Get the FREE Ultimate OpenClaw Setup Guide →

fastmcp-threatintel

AI-Powered Threat Intelligence MCP tool

Installation
Run this command in your terminal to add the MCP server to Claude Code.
Run in terminal:
Command
claude mcp add --transport stdio 4r9un-fastmcp-threatintel threatintel server --port 8000 \
  --env OTX_API_KEY="your_alienvault_otx_api_key" \
  --env IPINFO_API_KEY="optional_ipinfo_api_key" \
  --env ABUSEIPDB_API_KEY="optional_abuseipdb_api_key" \
  --env VIRUSTOTAL_API_KEY="your_virustotal_api_key"

How to use

FastMCP ThreatIntel provides an AI-powered threat intelligence workflow with MCP integration. The server exposes an API-compatible interface that lets AI assistants and CLIs query multi-source threat data from VirusTotal, OTX, AbuseIPDB, and IPInfo, and then produce actionable threat reports with MITRE ATT&CK mappings and IOC detection. You can run the MCP server to enable natural language prompts from AI assistants (e.g., Claude Desktop, Roo-Cline in VSCode) to analyze IOCs like IPs, domains, URLs, and file hashes. Use the interactive threatintel CLI or the MCP endpoint to fit into your automation pipelines; the server can output HTML reports, JSON exports, or STIX-friendly data for downstream tooling.

How to install

Prerequisites:

  • Python 3.10+ and pip
  • Access to required APIs: VirusTotal, OTX, optionally AbuseIPDB and IPInfo

Install via PyPI and run the MCP-enabled server:

# Install the Python package from PyPI
pip install fastmcp-threatintel

# (Optional) Create a virtual environment
python -m venv venv
source venv/bin/activate  # on Unix or venv\Scripts\activate.bat on Windows

# Run the MCP server (example port 8000)
threatintel server --port 8000

Configure API keys (example using a .env or environment variables):

export VIRUSTOTAL_API_KEY=your_virustotal_api_key
export OTX_API_KEY=your_alienvault_otx_api_key
export ABUSEIPDB_API_KEY=your_abuseipdb_api_key  # optional
export IPINFO_API_KEY=your_ipinfo_api_key    # optional

If you prefer Docker:

docker pull arjuntrivedi/fastmcp-threatintel:latest
docker run -e VIRUSTOTAL_API_KEY=your_key \
           -e OTX_API_KEY=your_key \
           arjuntrivedi/fastmcp-threatintel:latest \
           threatenintel server --port 8000

For UV/Developer setup (optional):

git clone https://github.com/4R9UN/fastmcp-threatintel.git
cd fastmcp-threatintel
uv sync
uv run threatintel setup
uv run threatintel interactive

Additional notes

Notes:

  • Ensure API keys are kept secure and not committed to version control. Use environment variables or a secret manager.
  • The MCP integration examples assume the server is reachable at the specified port (e.g., 8000). Open firewall rules if running in a cloud environment.
  • Output formats include HTML, JSON, and STIX; configure your clients to request the desired format.
  • If running behind a reverse proxy, ensure proper routing and TLS termination for MCP endpoints.
  • In Docker, you can pass API keys via environment variables as shown; you can also mount a .env file if preferred.

Related MCP Servers

Sponsor this space

Reach thousands of developers