MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.
{
"mcpServers": {
"dnstwist": {
"command": "mcp-dnstwist"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.
Is it safe?
No known CVEs for @burtthecoder/mcp-dnstwist.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 402 days ago. 47 stars. 83 weekly downloads.
Will it work with my client?
Transport: stdio, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@burtthecoder/mcp-dnstwist' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Trust infrastructure for AI agents — DIDs, reputation, verifiable credentials, USDC.
MCP Security Weekly
Get CVE alerts and security updates for Mcp Dnstwist and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Context Protocol (MCP) server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage. This server provides tools for analyzing domain permutations and identifying potentially malicious domains. It is designed to integrate seamlessly with MCP-compatible applications like Claude Desktop.
This tool is designed for legitimate security research purposes. Please:
To install DNStwist for Claude Desktop automatically via Smithery:
npx -y @smithery/cli install @burtthecoder/mcp-dnstwist --client claude
Install Docker:
Install the server globally via npm:
npm install -g mcp-dnstwist
{
"mcpServers": {
"dnstwist": {
"command": "mcp-dnstwist"
}
}
}
Configuration file location:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonIf you prefer to run from source or need to modify the code:
git clone <repository_url>
cd mcp-dnstwist
npm install
npm run build
{
"mcpServers": {
"dnstwist": {
"command": "node",
"args": ["/absolute/path/to/mcp-dnstwist/build/index.js"]
}
}
}
fuzz_domaindomain (required): Domain name to analyze (e.g., example.com)nameservers (optional, default: "1.1.1.1"): Comma-separated list of DNS serversthreads (optional, default: 50): Number of threads for parallel processingformat (optional, default: "json"): Output format (json, csv, list)registered_only (optional, default: true): Show only registered domainsmxcheck (optional, default: true): Check for MX recordsssdeep (optional, default: false): Generate fuzzy hashes of web pagesbanners (optional, default: true): Capture HTTP banner informationExample:
{
"domain": "example.com",
"nameservers": "1.1.1.1,8.8.8.8",
"threads": 50,
"format": "json",
"registered_only": true,
"mxcheck": true,
"
... [View full README on GitHub](https://github.com/BurtTheCoder/mcp-dnstwist#readme)