Provides visual analysis capabilities by integrating with Google Vision to analyze images and perform visual detection tasks.
Enables checking the reputation of URLs and accessing threat intelligence data through the VirusTotal API to identify malicious activity.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@OSINT MCP ServerCheck if the email user@example.com has been compromised in any data breaches."
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
OSINT MCP Server
A comprehensive Model Context Protocol (MCP) server providing a wide range of OSINT (Open Source Intelligence) tools.
Features
IP Intelligence: Geolocation (ip-api.com), Shodan, GreyNoise, AlienVault OTX, MAC Address Lookup
Domain Intelligence: WHOIS (RDAP, Shodan, History), DNS (Robtex, HackerTarget, Direct), SSL Certificates (crt.sh), Subdomain Enumeration, Wayback Machine (Archive.org)
Social & Identity: GitHub (Profile, Repos, Commit Emails, Repo Commits), Reddit (Profile, Posts), Fandom (Profile, Contributions), Username Search (20+ platforms), Keybase Lookup
Web Intelligence: Technology Stack Detection, Social Metadata Scraping, Wayback Machine, Exa Search, VirusTotal, EXIF Metadata Extraction
Email OSINT: HaveIBeenPwned, Hunter.io, Email Permutator, Domain Email Search, Social Profile Check (Gravatar)
Crypto & Phone: Bitcoin/Ethereum Wallet Lookup, Phone Number Intelligence
Image OSINT: Reverse Image Search (SauceNAO), Image Tagging (Imagga), Visual Analysis (Google Vision), EXIF Metadata
Prerequisites
Node.js 20+
API Keys for various services (optional but recommended for full functionality)
Installation
Clone the repository
Install dependencies:
npm installBuild the project:
npm run build
Configuration
You can configure API keys using environment variables or a config.json file in the root directory.
Example config.json
{
"SHODAN_API_KEY": "your_shodan_key",
"HIBP_API_KEY": "your_hibp_key",
"EXA_API_KEY": "your_exa_key",
"VIRUSTOTAL_API_KEY": "your_vt_key",
"HUNTER_API_KEY": "your_hunter_key",
"GREYNOISE_API_KEY": "your_greynoise_key",
"ALIENVAULT_API_KEY": "your_otx_key",
"SECURITYTRAILS_API_KEY": "your_st_key",
"ZOOMEYE_API_KEY": "your_zoomeye_key",
"SAUCENAO_API_KEY": "your_saucenao_key",
"IMAGGA_API_KEY": "your_imagga_key",
"IMAGGA_API_SECRET": "your_imagga_secret",
"GOOGLE_CLOUD_API_KEY": "your_google_key",
"GITHUB_TOKEN": "your_github_pat",
"WHOISXML_API_KEY": "your_whoisxml_key",
"ABSTRACT_PHONE_API_KEY": "your_abstract_key",
"PORT": 3000,
"HOST": "0.0.0.0"
}Usage
Stdio Transport (Default for many MCP clients)
node dist/index.js --stdioHTTP Transport
npm startThe server will be available at http://localhost:3000/mcp.
Tools
Tool Name | Description |
| Get geolocation data for an IP address |
| Perform RDAP WHOIS lookup for a domain |
| Lookup WHOIS history for a domain |
| Get passive DNS records from Robtex |
| Real-time DNS lookup (A, MX, TXT, etc.) |
| Lookup hostname for an IP address |
| Check if an email has been compromised (HIBP) |
| Get host details from Shodan |
| Perform WHOIS lookup via Shodan Labs |
| Lookup SSL certificates on crt.sh |
| Check URL reputation on VirusTotal |
| Perform DNS enumeration via HackerTarget |
| Find subdomains using multiple sources |
| Search for email addresses on a domain |
| Get IP context from GreyNoise |
| Get threat intel from AlienVault OTX |
| Find subdomains via SecurityTrails |
| Search hosts on ZoomEye |
| Search anime/art images on SauceNAO |
| Tag and categorize images with Imagga |
| Analyze images with Google Vision |
| Get detailed GitHub user metadata |
| List public GitHub repositories for a user |
| Extract email addresses from public events |
| Scan a specific repo for commit emails |
| Search for a username across 20+ platforms |
| Get Fandom/Wiki user data |
| List recent Fandom wiki contributions |
| Check for Wayback Machine snapshots |
| Lookup vendor for a MAC address |
| Lookup Keybase identity and linked accounts |
| Get basic Reddit user profile info |
| List recent Reddit posts for a user |
| Scrape OpenGraph and meta tags from a URL |
| Detect technologies used on a website |
| Generate possible email address combinations |
| Search for emails associated with a domain |
| Find social profiles linked to an email |
| Check Bitcoin address balance and transactions |
| Check Ethereum address balance |
| Lookup phone number carrier and location |
| Extract EXIF data from an image URL |
| Perform web search via Exa |
License
MIT