MCPSERV.CLUB
kukapay

Twitter Username Changes MCP Server

MCP Server

Track Twitter screen name histories to spot scam risk

Stale(50)
2stars
2views
Updated May 21, 2025

About

This MCP server queries the historical usernames of a Twitter account, providing a timeline of screen name changes. It helps investigators and analysts detect suspicious rebranding or potential scam activity in crypto projects.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

Twitter Username Changes MCP Server

The Twitter Username Changes MCP server fills a critical gap in social‑media risk assessment by exposing the full history of a Twitter account’s screen names. In the crypto and NFT space, it is common for projects to frequently change their Twitter handles as a way to evade detection or reset brand perception. This behavior can signal phishing attempts, scam operations, or sudden shifts in ownership. By providing a reliable, programmatic source for username timelines, the server enables developers and AI assistants to surface historical context that would otherwise require manual exploration or reliance on third‑party services.

At its core, the server offers a single tool——which accepts a current screen name and returns the chronological list of all previous handles along with the dates during which each was active. The data is retrieved via a lightweight HTTP request to Twitter’s public API endpoints, then parsed into a structured format that includes user IDs and date ranges. The response can be fed directly into downstream analytics pipelines or displayed to users in conversational agents, allowing for instant verification of account legitimacy.

Key capabilities include:

  • Historical Transparency: Full audit trails of handle changes, enabling trend analysis and flagging of suspicious patterns.
  • Prompt Templates: Built‑in prompt scaffolding that guides users on how to phrase queries, improving usability for non‑technical stakeholders.
  • Minimal Footprint: Dependencies are limited to the framework and the standard library, ensuring quick deployment in CI/CD or local environments.

Typical use cases span several domains:

  • Compliance & KYC: Regulatory teams can automatically cross‑check a candidate’s Twitter history against known scam lists.
  • Security Research: Threat analysts can batch‑query a list of handles to detect rebranding or takeover attempts.
  • AI‑Powered Investigations: Claude or other assistants can call the tool during a conversation, instantly providing users with the historical context of an account they mention.

Integration into AI workflows is straightforward. Once registered in a client such as Claude Desktop, the tool appears behind the hammer icon; a simple natural‑language request like “Show me the username change history for @OSINT_Ukraine” triggers a call to . The assistant then formats the returned data into a readable summary, keeping users informed without leaving the chat interface.

What sets this MCP apart is its focus on a niche yet high‑impact data set that is often overlooked. By exposing Twitter’s username history through a standardized protocol, it democratizes access to critical investigative data and empowers developers to build richer, context‑aware applications that can detect fraud, verify identities, or monitor brand integrity in real time.