StealthMole MCP Server
Enables access to StealthMole's threat intelligence API for searching and monitoring threats across Deep & Dark Web, Telegram channels, leaked credentials, and ransomware incidents. Provides comprehensive cybersecurity intelligence through natural language queries.
README
StealthMole MCP Server
MCP (Model Context Protocol) server for accessing StealthMole threat intelligence API. Search and monitor threats across Deep & Dark Web through Claude and other MCP clients.
Features
🔍 Comprehensive API Coverage
- Darkweb Tracker (DT): Search Deep & Dark web content across 50+ indicators
- Telegram Tracker (TT): Search Telegram channels, users, and messages
- Credential Lookout (CL): Search leaked credentials from breaches
- Compromised Data Set (CDS): Search infected device leaks from stealer malware
- Combo Binder (CB): Search ID/Password combo leaks
- ULP Binder (UB): Search URL-Login-Password format leaks
- Ransomware Monitoring (RM): Monitor ransomware group breach incidents
- Government Monitoring (GM): Monitor threats against government sector
- Leaked Monitoring (LM): Monitor threats against enterprise sector
- Management API: Track API usage quotas
🔐 Authentication
- JWT-based authentication with HS256 signing
- Automatic token generation and management
- Secure session-level credential storage
Prerequisites
- Python: 3.10 or higher
- StealthMole API Credentials: Get your access_key and secret_key from StealthMole
- Smithery API key (optional): For deployment at smithery.ai/account/api-keys
Installation
Development Setup
# Install dependencies
uv sync
# Run the server
uv run dev
# Test interactively
uv run playground
Using with Claude Desktop
Add to your Claude Desktop configuration file:
MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%/Claude/claude_desktop_config.json
{
"mcpServers": {
"stealthmole": {
"command": "uv",
"args": [
"--directory",
"/absolute/path/to/stealthmole-mcp",
"run",
"start"
],
"env": {
"STEALTHMOLE_ACCESS_KEY": "your_access_key",
"STEALTHMOLE_SECRET_KEY": "your_secret_key"
}
}
}
}
Replace /absolute/path/to/stealthmole-mcp with the actual path to this directory.
Available Tools
Darkweb Tracker
dt_search_targets
Get list of searchable targets for an indicator
indicator: keyword, email, domain, ip, bitcoin, etc.
Returns: Available targets for the indicator
dt_search_target
Search for specific indicator and targets
indicator: Search type
targets: Comma-separated target list
text: Search query (supports AND, OR, NOT)
limit: Results limit (max: 100)
order_type: createDate or value
order: asc or desc
dt_search_all
Search across all targets for an indicator
indicator: Search type
text: Search query
limit: Results limit (max: 100)
dt_search_by_id
Get paginated results using search ID
search_id: ID from previous search
cursor: Pagination cursor
limit: Results limit (max: 100)
dt_get_node_details
Get detailed information for a node
node_id: Node ID from search results
parent_id: Optional parent node ID
data_from: Include data source list
include_url: Include URL list
include_contents: Include HTML source
Telegram Tracker
tt_search_targets
Get searchable targets for Telegram indicator
indicator: keyword, telegram.channel, telegram.user, etc.
tt_search_target
Search Telegram for specific targets
indicator: Search type
targets: Comma-separated target list
text: Search query
limit: Results limit (max: 100)
tt_get_node_details
Get detailed Telegram node information
node_id: Node ID from search results
Credential Lookout
cl_search
Search for leaked credentials
query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)
cursor: Pagination cursor
start/end: UTC timestamp filters
Example queries:
domain:example.com- All leaks for domainemail:user@example.com- Specific email leaksdomain:example.com AND after:2024-01- Recent leaks
Compromised Data Set
cds_search
Search infected device leaks
query: Search with indicators (domain:, url:, email:, id:, password:, ip:, country:, after:, before:)
limit: Results limit (max: 50)
cds_get_node_details
Get detailed CDS information (requires Cyber Security Edition)
node_id: Node ID from search results
Returns: Stealer path, type, and full device info
Combo Binder
cb_search
Search ID/Password combo leaks
query: Search with indicators (domain:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)
ULP Binder
ub_search
Search URL-Login-Password format leaks
query: Search with indicators (domain:, url:, email:, id:, password:, after:, before:)
limit: Results limit (max: 50)
Monitoring APIs
rm_search - Ransomware Monitoring
Monitor ransomware group breach incidents
query: Optional (torurl:, domain:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, victim, or attackGroup
gm_search - Government Monitoring
Monitor threats against government sector
query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)
order_type: detectionTime, title, or author
lm_search - Leaked Monitoring
Monitor threats against enterprise sector
query: Optional (url:, id:) or empty for recent
limit: Results limit (max: 50)
Management
get_user_quotas
Get API usage quotas for current month
Returns: Allowed and used queries per service
Search Query Syntax
Indicators
Darkweb Tracker supports 50+ indicators:
Network: domain, ip, tor, torurl, i2p, i2purl, url Identity: email, id, tel, kssn Financial: bitcoin, ethereum, monero, creditcard Files: document, exefile, image, hash, blueprint Social: facebook, twitter, instagram, telegram, discord Security: cve, ioc, malware
Operators
- AND: Both terms must be present
- OR: Either term must be present (max 3 per query)
- NOT: Exclude term from results
- Max total: 5 operators per query
Examples
keyword search:
"ransomware"
Indicator search:
email:user@example.com
domain:target.com
bitcoin:1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
Combined operators:
domain:example.com AND email:admin
ip:192.168.1.1 OR ip:10.0.0.1
domain:target.com AND NOT test
Time filters:
domain:example.com AND after:2024-01
email:admin AND before:2024-06-01
Resources
The server provides built-in documentation resources:
stealthmole://api-info- API overview and service informationstealthmole://indicators- Complete list of Darkweb Tracker indicators
Error Handling
Common API error codes:
401- Invalid or expired token400- Invalid parameters (limit, cursor, etc.)404- Resource not found422- Bulk export required (>1M results)426- Query limit exceeded
API Limits
- Darkweb Tracker: Max 100 results per request
- Other APIs: Max 50 results per request
- Operators: Max 3 OR, max 5 total per query
- Bulk Export: Contact support for >1M results
Development
Project Structure
stealthmole-mcp/
├── src/stealthmole_mcp/
│ ├── __init__.py
│ └── server.py # Main server implementation
├── pyproject.toml # Project configuration
└── README.md # This file
Running Tests
# Interactive testing
uv run playground
# Try example queries:
dt_search_targets(indicator="keyword")
cl_search(query="domain:example.com")
get_user_quotas()
Deployment
Deploy to Smithery
- Push code to GitHub
- Deploy at smithery.ai/new
- Configure with your StealthMole credentials
Self-Hosting
Run the server directly:
# Production mode
uv run start
# Development mode with auto-reload
uv run dev
Security Notes
⚠️ Important: Keep your API credentials secure
- Never commit credentials to version control
- Use environment variables or secure configuration
- Rotate keys regularly
- Monitor API usage for anomalies
Support
- StealthMole API Documentation: api.stealthmole.com
- MCP Protocol: modelcontextprotocol.io
- Smithery Platform: smithery.ai
License
This MCP server implementation is provided as-is. StealthMole API access requires valid subscription and credentials.
Version
Current version: 0.1.0 (November 2024) Based on StealthMole API v2.2
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。