Security intelligence API and MCP server for AI agents. 23 tools, 35+ endpoints: CVE/EPSS/KEV, domain recon, SSL, IP reputation, threat intel, email security, code scanning. Free, no signup.
{
"mcpServers": {
"contrastapi": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Security intelligence API and MCP server for AI agents. 25 MCP tools / 35+ endpoints: CVE lookup with EPSS/KEV enrichment, domain reconnaissance, SSL analysis, IP reputation (AbuseIPDB, Shodan), IOC/malware lookup, exploit search, technology fingerprinting, email security, phone validation, and code security scanning. Free, no API key required.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 0 days ago. 15 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
33 tools. ~2,100 tokens (1.0% of 200K). Consider loading selectively.
No automated test available for this server. Check the GitHub README for setup instructions.
domain_reportFull domain report including DNS, WHOIS, SSL, subdomains, WAF, and IP reputation
dns_lookupDNS records lookup (A, AAAA, MX, NS, TXT, CNAME, SOA)
whois_lookupWHOIS registration data for domain
subdomain_enumerationSubdomain enumeration via DNS brute force and certificate transparency logs
certificate_transparencyCertificate transparency logs for domain
ssl_analysisSSL/TLS analysis including cipher suite, certificate chain, and grade (A-F)
ip_intelligenceIP intelligence and reputation (AbuseIPDB, Shodan enrichment)
asn_lookupASN lookup by AS number or IP address
technology_fingerprintingTechnology fingerprinting (CMS, frameworks, CDN, analytics detection)
threat_intelligenceThreat intelligence lookup (URLhaus malware URLs)
No known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Dynamic problem-solving through sequential thought chains
A Model Context Protocol server for searching and analyzing arXiv papers
An open-source AI agent that brings the power of Gemini directly into your terminal.
The official Python SDK for Model Context Protocol servers and clients
MCP Security Weekly
Get CVE alerts and security updates for Contrastapi and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Security intelligence API and MCP server for AI agents. 25 MCP tools / 35+ endpoints: CVE lookup with EPSS/KEV enrichment, domain reconnaissance, SSL analysis, IP reputation (AbuseIPDB, Shodan), IOC/malware lookup, exploit search, technology fingerprinting, email security, phone validation, and code security scanning. Free, no API key required.
English | 中文
Live: api.contrastcyber.com | Quick Start: API · MCP · VS Code | Docs: Endpoints | Scanner: contrastcyber.com | Blog: I Built 25 Security Tools That AI Agents Can Use
VS Code Extension: Install ContrastAPI from the Marketplace — 25 security tools in your editor, no API key required.
MCP Setup for Claude Desktop, Cursor, VS Code, Windsurf: MCP Setup Guide
Then ask your AI:
Recon & Domain
CVE & Exploits
IP & Network
Threat Intelligence
Code Security
Contact Validation
npm install contrastapi
const api = require("contrastapi")();
const report = await api.domain.report("example.com");
const cve = await api.cve.lookup("CVE-2024-3094");
const ssl = await api.domain.ssl("example.com");
const headers = await api.scan.headers("example.com");
With API key (Pro): const api = require("contrastapi")({ apiKey: "your-key" });
Full SDK docs: [sdk/node/](sdk/node