StealthMole MCP Server

StealthMole MCP Server

Enables access to StealthMole's threat intelligence API for searching and monitoring threats across Deep & Dark Web, Telegram channels, leaked credentials, and ransomware incidents. Provides comprehensive cybersecurity intelligence through natural language queries.

Category
访问服务器

README

StealthMole MCP Server

MCP (Model Context Protocol) server for accessing StealthMole threat intelligence API. Search and monitor threats across Deep & Dark Web through Claude and other MCP clients.

Features

🔍 Comprehensive API Coverage

  • Darkweb Tracker (DT): Search Deep & Dark web content across 50+ indicators
  • Telegram Tracker (TT): Search Telegram channels, users, and messages
  • Credential Lookout (CL): Search leaked credentials from breaches
  • Compromised Data Set (CDS): Search infected device leaks from stealer malware
  • Combo Binder (CB): Search ID/Password combo leaks
  • ULP Binder (UB): Search URL-Login-Password format leaks
  • Ransomware Monitoring (RM): Monitor ransomware group breach incidents
  • Government Monitoring (GM): Monitor threats against government sector
  • Leaked Monitoring (LM): Monitor threats against enterprise sector
  • Management API: Track API usage quotas

🔐 Authentication

  • JWT-based authentication with HS256 signing
  • Automatic token generation and management
  • Secure session-level credential storage

Prerequisites

Installation

Development Setup

# Install dependencies
uv sync

# Run the server
uv run dev

# Test interactively
uv run playground

Using with Claude Desktop

Add to your Claude Desktop configuration file:

MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%/Claude/claude_desktop_config.json

{
  "mcpServers": {
    "stealthmole": {
      "command": "uv",
      "args": [
        "--directory",
        "/absolute/path/to/stealthmole-mcp",
        "run",
        "start"
      ],
      "env": {
        "STEALTHMOLE_ACCESS_KEY": "your_access_key",
        "STEALTHMOLE_SECRET_KEY": "your_secret_key"
      }
    }
  }
}

Replace /absolute/path/to/stealthmole-mcp with the actual path to this directory.

Available Tools

Darkweb Tracker

dt_search_targets

Get list of searchable targets for an indicator

indicator: keyword, email, domain, ip, bitcoin, etc.
Returns: Available targets for the indicator

dt_search_target

Search for specific indicator and targets

indicator: Search type
targets: Comma-separated target list
text: Search query (supports AND, OR, NOT)
limit: Results limit (max: 100)
order_type: createDate or value
order: asc or desc

dt_search_all

Search across all targets for an indicator

indicator: Search type
text: Search query
limit: Results limit (max: 100)

dt_search_by_id

Get paginated results using search ID

search_id: ID from previous search
cursor: Pagination cursor
limit: Results limit (max: 100)

dt_get_node_details

Get detailed information for a node

node_id: Node ID from search results
parent_id: Optional parent node ID
data_from: Include data source list
include_url: Include URL list
include_contents: Include HTML source

Telegram Tracker

tt_search_targets

Get searchable targets for Telegram indicator

indicator: keyword, telegram.channel, telegram.user, etc.

tt_search_target

Search Telegram for specific targets

indicator: Search type
targets: Comma-separated target list
text: Search query
limit: Results limit (max: 100)

tt_get_node_details

Get detailed Telegram node information

node_id: Node ID from search results

Credential Lookout

cl_search

Search for leaked credentials

query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)
cursor: Pagination cursor
start/end: UTC timestamp filters

Example queries:

  • domain:example.com - All leaks for domain
  • email:user@example.com - Specific email leaks
  • domain:example.com AND after:2024-01 - Recent leaks

Compromised Data Set

cds_search

Search infected device leaks

query: Search with indicators (domain:, url:, email:, id:, password:, ip:, country:, after:, before:)
limit: Results limit (max: 50)

cds_get_node_details

Get detailed CDS information (requires Cyber Security Edition)

node_id: Node ID from search results
Returns: Stealer path, type, and full device info

