Enables searching for Bitcoin addresses and related cryptocurrency transactions in deep and dark web content through StealthMole's threat intelligence database
Provides access to Discord-related threat intelligence data and monitoring capabilities through StealthMole's deep and dark web tracking services
Allows searching for Ethereum addresses and cryptocurrency-related threats across deep and dark web sources via StealthMole's intelligence platform
Enables monitoring and searching Facebook-related threat intelligence data through StealthMole's comprehensive deep and dark web tracking capabilities
Supports deployment and version control integration for the MCP server through GitHub repositories and automated deployment workflows
Provides access to Instagram-related threat intelligence and social media monitoring through StealthMole's deep and dark web surveillance tools
Enables tracking and searching for Monero cryptocurrency addresses and related illicit activities across deep and dark web platforms
Provides comprehensive Telegram monitoring capabilities including channel searches, user tracking, and message analysis through StealthMole's Telegram Tracker API
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@StealthMole MCP Serversearch for leaked credentials from example.com after 2024-01"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
StealthMole MCP Server
MCP (Model Context Protocol) server for accessing StealthMole threat intelligence API. Search and monitor threats across Deep & Dark Web through Claude and other MCP clients.
Features
π Comprehensive API Coverage
Darkweb Tracker (DT): Search Deep & Dark web content across 50+ indicators
Telegram Tracker (TT): Search Telegram channels, users, and messages
Credential Lookout (CL): Search leaked credentials from breaches
Compromised Data Set (CDS): Search infected device leaks from stealer malware
Combo Binder (CB): Search ID/Password combo leaks
ULP Binder (UB): Search URL-Login-Password format leaks
Ransomware Monitoring (RM): Monitor ransomware group breach incidents
Government Monitoring (GM): Monitor threats against government sector
Leaked Monitoring (LM): Monitor threats against enterprise sector
Management API: Track API usage quotas
π Authentication
JWT-based authentication with HS256 signing
Automatic token generation and management
Secure session-level credential storage
Prerequisites
Python: 3.10 or higher
StealthMole API Credentials: Get your access_key and secret_key from StealthMole
Smithery API key (optional): For deployment at smithery.ai/account/api-keys
Installation
Development Setup
# Install dependencies
uv sync
# Run the server
uv run dev
# Test interactively
uv run playgroundUsing with Claude Desktop
Add to your Claude Desktop configuration file:
MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%/Claude/claude_desktop_config.json
{
"mcpServers": {
"stealthmole": {
"command": "uv",
"args": [
"--directory",
"/absolute/path/to/stealthmole-mcp",
"run",
"start"
],
"env": {
"STEALTHMOLE_ACCESS_KEY": "your_access_key",
"STEALTHMOLE_SECRET_KEY": "your_secret_key"
}
}
}
}Replace /absolute/path/to/stealthmole-mcp with the actual path to this directory.
Available Tools
Darkweb Tracker
dt_search_targets
Get list of searchable targets for an indicator
indicator: keyword, email, domain, ip, bitcoin, etc.
