Skip to content

MCP Server

import { Aside, Tabs, TabItem } from ‘@astrojs/starlight/components’;

What is the MCP Server

The MCP Server exposes all OSINT AI One capabilities via the Model Context Protocol, allowing any MCP-compatible client (Claude Desktop, VS Code with Continue, Cursor…) to use OSINT tools directly.

Unlike the CLI, you don’t need Ollama — the client’s model (Claude, GPT-4…) does the reasoning and decides which tools to call.

Starting the server

```bash osint-mcp ``` STDIO mode is the standard for integrations with Claude Desktop, VS Code, etc. ```bash osint-mcp --transport streamable-http --port 8080 ``` For access from remote machines or to expose as a service.

Configuration in Claude Desktop

Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
"mcpServers": {
"osint-agent": {
"command": "osint-mcp",
"args": []
}
}
}

Restart Claude Desktop. You’ll see the OSINT tools available in the MCP panel.

The 44 MCP tools

OSINT and Reputation

ToolDescription
virustotal_ip_lookupIP reputation in VirusTotal
virustotal_domain_lookupDomain reputation in VirusTotal
virustotal_hash_lookupHash analysis in VirusTotal
abuseipdb_check_ipIP abuse score in AbuseIPDB
alienvault_ip_lookupThreat pulses in AlienVault OTX
shodan_host_lookupExposed services in Shodan
ipinfo_lookupIP geolocation and context
urlscan_lookupComplete URL scan
whois_lookupDomain WHOIS information
dns_lookupDNS records
crtsh_lookupSubdomains via Certificate Transparency
fetch_threat_feedIOCs from live feeds

Agent and Scoring

ToolDescription
investigate_iocComplete IOC investigation with ReAct agent
get_risk_scoreRisk score 0-100 for an IOC
generate_reportGenerate threat report for session IOCs
classify_iocClassify threat type of an IOC
list_available_feedsList available threat feeds
list_toolsList all registered OSINT tools

Intelligence and Context

ToolDescription
gdelt_entity_searchNews about an entity (GDELT)
gdelt_topic_searchNews about a topic (GDELT)
gdelt_tone_analysisMedia tone analysis (GDELT)
rss_news_searchGeneral RSS feed search
rss_security_newsCybersecurity news
rss_financial_newsFinancial news
get_crypto_pricesCryptocurrency prices
get_economic_indicatorMacroeconomic indicators
acled_conflict_eventsConflict events by country
get_country_risk_scoreCountry risk index
ais_vessel_lookupVessel information by AIS
ais_chokepoint_activityTraffic at strategic maritime choke points
check_entity_anomalyAnomaly detection in mentions
search_historySearch in investigation history

Investigation Management

ToolDescription
create_investigationCreate new investigation
list_investigationsList existing investigations
get_investigation_summaryInvestigation summary
ingest_evidenceIngest evidence (file or URL)
add_entityAdd entity manually
list_entitiesList investigation entities
add_claimRegister claim with traceability
list_claimsList investigation claims
verify_claimVerify or dispute a claim
semantic_search_evidenceSemantic search in evidences

The 5 Resources

URIDescription
osint://feedsAvailable threat feed sources
osint://toolsAll registered tools with description
osint://history/{query}Past investigation results for an IOC
osint://investigationsList of all investigations
osint://investigation/{slug}Details of a specific investigation

The 3 Prompts

Pre-built prompts for common use cases:

PromptDescription
investigate_ipComplete template for investigating an IP
investigate_domainComplete template for investigating a domain
investigate_urlComplete template for investigating a URL

Environment variables for MCP

Ventana de terminal
MCP_TRANSPORT=stdio # stdio or streamable-http
MCP_HTTP_PORT=8080 # Port for streamable-http