Enables searching for Bitcoin addresses and related cryptocurrency transactions in deep and dark web content through StealthMole's threat intelligence database
Provides access to Discord-related threat intelligence data and monitoring capabilities through StealthMole's deep and dark web tracking services
Allows searching for Ethereum addresses and cryptocurrency-related threats across deep and dark web sources via StealthMole's intelligence platform
Enables monitoring and searching Facebook-related threat intelligence data through StealthMole's comprehensive deep and dark web tracking capabilities
Supports deployment and version control integration for the MCP server through GitHub repositories and automated deployment workflows
Provides access to Instagram-related threat intelligence and social media monitoring through StealthMole's deep and dark web surveillance tools
Enables tracking and searching for Monero cryptocurrency addresses and related illicit activities across deep and dark web platforms
Provides comprehensive Telegram monitoring capabilities including channel searches, user tracking, and message analysis through StealthMole's Telegram Tracker API
StealthMole MCP Server
MCP (Model Context Protocol) server for accessing StealthMole threat intelligence API. Search and monitor threats across Deep & Dark Web through Claude and other MCP clients.
Features
š Comprehensive API Coverage
Darkweb Tracker (DT): Search Deep & Dark web content across 50+ indicators
Telegram Tracker (TT): Search Telegram channels, users, and messages
Credential Lookout (CL): Search leaked credentials from breaches
Compromised Data Set (CDS): Search infected device leaks from stealer malware
Combo Binder (CB): Search ID/Password combo leaks
ULP Binder (UB): Search URL-Login-Password format leaks
Ransomware Monitoring (RM): Monitor ransomware group breach incidents
Government Monitoring (GM): Monitor threats against government sector
Leaked Monitoring (LM): Monitor threats against enterprise sector
Management API: Track API usage quotas
š Authentication
JWT-based authentication with HS256 signing
Automatic token generation and management
Secure session-level credential storage
Prerequisites
Python: 3.10 or higher
StealthMole API Credentials: Get your access_key and secret_key from StealthMole
Smithery API key (optional): For deployment at smithery.ai/account/api-keys
Installation
Development Setup
Using with Claude Desktop
Add to your Claude Desktop configuration file:
MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%/Claude/claude_desktop_config.json
Replace /absolute/path/to/stealthmole-mcp with the actual path to this directory.
Available Tools
Darkweb Tracker
dt_search_targets
Get list of searchable targets for an indicator
dt_search_target
Search for specific indicator and targets
dt_search_all
Search across all targets for an indicator
dt_search_by_id
Get paginated results using search ID
dt_get_node_details
Get detailed information for a node
Telegram Tracker
tt_search_targets
Get searchable targets for Telegram indicator
tt_search_target
Search Telegram for specific targets
tt_get_node_details
Get detailed Telegram node information
Credential Lookout
cl_search
Search for leaked credentials
Example queries:
domain:example.com- All leaks for domainemail:user@example.com- Specific email leaksdomain:example.com AND after:2024-01- Recent leaks
Compromised Data Set
cds_search
Search infected device leaks
cds_get_node_details
Get detailed CDS information (requires Cyber Security Edition)
Combo Binder
cb_search
Search ID/Password combo leaks
ULP Binder
ub_search
Search URL-Login-Password format leaks
Monitoring APIs
rm_search - Ransomware Monitoring
Monitor ransomware group breach incidents
gm_search - Government Monitoring
Monitor threats against government sector
lm_search - Leaked Monitoring
Monitor threats against enterprise sector
Management
get_user_quotas
Get API usage quotas for current month
Search Query Syntax
Indicators
Darkweb Tracker supports 50+ indicators:
Network: domain, ip, tor, torurl, i2p, i2purl, url Identity: email, id, tel, kssn Financial: bitcoin, ethereum, monero, creditcard Files: document, exefile, image, hash, blueprint Social: facebook, twitter, instagram, telegram, discord Security: cve, ioc, malware
Operators
AND: Both terms must be present
OR: Either term must be present (max 3 per query)
NOT: Exclude term from results
Max total: 5 operators per query
Examples
Resources
The server provides built-in documentation resources:
stealthmole://api-info- API overview and service informationstealthmole://indicators- Complete list of Darkweb Tracker indicators
Error Handling
Common API error codes:
401- Invalid or expired token400- Invalid parameters (limit, cursor, etc.)404- Resource not found422- Bulk export required (>1M results)426- Query limit exceeded
API Limits
Darkweb Tracker: Max 100 results per request
Other APIs: Max 50 results per request
Operators: Max 3 OR, max 5 total per query
Bulk Export: Contact support for >1M results
Development
Project Structure
Running Tests
Deployment
Deploy to Smithery
Push code to GitHub
Deploy at smithery.ai/new
Configure with your StealthMole credentials
Self-Hosting
Run the server directly:
Security Notes
ā ļø Important: Keep your API credentials secure
Never commit credentials to version control
Use environment variables or secure configuration
Rotate keys regularly
Monitor API usage for anomalies
Support
StealthMole API Documentation: api.stealthmole.com
MCP Protocol: modelcontextprotocol.io
Smithery Platform: smithery.ai
License
This MCP server implementation is provided as-is. StealthMole API access requires valid subscription and credentials.
Version
Current version: 0.1.0 (November 2024) Based on StealthMole API v2.2
This server cannot be installed
remote-capable server
The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.
Enables access to StealthMole's threat intelligence API for searching and monitoring threats across Deep & Dark Web, Telegram channels, leaked credentials, and ransomware incidents. Provides comprehensive cybersecurity intelligence through natural language queries.