Skip to main content

๐Ÿ›ก๏ธ MCP AI Powered Threat Intelligence - Revolutionizing Cybersecurity | Built by Arjun Trivedi (4R9UN)

Project description

MseeP.ai Security Assessment Badge

๐Ÿ›ก๏ธ FastMCP ThreatIntel - AI-Powered Threat Intelligence

CI/CD Pipeline codecov PyPI version Python 3.10+ License: Apache-2.0 Docker Pulls Verified on MseeP

๐Ÿš€ MCP AI Powered Threat Intelligence - Revolutionizing Cybersecurity Built by Arjun Trivedi (4R9UN) - Enterprise-Grade Threat Intelligence Platform

A comprehensive Model Context Protocol (MCP) server that provides enterprise-grade threat intelligence capabilities through natural language AI prompts. Analyze IPs, domains, URLs, and file hashes across multiple threat intelligence platforms with advanced APT attribution and interactive reporting.

Demo

โœจ Why FastMCP ThreatIntel?

๐ŸŽฏ Purpose-Built for Modern Security Teams

  • ๐Ÿค– AI-First Design: Natural language queries with intelligent IOC detection
  • ๐Ÿ”— MCP Integration: Seamless integration with Claude Desktop, VSCode (Roo-Cline), and other AI assistants
  • โšก Lightning Fast: UV-powered development with optimized async processing
  • ๐Ÿข Enterprise Ready: Production-grade Docker containers and Kubernetes support

๐Ÿ” Multi-Source Intelligence

  • VirusTotal: File and URL reputation analysis with 70+ antivirus engines
  • AlienVault OTX: Community-driven threat intelligence and IOC feeds
  • AbuseIPDB: IP reputation and geolocation with abuse confidence scoring
  • IPinfo: Enhanced geolocation, ASN, and infrastructure data

๐Ÿค– AI-Powered Analysis

  • Natural Language Interface: Query threats using plain English
  • Advanced APT Attribution: Confidence-scored attribution with MITRE ATT&CK mapping
  • Intelligent IOC Detection: Auto-detects IP addresses, domains, URLs, and file hashes
  • Context-Aware Reporting: Generates comprehensive threat intelligence reports

๐Ÿ“Š Rich Reporting & Visualization

  • Interactive HTML Reports: Modern, responsive design with dark/light modes
  • D3.js Network Graphs: Visual IOC relationship mapping
  • Multiple Output Formats: Markdown, JSON, HTML, and STIX-compliant outputs
  • Export Capabilities: PDF, CSV, and JSON export for integration

๐Ÿš€ Flexible Deployment Options

  • ๐Ÿ”Œ MCP Server: Direct integration with AI assistants
  • ๐Ÿ’ป Standalone CLI: Interactive and batch processing modes
  • ๐Ÿณ Docker Container: Production-ready containerization
  • ๐Ÿ“ฆ Python Package: Embed in your applications and workflows

๐Ÿ—๏ธ Architecture

graph TB
    A[AI Assistant] --> B[MCP Protocol]
    C[CLI Interface] --> D[Core Engine]
    B --> D
    
    D --> E[IOC Processor]
    D --> F[Attribution Engine]
    D --> G[Report Generator]
    
    E --> H[VirusTotal API]
    E --> I[OTX API]
    E --> J[AbuseIPDB API]
    E --> K[IPinfo API]
    
    F --> L[APT Patterns]
    F --> M[MITRE ATT&CK]
    
    G --> N[HTML Reports]
    G --> O[JSON Export]
    G --> P[STIX Output]

๐Ÿš€ Quick Start

Choose your preferred installation method and get started in minutes:

๐Ÿ pip (Fastest)

# Install from PyPI
pip install fastmcp-threatintel

# Interactive setup wizard
threatintel setup

# Analyze your first IOC
threatintel analyze 8.8.8.8 --output-format table --verbose

๐Ÿณ Docker (Production Ready)

# Pull and run with your API keys
docker pull arjuntrivedi/fastmcp-threatintel:latest
docker run -e VIRUSTOTAL_API_KEY=your_key \
           -e OTX_API_KEY=your_key \
           arjuntrivedi/fastmcp-threatintel:latest \
           analyze 192.168.1.1

๐Ÿ”ฅ UV (Developer Recommended)

# Clone and install with UV
git clone https://github.com/4R9UN/fastmcp-threatintel.git
cd fastmcp-threatintel
uv sync

# Run interactive setup
uv run threatintel setup

# Start analyzing
uv run threatintel interactive

๐Ÿ“ฆ Poetry (Traditional)

# Clone and install with Poetry
git clone https://github.com/4R9UN/fastmcp-threatintel.git
cd fastmcp-threatintel
poetry install

# Activate and run
poetry shell
threatintel analyze example.com --output-format html --open-browser

โš™๏ธ Configuration

๐Ÿ”‘ API Keys Setup

Get your free API keys and unlock the full potential:

Service Status Free Tier Limit Get Your Key
VirusTotal Required 1,000 requests/day Sign Up โ†’
OTX Required Unlimited Sign Up โ†’
AbuseIPDB Optional 1,000 requests/day Sign Up โ†’
IPinfo Optional 50,000 requests/month Sign Up โ†’

๐Ÿ› ๏ธ Environment Configuration

Create a .env file in your project directory:

