About
This MCP server queries the historical usernames of a Twitter account, providing a timeline of screen name changes. It helps investigators and analysts detect suspicious rebranding or potential scam activity in crypto projects.
Capabilities
Twitter Username Changes MCP Server
The Twitter Username Changes MCP server fills a critical gap in social‑media risk assessment by exposing the full history of a Twitter account’s screen names. In the crypto and NFT space, it is common for projects to frequently change their Twitter handles as a way to evade detection or reset brand perception. This behavior can signal phishing attempts, scam operations, or sudden shifts in ownership. By providing a reliable, programmatic source for username timelines, the server enables developers and AI assistants to surface historical context that would otherwise require manual exploration or reliance on third‑party services.
At its core, the server offers a single tool——which accepts a current screen name and returns the chronological list of all previous handles along with the dates during which each was active. The data is retrieved via a lightweight HTTP request to Twitter’s public API endpoints, then parsed into a structured format that includes user IDs and date ranges. The response can be fed directly into downstream analytics pipelines or displayed to users in conversational agents, allowing for instant verification of account legitimacy.
Key capabilities include:
- Historical Transparency: Full audit trails of handle changes, enabling trend analysis and flagging of suspicious patterns.
- Prompt Templates: Built‑in prompt scaffolding that guides users on how to phrase queries, improving usability for non‑technical stakeholders.
- Minimal Footprint: Dependencies are limited to the framework and the standard library, ensuring quick deployment in CI/CD or local environments.
Typical use cases span several domains:
- Compliance & KYC: Regulatory teams can automatically cross‑check a candidate’s Twitter history against known scam lists.
- Security Research: Threat analysts can batch‑query a list of handles to detect rebranding or takeover attempts.
- AI‑Powered Investigations: Claude or other assistants can call the tool during a conversation, instantly providing users with the historical context of an account they mention.
Integration into AI workflows is straightforward. Once registered in a client such as Claude Desktop, the tool appears behind the hammer icon; a simple natural‑language request like “Show me the username change history for @OSINT_Ukraine” triggers a call to . The assistant then formats the returned data into a readable summary, keeping users informed without leaving the chat interface.
What sets this MCP apart is its focus on a niche yet high‑impact data set that is often overlooked. By exposing Twitter’s username history through a standardized protocol, it democratizes access to critical investigative data and empowers developers to build richer, context‑aware applications that can detect fraud, verify identities, or monitor brand integrity in real time.
Related Servers
MindsDB MCP Server
Unified AI-driven data query across all sources
Homebrew Legacy Server
Legacy Homebrew repository split into core formulae and package manager
Daytona
Secure, elastic sandbox infrastructure for AI code execution
SafeLine WAF Server
Secure your web apps with a self‑hosted reverse‑proxy firewall
mediar-ai/screenpipe
MCP Server: mediar-ai/screenpipe
Skyvern
MCP Server: Skyvern
Weekly Views
Server Health
Information
Explore More Servers
MCP API Client
YAML‑driven API gateway for LLMs
Gcp Auditmate MCP Server
Self‑service GCP audit toolkit powered by Model Context Protocol
Salesforce DX MCP Server
LLM‑powered Salesforce org management in one protocol
Bluesky MCP Server
Integrate Bluesky into LLMs with natural language tools
MCP Collections
Unified access to YouTube, Mermaid, Reddit, and web data
AX Platform MCP Server
AI Agent Collaboration Hub via Model Context Protocol