MCP ExplorerExplorer

Urlhaus Mcp Server

@Cyreslab-AIon 16 days ago
1 MIT
FreeCommunity
AI Systems
#cybersecurity#malware#mcp-server#security-research#threat-intelligence
MCP server for accessing URLhaus malicious URL database from abuse.ch - provides threat intelligence for cybersecurity research

Overview

What is Urlhaus Mcp Server

urlhaus-mcp-server is a Model Context Protocol (MCP) server that provides access to the URLhaus malicious URL database from abuse.ch. It serves as a tool for threat intelligence research and cybersecurity analysis by enabling AI agents to query malicious URLs used for malware distribution.

Use cases

Use cases for urlhaus-mcp-server include conducting threat intelligence research, analyzing recent malware distribution patterns, identifying malicious URLs associated with specific malware families, and enhancing cybersecurity measures by integrating threat data into security systems.

How to use

To use urlhaus-mcp-server, clone the repository from GitHub, install the necessary dependencies using npm, and build the server. You can then configure it in your MCP settings to start querying the URLhaus database for malicious URLs and related information.

Key features

Key features of urlhaus-mcp-server include tools for URL analysis (get_recent_urls, lookup_url, search_urls), host/domain analysis (lookup_host), and malware analysis (lookup_payload, get_payloads, get_urls_by_tag, get_urls_by_signature).

Where to use

urlhaus-mcp-server can be used in various fields such as cybersecurity, threat intelligence, malware research, and any domain requiring analysis of malicious URLs and malware payloads.

Content

URLhaus MCP Server

npm version
License: MIT
Node.js
TypeScript

A comprehensive Model Context Protocol (MCP) server that provides access to URLhaus, a project from abuse.ch that collects and shares malicious URLs used for malware distribution. This server enables AI agents to perform threat intelligence research and cybersecurity analysis through the URLhaus database.

Features

This MCP server provides the following tools for querying URLhaus data:

URL Analysis Tools

  • get_recent_urls: Get the most recent malicious URLs from URLhaus
  • lookup_url: Get detailed information about a specific URL
  • search_urls: Search for URLs by various criteria (host, URL, tag, or signature)

Host/Domain Analysis Tools

  • lookup_host: Get information about URLs hosted on a specific host/domain

Malware Analysis Tools

  • lookup_payload: Get information about a malware payload by its hash
  • get_payloads: Get recent malware payloads from URLhaus
  • get_urls_by_tag: Get URLs associated with a specific malware tag/family
  • get_urls_by_signature: Get URLs associated with a specific malware signature

Installation

From GitHub

  1. Clone the repository:

    git clone https://github.com/Cyreslab-AI/urlhaus-mcp-server.git
    cd urlhaus-mcp-server
    
  2. Install dependencies:

    npm install
    
  3. Build the server:

    npm run build
    

From npm (Coming Soon)

npm install -g urlhaus-mcp-server

Configuration

Add the server to your MCP settings configuration:

{
  "mcpServers": {
    "urlhaus": {
      "command": "node",
      "args": [
        "/path/to/urlhaus-mcp-server/build/index.js"
      ]
    }
  }
}

No API keys or authentication are required as URLhaus provides a free public API.

Usage Examples

Get Recent Malicious URLs

{
  "tool": "get_recent_urls",
  "arguments": {
    "limit": 50
  }
}

Look Up a Specific URL

{
  "tool": "lookup_url",
  "arguments": {
    "url": "https://suspicious-domain.com/malware.exe"
  }
}

Search for URLs by Host

{
  "tool": "search_urls",
  "arguments": {
    "search_term": "malicious-domain.com",
    "limit": 100
  }
}

Get URLs by Malware Family

{
  "tool": "get_urls_by_tag",
  "arguments": {
    "tag": "emotet",
    "limit": 50
  }
}

Look Up Malware Payload

{
  "tool": "lookup_payload",
  "arguments": {
    "hash": "d41d8cd98f00b204e9800998ecf8427e"
  }
}

API Rate Limits

URLhaus has rate limits to prevent abuse. If you encounter rate limiting, wait before making additional requests.

Data Format

All responses include:

  • query_status: Status of the API query (“ok” or error message)
  • summary: Human-readable summary of results
  • Data specific to the query type (URLs, payloads, etc.)

About URLhaus

URLhaus is operated by abuse.ch and provides:

  • Real-time feed of malicious URLs
  • Information about malware payloads
  • Integration with various threat intelligence platforms
  • Free access to security researchers and defenders

For more information, visit: https://urlhaus.abuse.ch/

Development

To run in development mode:

npm run watch

To inspect the server:

npm run inspector

Contributing

Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

Support

If you encounter any issues or have questions, please open an issue on GitHub.

Tools

No tools

Comments