWorldHint=True, ), )
  • The handler function that executes the 'search_domain' tool: validates input implicitly via type, prepares params, and calls the OpenTIP API via helper.
    async def search_domain(domain: str) -> dict[str, Any] | None: """Get threat intelligence data about a web domain Args: domain: domain that you want to investigate """ params = {"request": domain} return await opentip_request(Endpoints.search_domain, "get", params)
  • Core helper function used by search_domain to make authenticated HTTP GET requests to the OpenTIP API endpoint.
    async def opentip_request( endpoint: str, request_type: RequestType = "get", params: Optional[dict[str, Any]] = None, content: Optional[bytes] = None, headers: Optional[dict[str, str]] = None, ) -> dict[str, Any]: """Make a request to the OpenTIP API with proper error handling.""" headers = headers or {} headers = { "user-agent": "opentip-mcp-client", "x-api-key": OPENTIP_API_KEY, **headers } async with httpx.AsyncClient() as client: try: url = f"{OPENTIP_API_BASE}{endpoint}" if request_type == "get": response = await client.get( url, headers=headers, params=params, timeout=OPENTIP_API_TIMEOUT ) elif request_type == "post": response = await client.post( url, headers=headers, params=params, content=content, timeout=OPENTIP_API_TIMEOUT ) response.raise_for_status() return response.json() except httpx.HTTPStatusError as e: if e.response.status_code == 400: return {"result": "error", "error_message": "Invalid parameters. Please check your input and try again."} elif e.response.status_code == 401: return {"result": "error", "error_message": "Authentication failed. Please ensure that you have provided the correct credentials and try again."} elif e.response.status_code == 403: return {"result": "error", "error_message": "Quota or request limit exceeded. Check your quota and limits and try again."} else: return {"result": "error", "error_message": str(e)} except Exception as e: # noqa return {"result": "error", "error_message": str(e)}
  • Endpoint path definition for search_domain tool in the Endpoints StrEnum.
    search_domain = "search/domain"

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/KasperskyLab/threat-intelligence'

If you have feedback or need assistance with the MCP directory API, please join our Discord server