urlhaus-mcp-server

urlhaus-mcp-server

3.3

If you are the rightful owner of urlhaus-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

The URLhaus MCP Server is a Model Context Protocol server that interfaces with the URLhaus project to provide access to a database of malicious URLs used for malware distribution. It is designed to assist AI agents in conducting threat intelligence research and cybersecurity analysis.

URLhaus MCP Server

A comprehensive Model Context Protocol (MCP) server that provides access to URLhaus, a project from abuse.ch that collects and shares malicious URLs used for malware distribution. This server enables AI agents to perform threat intelligence research and cybersecurity analysis through the URLhaus database.

Features

This MCP server provides the following tools for querying URLhaus data:

URL Analysis Tools

  • get_recent_urls: Get the most recent malicious URLs from URLhaus
  • lookup_url: Get detailed information about a specific URL
  • search_urls: Search for URLs by various criteria (host, URL, tag, or signature)

Host/Domain Analysis Tools

  • lookup_host: Get information about URLs hosted on a specific host/domain

Malware Analysis Tools

  • lookup_payload: Get information about a malware payload by its hash
  • get_payloads: Get recent malware payloads from URLhaus
  • get_urls_by_tag: Get URLs associated with a specific malware tag/family
  • get_urls_by_signature: Get URLs associated with a specific malware signature

Installation

From GitHub

  1. Clone the repository:

    git clone https://github.com/Cyreslab-AI/urlhaus-mcp-server.git
    cd urlhaus-mcp-server
    
  2. Install dependencies:

    npm install
    
  3. Build the server:

    npm run build
    

From npm (Coming Soon)

npm install -g urlhaus-mcp-server

Configuration

Add the server to your MCP settings configuration:

{
  "mcpServers": {
    "urlhaus": {
      "command": "node",
      "args": ["/path/to/urlhaus-mcp-server/build/index.js"]
    }
  }
}

No API keys or authentication are required as URLhaus provides a free public API.

Usage Examples

Get Recent Malicious URLs

{
  "tool": "get_recent_urls",
  "arguments": {
    "limit": 50
  }
}

Look Up a Specific URL

{
  "tool": "lookup_url",
  "arguments": {
    "url": "https://suspicious-domain.com/malware.exe"
  }
}

Search for URLs by Host

{
  "tool": "search_urls",
  "arguments": {
    "search_term": "malicious-domain.com",
    "limit": 100
  }
}

Get URLs by Malware Family

{
  "tool": "get_urls_by_tag",
  "arguments": {
    "tag": "emotet",
    "limit": 50
  }
}

Look Up Malware Payload

{
  "tool": "lookup_payload",
  "arguments": {
    "hash": "d41d8cd98f00b204e9800998ecf8427e"
  }
}

API Rate Limits

URLhaus has rate limits to prevent abuse. If you encounter rate limiting, wait before making additional requests.

Data Format

All responses include:

  • query_status: Status of the API query ("ok" or error message)
  • summary: Human-readable summary of results
  • Data specific to the query type (URLs, payloads, etc.)

About URLhaus

URLhaus is operated by abuse.ch and provides:

  • Real-time feed of malicious URLs
  • Information about malware payloads
  • Integration with various threat intelligence platforms
  • Free access to security researchers and defenders

For more information, visit: https://urlhaus.abuse.ch/

Development

To run in development mode:

npm run watch

To inspect the server:

npm run inspector

Contributing

Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.

License

This project is licensed under the MIT License - see the file for details.

Acknowledgments

Support

If you encounter any issues or have questions, please open an issue on GitHub.