Combo Binder

cb_search

Search ID/Password combo leaks

query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)

ULP Binder

ub_search

Search URL-Login-Password format leaks

query: Search with indicators (domain:, url:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)

Monitoring APIs

rm_search - Ransomware Monitoring

Monitor ransomware group breach incidents

query: Optional (torurl:, domain:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, victim, or attackGroup

gm_search - Government Monitoring

Monitor threats against government sector

query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, title, or author

lm_search - Leaked Monitoring

Monitor threats against enterprise sector

query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)

Management

get_user_quotas

Get API usage quotas for current month

Returns: Allowed and used queries per service

Search Query Syntax

Indicators

Darkweb Tracker supports 50+ indicators:

Network: domain, ip, tor, torurl, i2p, i2purl, url Identity: email, id, tel, kssn Financial: bitcoin, ethereum, monero, creditcard Files: document, exefile, image, hash, blueprint Social: facebook, twitter, instagram, telegram, discord Security: cve, ioc, malware

Operators

  • AND: Both terms must be present
  • OR: Either term must be present (max 3 per query)
  • NOT: Exclude term from results
  • Max total: 5 operators per query

Examples

keyword search:
  "ransomware"

Indicator search:
  email:user@example.com
  domain:target.com
  bitcoin:1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa

Combined operators:
  domain:example.com AND email:admin
  ip:192.168.1.1 OR ip:10.0.0.1
  domain:target.com AND NOT test

Time filters:
  domain:example.com AND after:2024-01
  email:admin AND before:2024-06-01

Resources

The server provides built-in documentation resources:

  • stealthmole://api-info - API overview and service information
  • stealthmole://indicators - Complete list of Darkweb Tracker indicators

Error Handling

Common API error codes:

  • 401 - Invalid or expired token
  • 400 - Invalid parameters (limit, cursor, etc.)
  • 404 - Resource not found
  • 422 - Bulk export required (>1M results)
  • 426 - Query limit exceeded

API Limits

  • Darkweb Tracker: Max 100 results per request
  • Other APIs: Max 50 results per request
  • Operators: Max 3 OR, max 5 total per query
  • Bulk Export: Contact support for >1M results

Development

Project Structure

stealthmole-mcp/
├── src/stealthmole_mcp/
│   ├── __init__.py
│   └── server.py          # Main server implementation
├── pyproject.toml         # Project configuration
└── README.md             # This file

Running Tests

# Interactive testing
uv run playground

# Try example queries:
dt_search_targets(indicator="keyword")
cl_search(query="domain:example.com")
get_user_quotas()

Deployment

Deploy to Smithery

  1. Push code to GitHub
  2. Deploy at smithery.ai/new
  3. Configure with your StealthMole credentials

Self-Hosting

Run the server directly:

# Production mode
uv run start

# Development mode with auto-reload
uv run dev

Security Notes

⚠️ Important: Keep your API credentials secure

  • Never commit credentials to version control
  • Use environment variables or secure configuration
  • Rotate keys regularly
  • Monitor API usage for anomalies

Support

License

This MCP server implementation is provided as-is. StealthMole API access requires valid subscription and credentials.

Version

Current version: 0.1.0 (November 2024) Based on StealthMole API v2.2

推荐服务器

Baidu Map

Baidu Map

百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。

官方
精选
JavaScript
Playwright MCP Server

Playwright MCP Server

一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。

官方
精选
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。

官方
精选
本地
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。

官方
精选
本地
TypeScript
VeyraX

VeyraX

一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。

官方
精选
本地
graphlit-mcp-server

graphlit-mcp-server

模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。

官方
精选
TypeScript
Kagi MCP Server

Kagi MCP Server

一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。

官方
精选
Python
e2b-mcp-server

e2b-mcp-server

使用 MCP 通过 e2b 运行代码。

官方
精选
Neon MCP Server

Neon MCP Server

用于与 Neon 管理 API 和数据库交互的 MCP 服务器

官方
精选
Exa MCP Server

Exa MCP Server

模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。

官方
精选