ransomwarelive-mcp-server

slouchd/ransomwarelive-mcp-server

3.1

If you are the rightful owner of ransomwarelive-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

This model context protocol (MCP) server interfaces with the ransomware.live API, allowing users to utilize any LLM/MCP client to analyze and gain insights from ransomware data.

Tools
11
Resources
0
Prompts
0

Ransomware Live MCP Server

This model context protocol (MCP) server interfaces with the ransomware.live API. Allowing you to use any LLM/MCP client of your choosing to reason over this data and find insights.

Credit for ransomware.live goes to its creator Julien Mousqueton.

🧰 Available Tools and Resources

  • get_recent_victims: tool - get details about the last 100 victims claimed by ransomware groups that are tracked by ransomware.live
  • get_sector_counts: tool - get the number of victims by sector that are tracked by ransomware.live
  • get_victims_by_sector: tool - get details about victims within a specific sector
  • get_victims_by_sector_countrycode: tool - get details about victims within a specific sector and country code
  • get_victims_by_countrycode: tool - get details about victims within a specific country
  • get_victims_by_year: tool - get details about the victims within a specific year
  • get_victims_by_year_month: tool - get details about the victims within a specific year and month
  • get_victims_by_keyword: tool - query for victims by keyword
  • get_all_ransomware_groups: tool - get details about all ransomware groups that are tracked by ransomware.live
  • get_ransomware_group: tool - get details about a specific ransomware group according to ransomware.live
  • get_ransomware_group_victims: tool - get all victims of a specific ransomware group according to ransomware.live

📝 Usage

Start the server using the default stdio transport

uv run ransomwarelive_mcp_server

🧑‍💻 Usage (Development)

Start the server and test it with the MCP inspector

uv add "mcp[cli]"
mcp dev server.py

🔍 Example Use Case

Using the MCP server with Claude desktop (you must have Claude desktop installed)

uv add "mcp[cli]"
mcp install server.py --name "Ransomware Live MCP Server"

With a basic prompt:

Claude desktop MCP test

With a basic prompt and visual output:

Claude desktop MCP test

🪪 License

MIT License