# Required API Keys
VIRUSTOTAL_API_KEY=your_virustotal_api_key
OTX_API_KEY=your_alienvault_otx_api_key

# Optional API Keys (for enhanced functionality)
ABUSEIPDB_API_KEY=your_abuseipdb_api_key
IPINFO_API_KEY=your_ipinfo_api_key

# Performance Tuning
CACHE_TTL=3600              # Cache duration (seconds)
MAX_RETRIES=3               # API retry attempts
REQUEST_TIMEOUT=30          # Request timeout (seconds)

๐Ÿ’ป Usage Examples

CLI Analysis

# Quick single IOC analysis
threatintel analyze 192.168.1.1 --verbose

# Batch analysis from file
threatintel batch iocs.txt --output-file report.html --output-format html

# Interactive threat hunting session
threatintel interactive

# Start MCP server for AI integration
threatintel server --host 0.0.0.0 --port 8000

๐Ÿ”Œ MCP Integration

Integrate with AI assistants for natural language threat intelligence:

VSCode with Roo-Cline

{
  "mcpServers": {
    "threatintel": {
      "command": "threatintel",
      "args": ["server", "--port", "8001"],
      "env": {
        "VIRUSTOTAL_API_KEY": "your_key",
        "OTX_API_KEY": "your_key"
      }
    }
  }
}

Claude Desktop

{
  "mcpServers": {
    "threatintel": {
      "command": "threatintel",
      "args": ["server"],
      "env": {
        "VIRUSTOTAL_API_KEY": "your_key",
        "OTX_API_KEY": "your_key"
      }
    }
  }
}

๐Ÿ”— Complete MCP Integration Guide โ†’

๐ŸŽฏ AI Prompt Examples

"Analyze IP 8.8.8.8 for security threats and provide geolocation data"
"Check if domain example.com has any malicious associations"
"Perform comprehensive threat analysis on 185.220.101.1 with APT attribution"
"Generate a security incident report for these IOCs: [list]"

๐Ÿ“š Documentation

๐Ÿ“– User Guides

๐Ÿ› ๏ธ Developer Resources

๐ŸŒŸ What Makes It Special

**๐Ÿ”ฅ MCP Functionality **

  • MCP AI Powered: Cutting-edge threat intelligence automation
  • Revolutionizing Cybersecurity: Enterprise-grade AI-powered platform
  • Community-Focused: Open source with professional quality

๐Ÿš€ Production-Ready Features

  • Multi-Architecture Docker: ARM64 and AMD64 support
  • Kubernetes Ready: Helm charts and deployment manifests
  • Comprehensive Testing: 80%+ code coverage with CI/CD pipeline
  • Security First: Secure by design with best practices

โšก Performance Optimized

  • Async Everything: Non-blocking I/O for maximum throughput
  • Intelligent Caching: Redis-compatible caching layer
  • Rate Limiting: Built-in API rate limit management
  • Batch Processing: Efficient bulk IOC analysis

๐Ÿค Contributing

We welcome contributions from the cybersecurity community!

Quick Start

# Fork and clone
git clone https://github.com/YOUR_USERNAME/fastmcp-threatintel.git
cd fastmcp-threatintel

# Setup development environment
uv sync --dev
uv run pre-commit install

# Make your changes and test
uv run pytest
uv run ruff format . && uv run ruff check .

# Submit your PR
git push origin feature/your-feature

๐Ÿ“– Complete Contributing Guide โ†’

๐Ÿ“œ License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

๐Ÿ™ Acknowledgments

Special thanks to the cybersecurity community and these amazing projects:

๐Ÿ”— Links & Resources

๐ŸŒŸ Star this repo if you find it useful! ๐ŸŒŸ

GitHub stars GitHub forks

๐Ÿ“š Documentation โ€ข ๐Ÿ› Report Bug โ€ข ๐Ÿ’ก Request Feature โ€ข ๐Ÿ’ฌ Discussions

๐Ÿ“ฆ PyPI Package โ€ข ๐Ÿณ Docker Hub


Built with โค๏ธ by Arjun Trivedi (4R9UN) for the cybersecurity community

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_4r9un_fastmcp_threatintel-0.2.7.tar.gz (9.5 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_4r9un_fastmcp_threatintel-0.2.7.tar.gz.

File metadata

  • Download URL: iflow_mcp_4r9un_fastmcp_threatintel-0.2.7.tar.gz
  • Upload date:
  • Size: 9.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_4r9un_fastmcp_threatintel-0.2.7.tar.gz
Algorithm Hash digest
SHA256 386482772b6793b1177ca1a0b7d6e2d89ccabea48b20d7b7b6ea0112bd0a7777
MD5 0d17e823e1b028ad667bb62f28cb845e
BLAKE2b-256 0423f1c0ca74148359d6968cd7118c3b0d2baf6809602862996b9bddfa1a7f9f

See more details on using hashes here.

File details

Details for the file iflow_mcp_4r9un_fastmcp_threatintel-0.2.7-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_4r9un_fastmcp_threatintel-0.2.7-py3-none-any.whl
  • Upload date:
  • Size: 30.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_4r9un_fastmcp_threatintel-0.2.7-py3-none-any.whl
Algorithm Hash digest
SHA256 129f616575b546027d327a441411daad2ae7a8fbfc14e533fcc8330568b6e4f8
MD5 f790f2523e199d043b893d64cad84618
BLAKE2b-256 a8507a117ad0c77dabd985ff9707b18bdc4c71dfb634ffe6d90c43b6d238034b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page