Provides tools for performing malware hash lookups using VirusTotal's database of over 68 antivirus engines to identify and analyze malicious files.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@KeyboardCrumbs MCP ServerCheck if IP 45.141.26.73 is malicious and show its risk score"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
KeyboardCrumbs MCP Server
mcp-name: com.keyboardcrumbs/mcp
Live threat intelligence tools for Claude Desktop. Free, no API key required.
Tools
Tool | Description |
| Threat intel for any IP — risk score, geo, ASN, C2 associations, staging clusters |
| CVE lookup — CVSS, EPSS, KEV status, exploit availability, patch urgency |
| Domain intel — DNS records, WHOIS, malware associations, subdomains |
| Malware hash lookup via VirusTotal (68+ engines) + CIRCL (6.3B files) |
| Live snapshot — KEV count, active C2s, ransomware victims, data freshness |
| KEV Oracle — top CVEs predicted to be added to CISA KEV before it happens |
| GhostWatch — detect pre-attack infrastructure staging for an IP or domain |
| Ransomware group lookup and victim tracking |
Install
Option 1 — uvx (no install needed)
Add to claude_desktop_config.json:
{
"mcpServers": {
"keyboardcrumbs": {
"command": "uvx",
"args": ["--from", "git+https://github.com/keyboardcrumbs/mcp", "keyboardcrumbs-mcp"]
}
}
}Option 2 — Clone and run locally
git clone https://github.com/keyboardcrumbs/mcp
cd mcp
uv venv && source .venv/bin/activate
uv add "mcp[cli]" httpxAdd to claude_desktop_config.json:
{
"mcpServers": {
"keyboardcrumbs": {
"command": "uv",
"args": ["--directory", "/path/to/mcp", "run", "server.py"]
}
}
}Restart Claude Desktop.
Example Usage
Once installed, just ask Claude:
"Is 45.141.26.73 malicious?"
"Should I patch CVE-2024-3400 immediately?"
"What CVEs are about to be added to CISA KEV?"
"Is this domain staging for an attack?"
"What's the current threat landscape?"
Claude will call the live KeyboardCrumbs API and return real-time threat intelligence.
Data Sources
URLhaus · Feodo Tracker · AlienVault OTX · CISA KEV · NVD · EPSS · ExploitDB · VirusTotal · CIRCL · SANS ISC DShield · Shodan · RIPE · crt.sh · Ransomware.live
Data updates every 15 minutes. No API key. No signup. No rate limits for normal use.
Links
Dashboard: https://threats.keyboardcrumbs.com
GhostWatch: https://ghost.keyboardcrumbs.com
KEV Oracle: https://oracle.keyboardcrumbs.com
API docs: https://api.keyboardcrumbs.com
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.