Returns: Available targets for the indicatordt_search_target
Search for specific indicator and targets
indicator: Search type
targets: Comma-separated target list
text: Search query (supports AND, OR, NOT)
limit: Results limit (max: 100)
order_type: createDate or value
order: asc or descdt_search_all
Search across all targets for an indicator
indicator: Search type
text: Search query
limit: Results limit (max: 100)dt_search_by_id
Get paginated results using search ID
search_id: ID from previous search
cursor: Pagination cursor
limit: Results limit (max: 100)dt_get_node_details
Get detailed information for a node
node_id: Node ID from search results
parent_id: Optional parent node ID
data_from: Include data source list
include_url: Include URL list
include_contents: Include HTML sourceTelegram Tracker
tt_search_targets
Get searchable targets for Telegram indicator
indicator: keyword, telegram.channel, telegram.user, etc.tt_search_target
Search Telegram for specific targets
indicator: Search type
targets: Comma-separated target list
text: Search query
limit: Results limit (max: 100)tt_get_node_details
Get detailed Telegram node information
node_id: Node ID from search resultsCredential Lookout
cl_search
Search for leaked credentials
query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)
cursor: Pagination cursor
start/end: UTC timestamp filtersExample queries:
domain:example.com- All leaks for domainemail:user@example.com- Specific email leaksdomain:example.com AND after:2024-01- Recent leaks
Compromised Data Set
cds_search
Search infected device leaks
query: Search with indicators (domain:, url:, email:, id:, password:, ip:, country:, after:, before:)
limit: Results limit (max: 50)cds_get_node_details
Get detailed CDS information (requires Cyber Security Edition)
node_id: Node ID from search results
Returns: Stealer path, type, and full device infoCombo Binder
cb_search
Search ID/Password combo leaks
query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)ULP Binder
ub_search
Search URL-Login-Password format leaks
query: Search with indicators (domain:, url:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)Monitoring APIs
rm_search - Ransomware Monitoring
Monitor ransomware group breach incidents
query: Optional (torurl:, domain:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, victim, or attackGroupgm_search - Government Monitoring
Monitor threats against government sector
query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, title, or authorlm_search - Leaked Monitoring
Monitor threats against enterprise sector
query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)Management
get_user_quotas
Get API usage quotas for current month
Returns: Allowed and used queries per serviceSearch Query Syntax
Indicators
Darkweb Tracker supports 50+ indicators:
Network: domain, ip, tor, torurl, i2p, i2purl, url Identity: email, id, tel, kssn Financial: bitcoin, ethereum, monero, creditcard Files: document, exefile, image, hash, blueprint Social: facebook, twitter, instagram, telegram, discord Security: cve, ioc, malware
Operators
AND: Both terms must be present
OR: Either term must be present (max 3 per query)
NOT: Exclude term from results
Max total: 5 operators per query
Examples
keyword search:
"ransomware"
Indicator search:
email:user@example.com
domain:target.com
bitcoin:1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
Combined operators:
domain:example.com AND email:admin
ip:192.168.1.1 OR ip:10.0.0.1
domain:target.com AND NOT test
Time filters:
domain:example.com AND after:2024-01
email:admin AND before:2024-06-01Resources
The server provides built-in documentation resources:
stealthmole://api-info- API overview and service informationstealthmole://indicators- Complete list of Darkweb Tracker indicators
Error Handling
Common API error codes:
401- Invalid or expired token400- Invalid parameters (limit, cursor, etc.)404- Resource not found422- Bulk export required (>1M results)426- Query limit exceeded
API Limits
Darkweb Tracker: Max 100 results per request
Other APIs: Max 50 results per request
Operators: Max 3 OR, max 5 total per query
Bulk Export: Contact support for >1M results
Development
Project Structure
stealthmole-mcp/
βββ src/stealthmole_mcp/
β βββ __init__.py
β βββ server.py # Main server implementation
βββ pyproject.toml # Project configuration
βββ README.md # This fileRunning Tests
# Interactive testing
uv run playground
# Try example queries:
dt_search_targets(indicator="keyword")
cl_search(query="domain:example.com")
get_user_quotas()Deployment
Deploy to Smithery
Push code to GitHub
Deploy at smithery.ai/new
Configure with your StealthMole credentials
Self-Hosting
Run the server directly:
# Production mode
uv run start
# Development mode with auto-reload
uv run devSecurity Notes
β οΈ Important: Keep your API credentials secure
Never commit credentials to version control
Use environment variables or secure configuration
Rotate keys regularly
Monitor API usage for anomalies
Support
StealthMole API Documentation: api.stealthmole.com
MCP Protocol: modelcontextprotocol.io
Smithery Platform: smithery.ai
License
This MCP server implementation is provided as-is. StealthMole API access requires valid subscription and credentials.
Version
Current version: 0.1.0 (November 2024) Based on StealthMole API v2.2
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.