MCP Hub
Back to servers

Threat Intelligence MCP Server

A comprehensive threat intelligence aggregator that monitors real-time IOCs from sources like Feodo Tracker and CISA KEV, while providing IP and hash reputation lookups via VirusTotal, AbuseIPDB, and Shodan.

Tools
11
Updated
Dec 30, 2025

Threat Intelligence MCP Server

MCP Python-3.10+ License Part of Agentic System

Threat intelligence aggregation from multiple sources for security monitoring.

Part of the Agentic System - a 24/7 autonomous AI framework with persistent memory.

Real-time threat intelligence aggregation for the AGI agentic cluster.

Version: 0.2.0

Features

  • Multi-source threat feeds: Feodo Tracker, URLhaus, CISA KEV, ThreatFox, Emerging Threats, Spamhaus DROP, Blocklist.de, CINSscore
  • IP/Hash reputation checking: VirusTotal, AbuseIPDB, Shodan integration
  • Bulk IP checking: Check up to 100 IPs in a single request
  • Network scanning integration: Check scanned devices against threat lists
  • Thread-safe caching: Intelligent caching with TTL and size limits
  • Dashboard API: Aggregated data for visualization (Flask-based)

Installation

cd ${AGENTIC_SYSTEM_PATH:-/opt/agentic}/mcp-servers/threat-intel-mcp
pip install -e .

# For dashboard support:
pip install -e ".[dashboard]"

# For development:
pip install -e ".[dev]"

Configuration

Add to ~/.claude.json:

{
  "mcpServers": {
    "threat-intel": {
      "command": "${AGENTIC_SYSTEM_PATH:-/opt/agentic}/.venv/bin/python3",
      "args": ["-m", "threat_intel_mcp.server"]
    }
  }
}

API Keys (Optional)

Set environment variables for enhanced capabilities:

VariableServicePurpose
VIRUSTOTAL_API_KEYVirusTotalHash and IP lookups
ABUSEIPDB_API_KEYAbuseIPDBIP reputation and abuse reports
SHODAN_API_KEYShodanIP intelligence and port scanning
OTX_API_KEYAlienVault OTXThreat pulse feeds

MCP Tools

ToolDescription
get_threat_feedsList all available threat intelligence feeds with status
fetch_threat_feedFetch IOCs from a specific feed by name
check_ip_reputationCheck IP against multiple threat sources (VT, AbuseIPDB, Shodan)
check_hash_reputationCheck file hash (MD5/SHA1/SHA256) reputation
check_bulk_ipsNEW Check up to 100 IPs in a single request
get_cisa_kevGet CISA Known Exploited Vulnerabilities catalog
get_dashboard_summaryAggregated threat data for dashboards
get_recent_iocsRecent IOCs from ThreatFox (filterable by type)
check_network_against_threatsCheck network scan results for threats
get_threat_statsNEW Get cache statistics and API key status
clear_threat_cacheNEW Clear the threat intelligence cache

Threat Feeds

Free (No API Key Required)

FeedTypeDescription
feodo_trackerIP ListBotnet C&C IPs (Dridex, Emotet, TrickBot)
urlhaus_recentURL ListRecent malware distribution URLs
sslbl_ipIP ListSSL Blacklist malicious IPs
emerging_threats_compromisedIP ListCompromised host IPs
tor_exit_nodesIP ListKnown Tor exit node IPs
cisa_kevJSONKnown Exploited Vulnerabilities catalog
threatfox_recentJSONRecent malware IOCs
blocklist_de_allIP ListAll attackers from blocklist.de
cinsscore_badguysIP ListCINSscore malicious IPs
spamhaus_dropCIDR ListSpamhaus Don't Route Or Peer

API-Enhanced

FeedAPI KeyEnhanced Data
VirusTotalVIRUSTOTAL_API_KEYDetection ratios, vendor verdicts
AbuseIPDBABUSEIPDB_API_KEYAbuse confidence score, report counts
ShodanSHODAN_API_KEYOpen ports, services, vulnerabilities
AlienVault OTXOTX_API_KEYThreat pulses, related IOCs

Usage Examples

Check IP Reputation

# Returns threat level: clean/low/medium/high/critical
result = await check_ip_reputation("192.0.2.102")

Bulk IP Check

# Comma-separated
result = await check_bulk_ips("8.8.8.8, 1.1.1.1, 192.0.2.102")

# JSON array
result = await check_bulk_ips('["8.8.8.8", "1.1.1.1"]')

Network Scanner Integration

# Check network scan results against threats
scan_results = '{"devices": [{"ip": "192.0.2.217"}, {"ip": "192.0.2.25"}]}'
threat_check = await check_network_against_threats(scan_results)

Get Recent IOCs

# All recent IOCs
result = await get_recent_iocs()

# Filter by type: ip, ip:port, domain, url, md5, sha1, sha256
result = await get_recent_iocs(ioc_type="ip:port", limit=50)

Running the Dashboard

# Start the Flask dashboard server
threat-intel-dashboard

# Or directly:
python -m threat_intel_mcp.dashboard

Dashboard provides REST API endpoints for visualization tools.

Development

Running Tests

# Install dev dependencies
pip install -e ".[dev]"

# Run tests
pytest tests/ -v

# With coverage
pytest tests/ --cov=threat_intel_mcp --cov-report=html

Project Structure

threat-intel-mcp/
├── src/threat_intel_mcp/
│   ├── __init__.py      # Package exports
│   ├── config.py        # Configuration, validation, caching
│   ├── server.py        # FastMCP server and tools
│   └── dashboard.py     # Flask dashboard API
├── tests/
│   ├── conftest.py      # Pytest fixtures
│   ├── test_config.py   # Config module tests
│   └── test_server.py   # Server and tool tests
└── pyproject.toml       # Package configuration

Changelog

v0.2.0

  • New Features:

    • Bulk IP checking (up to 100 IPs)
    • Shodan integration for IP intelligence
    • Cache statistics and management tools
    • 3 additional threat feeds (blocklist.de, CINSscore, Spamhaus DROP)
  • Improvements:

    • Shared configuration module eliminates code duplication
    • Thread-safe caching with TTL and size limits
    • Proper input validation for all IOC types
    • Type hints throughout codebase
  • Bug Fixes:

    • Fixed all bare except clauses with proper exception handling
    • Removed unused imports and dependencies
    • Fixed variable scope issues
  • Developer Experience:

    • Comprehensive test suite (67 tests)
    • pytest-asyncio for async testing
    • Optional dependency groups (dashboard, dev)

v0.1.0

  • Initial release with basic threat feed aggregation

Part of the MCP Ecosystem

This server integrates with other MCP servers for comprehensive AGI capabilities:

ServerPurpose
enhanced-memory-mcp4-tier persistent memory with semantic search
agent-runtime-mcpPersistent task queues and goal decomposition
agi-mcpFull AGI orchestration with 21 tools
cluster-execution-mcpDistributed task routing across nodes
node-chat-mcpInter-node AI communication
ember-mcpProduction-only policy enforcement

See agentic-system-oss for the complete framework.

Reviews

No reviews yet

Sign in to write a review