Oracle-42 DarkIntel MCP Server
Darknet threat intelligence MCP server powered by 12,000+ vectorized data points from IronClaw intelligence pipeline.
Tools (10)
| Tool | Description | Data Points |
|---|---|---|
threat_intel | Darknet threat intelligence | SOC alerts, forensic reports |
actor_lookup | Threat actor profiles | 2,800+ actors, ransomware groups |
worm_scan | AI worm signatures | 1,900+ self-replicating patterns |
mining_detect | Stealth cryptomining detection | 2,000+ mining signatures |
traffic_scan | Traffic hijacking intel | 2,100+ BGP/DNS/CDN patterns |
code_vuln | Code supply chain attacks | 1,400+ IDE/npm/CI patterns |
breach_check | Breach & leak intelligence | Data breaches, leaked credentials |
market_intel | Darknet marketplace intel | 600+ indexed markets |
defense_playbook | Defense playbooks | 243 pre-built response procedures |
social_engineering | Social engineering techniques | 60+ advanced SE patterns |
Usage
Claude Desktop / Cursor
{
"mcpServers": {
"oracle42-darkintel": {
"url": "http://173.249.14.219:8420/sse"
}
}
}
stdio (local)
pip install mcp
python server.py
SSE (remote)
python server.py sse
Requirements
- Python 3.10+
mcpSDK (pip install mcp)- Qdrant vector database (localhost:6333)
- Ollama with
nomic-embed-textmodel (localhost:11434)
License
Proprietary - Oracle-42 Project