Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Sherlock MCP Serversearch for compromised accounts associated with the email test@example.com"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Sherlock MCP Server
An official Model Context Protocol (MCP) server for the Covertlabs infostealer intelligence platform. Built with FastMCP.
What is Sherlock?
Sherlock provides access to Covertlabs' comprehensive database of infostealer logs, enabling security researchers and threat intelligence teams to:
Search compromised credentials by email, domain, username, or password
Investigate victims by IP address, country, or stealer family
Retrieve detailed artifacts including credentials, cookies, and browser history
Features
π 12 Search Tools - Comprehensive search capabilities across the infostealer database
π Token Authentication - Secure access via Personal Access Tokens
β‘ Stateless HTTP - Scalable, load-balancer friendly architecture
π³ Docker Ready - Production-ready containerization
Installation
Prerequisites
Python 3.11+
A Covertlabs account with API access
Your Personal Access Token from app.covertlabs.io/cli/token
Quick Start
# Clone the repository
git clone https://github.com/covertlabs/sherlock-mcp.git
cd sherlock-mcp
# Create virtual environment
python -m venv .venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Run the server
python server.pyDocker
docker compose up --buildConfiguration
Configure via environment variables:
Variable | Default | Description |
|
| Server port |
|
| Server host |
|
| API endpoint |
|
| Allowed CORS origins |
|
| Enable request logging |
Client Configuration
Cursor
Add to ~/.cursor/mcp.json:
{
"mcpServers": {
"sherlock": {
"url": "http://localhost:8080/mcp",
"headers": {
"Authorization": "Bearer YOUR_TOKEN_HERE"
}
}
}
}Claude Desktop
Add to your Claude Desktop MCP configuration:
{
"mcpServers": {
"sherlock": {
"url": "http://localhost:8080/mcp",
"headers": {
"Authorization": "Bearer YOUR_TOKEN_HERE"
}
}
}
}Available Tools
See the docs/ folder for detailed documentation on each tool and response formats.
Search Tools
Tool | Description |
| Search victims by email address |
| Search victims by domain |
| Search victims by IP address |
| Search victims by username |
| Search victims by password |
| Broad text search across all fields |
| Search by ISO country code |
| Search by stealer malware family |
Victim Detail Tools
Tool | Description |
| Get victim profile and metadata |
| Get stolen credentials |
| Get stolen browser cookies |
| Get browser history |
Authentication
This server uses Personal Access Token (PAT) authentication. Tokens are passed through to the Covertlabs API.
Log in to app.covertlabs.io
Navigate to CLI Token
Copy your token (format:
cl_pat_V1_...)Add to your MCP client configuration
API Endpoints
Endpoint | Method | Description |
| GET | Server information |
| GET | Health check |
| POST | MCP protocol endpoint |
Documentation
Tools Reference - Detailed tool documentation
Response Formats - API response schemas
Examples - Usage examples
Support
Documentation: docs.covertlabs.io
Issues: GitHub Issues
Email: support@covertlabs.io
License
MIT License - see LICENSE for details.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.