urlDNA

Dynamically scan and analyze potentially malicious URLs using the urlDNA.io

urlDNA MCP Server

Blog

Claude Prompt

The urlDNA MCP Server enables native tool use for security-focused LLM agents like OpenAI GPT-4.1 and Claude Desktop, providing a direct interface to interact with the urlDNA threat intelligence platform via API.


Installation & Setup

This project uses uv for fast Python package management.

Prerequisites

Install uv if you haven't already:

# On macOS and Linux
curl -LsSf https://astral.sh/uv/install.sh | sh

# On Windows
powershell -c "irm https://astral.sh/uv/install.ps1 | iex"

# Or with pip
pip install uv

Quick Start

  1. Clone and setup the project:
git clone <repository-url>
cd urlDNA-mcp-server
uv sync
  1. Run the MCP server locally (stdio mode):
uv run python urldna_mcp/run.py
  1. Run the MCP server in SSE mode:
uv run python urldna_mcp/server.py

Development

# Install development dependencies
uv sync --dev

# Run tests (when available)
uv run pytest

# Format code
uv run black .

# Type checking
uv run mypy .

# Lint code
uv run flake8 .

Hosted MCP Server

The urlDNA MCP server is already hosted and available at:

https://mcp.urldna.io/sse

This server is accessible over Server-Sent Events (SSE) protocol, which supports streaming interactions between LLMs and the backend tools.

You can use it directly with any platform or LLM that supports the MCP specification (e.g., Claude Desktop, OpenAI GPT-4.1).


Supported Tools

Scanning

ToolDescription
fast_checkInstantly check if a URL has been scanned. Returns SAFE / MALICIOUS / UNRATED.
new_scanSubmit a URL for a full scan and wait for the result (~30–60s).
get_scanRetrieve a complete scan result by ID.

Search

ToolDescription
searchSearch scans using CQL (Custom Query Language) across domain, IP, technology, malicious flag, and more. Supports pagination (page 2+ requires PREMIUM).

Saved Queries

ToolDescription
list_queriesList all saved queries for the authenticated user.
get_queryRetrieve a specific saved query and its filters by ID.
create_queryCreate a new saved query with one or more CQL filter conditions.
update_queryUpdate an existing query's name and filters (full replacement).
delete_queryPermanently delete a saved query by ID.
query_scansRetrieve all matching scans for a saved query.

Brand Monitoring

ToolDescription
list_brandsList available brands with optional name search and visibility filter (ALL / FREE / PREMIUM / USER_BRANDS).
get_brandRetrieve full details of a specific brand by ID.
brand_scansGet all scans associated with a brand. Supports additional CQL filtering.

API Reference

ToolDescription
get_api_docsFetch the full urlDNA OpenAPI specification for API integration guidance.

Integration with Claude Desktop

To integrate the urlDNA MCP server in Claude Desktop, update your claude_desktop_config.json:

{
  "mcpServers": {
    "urlDNA": {
      "command": "uv",
      "args": [
        "--directory",
        "C:\\Users\\pripamonti\\urlDNA\\mcp\\urldna_mcp",
        "run",
        "run.py"
      ],
      "env": {
        "authorization": "<urlDNA_API_KEY>"
      }
    }
  }
}

Replace <YOUR_PATH> with the actual path to the project directory and <urlDNA_API_KEY> with your API key from https://urldna.io.

Once configured, you can prompt Claude with natural language, for example:

"Search in urlDNA for malicious scans with title like paypal"

"Create a saved query for mobile scans from Italy that are flagged as malicious"

"Show me all scans associated with the Google brand"

Claude will automatically call the correct tool and return results from the urlDNA platform.


Using the MCP Server with OpenAI GPT-4.1

from openai import OpenAI

# Initialize OpenAI client (assumes OPENAI_API_KEY is set via environment variable)
client = OpenAI()

response = client.responses.create(
    model="gpt-4.1",  # GPT-4.1 supports native MCP tool use
    input=[
        {
            "role": "system",
            "content": [{"type": "input_text", "text": "You are a cybersecurity analyst using urlDNA."}]
        },
        {
            "role": "user",
            "content": [{"type": "input_text", "text": "Search in urlDNA for malicious scans with title like paypal"}]
        }
    ],
    text={"format": {"type": "text"}},
    reasoning={},
    tools=[
        {
            "type": "mcp",
            "server_label": "urlDNA",
            "server_url": "https://mcp.urldna.io/sse",
            "headers": {
                "Authorization": "Bearer <URLDNA_API_KEY>"  # Replace with your urlDNA API key
            },
            "allowed_tools": [
                # --- Scanning ---
                "new_scan",       # Submit a URL for a full scan and wait for the result
                "get_scan",       # Retrieve a scan result by ID
                "fast_check",     # Lightweight instant safety check (SAFE / MALICIOUS / UNRATED)

                # --- Search ---
                "search",         # Search scans using CQL (Custom Query Language)

                # --- Saved Queries (PREMIUM) ---
                "list_queries",
                "get_query",
                "create_query",
                "update_query",
                "delete_query",
                "query_scans",

                # --- Brand Monitoring (PREMIUM) ---
                "list_brands",
                "get_brand",
                "brand_scans",

                # --- API Reference ---
                "get_api_docs",
            ],
            "require_approval": "never"
        }
    ],
    temperature=0.7,
    top_p=1,
    max_output_tokens=2048,
    store=True
)

print(response.output)

Container Deployment

Build and run with Docker:

# Build the container
docker build -t urldna-mcp-server .

# Run the server
docker run -p 8080:8080 -e authorization=<URLDNA_API_KEY> urldna-mcp-server

Contributing

  1. Fork the repository
  2. Create a feature branch: git checkout -b feature-name
  3. Install development dependencies: uv sync --dev
  4. Make your changes and ensure tests pass
  5. Format code: uv run black .
  6. Submit a pull request

Contact & Support

For support or API access, visit https://urldna.io or email urldna@urldna.io.

Related Servers