Fire in da houseTop Tip:Paying $100+ per month for Perplexity, MidJourney, Runway, ChatGPT and other tools is crazy - get all your AI tools in one site starting at $15 per month with Galaxy AI Fire in da houseCheck it out free

mcp-cti

MCP.Pizza Chef: jalacloud

The mcp-cti server integrates AlienVault Open Threat Exchange (OTX) threat intelligence into MCP-enabled clients like Claude. It enables real-time access to the latest cyber threat data, including indicators of compromise (IOCs), malicious IPs, domains, URLs, malware hashes, and threat actor profiles. This server facilitates natural language querying of OTX data, empowering security analysts and developers to retrieve and analyze threat intelligence seamlessly within their workflows.

Use This MCP server To

Query real-time threat intelligence from AlienVault OTX Retrieve indicators of compromise (IOCs) for security analysis Analyze malicious IP addresses, domains, and URLs Access malware file hash data for threat detection Profile threat actors using OTX community data Integrate threat intelligence into security automation workflows Enhance incident response with up-to-date threat data Enable natural language querying of CTI data via Claude client

README

otx-cti MCP Server

An MCP (Model Context Protocol) server for accessing AlienVault Open Threat Exchange (OTX) threat intelligence directly in Claude.

ORKL + OTX

Overview

This server connects to AlienVault's OTX DirectConnect API, allowing the Claude for desktop client to search, retrieve, and analyse cyber threat intelligence data. Use this tool to interact with the OTX API using natural language prompting via Claude. By installing this MCP server, you get access to the most recent threat data, including:

  • Threat intelligence pulses
  • Indicators of compromise (IOCs)
  • Malicious IP addresses, domains, and URLs
  • Malware file hashes
  • Threat actor information

Features

  • Real-time Threat Intelligence: Access the latest threat data from AlienVault OTX's global community
  • Comprehensive IOC Analysis: Check if IPs, domains, URLs, or file hashes are known to be malicious
  • Threat Actor Profiling: Retrieve information about known threat actors and their activities
  • Cached Results: Optimised performance with local caching of API responses
  • Asynchronous API: Built with modern async Python for efficient handling of API requests

Tools Provided

Tool Name Description
search_pulses Search for threat intelligence pulses in OTX
get_recent_pulses Get recent threat intelligence pulses
get_pulse_details Get detailed information about a specific pulse
get_pulse_indicators Get indicators of compromise (IOCs) from a specific pulse
get_indicator_details Get detailed information about a specific indicator
check_indicator_malicious Check if an indicator is known to be malicious
get_threat_actor Get information about a specific threat actor

Installation

Prerequisites

  • Python 3.8 or higher
  • An AlienVault OTX account and API key (Sign up here)
  • uv package manager (recommended) or pip

Set Up Using UV (Recommended)

  1. Clone this repository:
    git clone https://github.com/your-username/otx-mcp-server.git
    cd otx-mcp-server
    
  2. Create a Python environment and install dependencies:
    uv venv
    source .venv/bin/activate  # On Windows: .venv\Scripts\activate
    uv pip install -e
    

Set Up Using Pip

  1. Clone this repository:
    git clone https://github.com/your-username/otx-mcp-server.git
    cd otx-mcp-server
    
  2. Create a Python environment and install dependencies:
    python -m venv .venv
    source .venv/bin/activate  # On Windows: .venv\Scripts\activate
    pip install -e
    

Quick install with Claude Desktop

Add the following to your Claude Desktop configuration (claude_desktop_config.json):

  "mcpServers": {
    "otx": {
      "command": "uv",
      "args": [
        "--directory",
        "/path/to/otx-mcp-server",
        "run",
        "otx"
      ],
      "env": {
        "OTX_API_KEY": "YOUR_API_KEY_HERE"
      }
    }
  }
}

The configuration file is typically located at:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json Linux: ~/.config/Claude/claude_desktop_config.json

Sample Prompts

Here are some example prompts to use with the OTX MCP server:

  • "Search for recent threat intelligence related to ransomware attacks on healthcare organisations."
  • "Check if the IP address xxx.xx.xx.xx is associated with any known threats."
  • "Get information about the Golden Chickens/Venom Spider threat actor and their recent activities."
  • "Search OTX for specific industry-related threat intelligence. I am looking for threats targeting Financial Services organisations"
  • "Find indicators of compromise related to the CWE-94 vulnerability."
  • "Check if the domain malicious-example.com is known to be malicious."
  • "Get the latest threat intelligence pulses from the past 3 days."

Resource Types

The server provides access to several resource types:

  • Pulses: otx://pulse/{pulse_id}
  • Indicators: otx://indicator/{indicator_type}/{indicator_value}
  • Threat Actors: otx://actor/{actor_name}

These resources can be referenced and accessed throughout your conversation with Claude.

Security Considerations

This tool is designed for legitimate security research and defence purposes. Always:

  • Use responsibly and follow applicable laws and regulations
  • Maintain proper authorisation for any security testing
  • Handle threat intelligence data with appropriate operational security controls (OPSEC)

mcp-cti FAQ

How do I install the mcp-cti server?
You can install the mcp-cti server by cloning its GitHub repository and following the setup instructions provided in the README file.
What kind of threat intelligence data does mcp-cti provide?
It provides real-time access to threat intelligence pulses, indicators of compromise (IOCs), malicious IPs, domains, URLs, malware hashes, and threat actor information from AlienVault OTX.
Can I use mcp-cti with different LLM clients?
Yes, mcp-cti is designed to work with MCP-enabled clients like Claude, and can be integrated with other LLM providers such as OpenAI and Gemini.
Is the threat intelligence data updated in real-time?
Yes, mcp-cti connects directly to AlienVault OTX's API to provide the most recent threat intelligence data.
How does mcp-cti handle natural language queries?
It allows users to query the OTX threat intelligence database using natural language prompts via MCP clients like Claude.
What security measures are in place when using mcp-cti?
The server uses secure API connections and scoped access to ensure safe and controlled interaction with threat intelligence data.
Can mcp-cti be integrated into automated security workflows?
Yes, it supports integration into security automation pipelines to enhance incident detection and response.
Does mcp-cti support profiling of threat actors?
Yes, it provides detailed threat actor profiles based on data from the AlienVault OTX community.