Amazon is an e-commerce and cloud computing company that offers a wide range of products and services including online shopping, digital streaming, cloud computing, and artificial intelligence. It's one of the world's largest online marketplaces, known for its fast shipping, vast selection, and customer-centric approach.
Why this server?
Extracts structured data from Amazon product and category pages using dedicated parsers, with options for both desktop and mobile viewports
Why this server?
Provides access to Amazon Business API documentation, sample code, and troubleshooting resources. Enables searching and reading documentation for Product Search API, Ordering API, Reconciliation API, Reporting API, User Management API, Document API, and Application Management API.
Why this server?
Allows searching for and retrieving details about Amazon gift cards through the Bitrefill API
Why this server?
Allows AI agents to perform market research and check product availability on Amazon by fetching regional pages through residential proxies to bypass geo-restrictions.
Why this server?
Supports Amazon Bedrock embedding models for performing search-augmented Cypher queries and vector searches.
Why this server?
Provides tools to access AWS documentation, search for content, fetch and convert documentation pages to markdown format, and get content recommendations for AWS documentation pages.
Why this server?
Enables downloading Amazon order history as CSV files across 16 regional sites, with support for exporting orders, item details, shipment tracking, payment transactions, and gift card balances. Includes tools for querying orders, checking authentication status, and fetching transaction details.
Why this server?
Provides comprehensive management of AWS infrastructure, allowing users to create, list, update, and delete resources across services such as EC2, S3, RDS, VPC, and associated networking components through natural language prompts.
Why this server?
Scans AWS cloud infrastructure and Amazon Q configurations to identify security vulnerabilities and ensure compliance with CIS benchmarks.