MCPSERV.CLUB
BurtTheCoder

DNStwist MCP Server

MCP Server

DNS fuzzing for typosquatting and phishing detection

Active(70)
36stars
2views
Updated 27 days ago

About

A Model Context Protocol server that leverages the dnstwist tool to generate domain permutations, check registration status, analyze DNS records, and detect phishing attempts. Ideal for security researchers and threat analysts.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

mcp-dnstwist MCP server

The DNStwist MCP Server bridges the powerful DNS‑fuzzing capabilities of the open‑source dnstwist tool with AI assistants that support the Model Context Protocol. By exposing a rich set of tools—domain permutation generation, registration checks, DNS record inspection, WHOIS lookup, and even web‑page fuzzy hashing—this server turns a complex command‑line workflow into a simple, programmatic interface that can be invoked directly from Claude Desktop or any other MCP‑compatible client. The result is a seamless, automated pipeline for identifying typosquatting, phishing domains, and brand impersonation attempts without leaving the AI environment.

At its core, the server accepts a domain name and optional parameters such as DNS servers, thread count, output format, and whether to filter for registered domains. It then produces a comprehensive report that includes A/AAAA/MX/NS records, HTTP banners, and SSDEEP fuzzy hashes. These data points enable developers to assess the risk profile of each permutation, detect malicious registrations, and verify whether a suspicious domain points to an attacker’s infrastructure. The ability to specify custom nameservers or parallel processing threads gives users fine‑grained control over performance and compliance with rate limits.

Key capabilities are presented as distinct tools within the MCP schema. The primary tool, , encapsulates all functionality from permutation generation to final reporting. It supports multiple output formats—JSON, CSV, or plain list—making it easy to feed results into downstream analytics, threat‑intel dashboards, or automated incident‑response workflows. Because the server runs inside a Docker container (or via a global npm install), it can be deployed on any platform that supports MCP, ensuring consistent behavior across macOS, Linux, and Windows environments.

Real‑world use cases include penetration testers who need to quickly enumerate all potential typosquatting variants of a target brand, security teams monitoring for newly registered domains that mimic corporate names, or incident‑response analysts who want to verify the legitimacy of a suspicious URL before opening it. By integrating directly with an AI assistant, analysts can ask natural‑language queries like “Show me all registered typosquats for ” and receive a ready‑to‑use data set without manual scripting or command execution.

What sets this MCP server apart is its focus on ethical, responsible testing—explicit warnings against unauthorized domain probing—and its comprehensive coverage of DNS‑related data points. Developers can embed it into automated security workflows, trigger alerts on newly registered suspicious domains, or even build custom dashboards that react to real‑time AI queries. In short, the DNStwist MCP Server turns a sophisticated DNS analysis tool into an intuitive, AI‑powered service that empowers developers and security professionals to stay ahead of brand‑impersonation threats.