- Explore MCP Servers
- urlhaus-mcp-server
Urlhaus Mcp Server
What is Urlhaus Mcp Server
urlhaus-mcp-server is a Model Context Protocol (MCP) server that provides access to the URLhaus malicious URL database from abuse.ch. It serves as a tool for threat intelligence research and cybersecurity analysis by enabling AI agents to query malicious URLs used for malware distribution.
Use cases
Use cases for urlhaus-mcp-server include conducting threat intelligence research, analyzing recent malware distribution patterns, identifying malicious URLs associated with specific malware families, and enhancing cybersecurity measures by integrating threat data into security systems.
How to use
To use urlhaus-mcp-server, clone the repository from GitHub, install the necessary dependencies using npm, and build the server. You can then configure it in your MCP settings to start querying the URLhaus database for malicious URLs and related information.
Key features
Key features of urlhaus-mcp-server include tools for URL analysis (get_recent_urls, lookup_url, search_urls), host/domain analysis (lookup_host), and malware analysis (lookup_payload, get_payloads, get_urls_by_tag, get_urls_by_signature).
Where to use
urlhaus-mcp-server can be used in various fields such as cybersecurity, threat intelligence, malware research, and any domain requiring analysis of malicious URLs and malware payloads.
Overview
What is Urlhaus Mcp Server
urlhaus-mcp-server is a Model Context Protocol (MCP) server that provides access to the URLhaus malicious URL database from abuse.ch. It serves as a tool for threat intelligence research and cybersecurity analysis by enabling AI agents to query malicious URLs used for malware distribution.
Use cases
Use cases for urlhaus-mcp-server include conducting threat intelligence research, analyzing recent malware distribution patterns, identifying malicious URLs associated with specific malware families, and enhancing cybersecurity measures by integrating threat data into security systems.
How to use
To use urlhaus-mcp-server, clone the repository from GitHub, install the necessary dependencies using npm, and build the server. You can then configure it in your MCP settings to start querying the URLhaus database for malicious URLs and related information.
Key features
Key features of urlhaus-mcp-server include tools for URL analysis (get_recent_urls, lookup_url, search_urls), host/domain analysis (lookup_host), and malware analysis (lookup_payload, get_payloads, get_urls_by_tag, get_urls_by_signature).
Where to use
urlhaus-mcp-server can be used in various fields such as cybersecurity, threat intelligence, malware research, and any domain requiring analysis of malicious URLs and malware payloads.
Content
URLhaus MCP Server
A comprehensive Model Context Protocol (MCP) server that provides access to URLhaus, a project from abuse.ch that collects and shares malicious URLs used for malware distribution. This server enables AI agents to perform threat intelligence research and cybersecurity analysis through the URLhaus database.
Features
This MCP server provides the following tools for querying URLhaus data:
URL Analysis Tools
- get_recent_urls: Get the most recent malicious URLs from URLhaus
- lookup_url: Get detailed information about a specific URL
- search_urls: Search for URLs by various criteria (host, URL, tag, or signature)
Host/Domain Analysis Tools
- lookup_host: Get information about URLs hosted on a specific host/domain
Malware Analysis Tools
- lookup_payload: Get information about a malware payload by its hash
- get_payloads: Get recent malware payloads from URLhaus
- get_urls_by_tag: Get URLs associated with a specific malware tag/family
- get_urls_by_signature: Get URLs associated with a specific malware signature
Installation
From GitHub
-
Clone the repository:
git clone https://github.com/Cyreslab-AI/urlhaus-mcp-server.git cd urlhaus-mcp-server
-
Install dependencies:
npm install
-
Build the server:
npm run build
From npm (Coming Soon)
npm install -g urlhaus-mcp-server
Configuration
Add the server to your MCP settings configuration:
{
"mcpServers": {
"urlhaus": {
"command": "node",
"args": [
"/path/to/urlhaus-mcp-server/build/index.js"
]
}
}
}
No API keys or authentication are required as URLhaus provides a free public API.
Usage Examples
Get Recent Malicious URLs
{
"tool": "get_recent_urls",
"arguments": {
"limit": 50
}
}
Look Up a Specific URL
{
"tool": "lookup_url",
"arguments": {
"url": "https://suspicious-domain.com/malware.exe"
}
}
Search for URLs by Host
{
"tool": "search_urls",
"arguments": {
"search_term": "malicious-domain.com",
"limit": 100
}
}
Get URLs by Malware Family
{
"tool": "get_urls_by_tag",
"arguments": {
"tag": "emotet",
"limit": 50
}
}
Look Up Malware Payload
{
"tool": "lookup_payload",
"arguments": {
"hash": "d41d8cd98f00b204e9800998ecf8427e"
}
}
API Rate Limits
URLhaus has rate limits to prevent abuse. If you encounter rate limiting, wait before making additional requests.
Data Format
All responses include:
query_status
: Status of the API query (“ok” or error message)summary
: Human-readable summary of results- Data specific to the query type (URLs, payloads, etc.)
About URLhaus
URLhaus is operated by abuse.ch and provides:
- Real-time feed of malicious URLs
- Information about malware payloads
- Integration with various threat intelligence platforms
- Free access to security researchers and defenders
For more information, visit: https://urlhaus.abuse.ch/
Development
To run in development mode:
npm run watch
To inspect the server:
npm run inspector
Contributing
Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Acknowledgments
- URLhaus by abuse.ch for providing the free threat intelligence API
- Model Context Protocol for the MCP framework
- Cyreslab AI for development and maintenance
Support
If you encounter any issues or have questions, please open an issue on GitHub.