DNStwist MCP Server
A Model Context Protocol (MCP) server for dnstwistβ, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage. This server provides tools for analyzing domain permutations and identifying potentially malicious domains. It is designed to integrate seamlessly with MCP-compatible applications like Claude Desktopβ.
β οΈ Warning
This tool is designed for legitimate security research purposes. Please:
- Only analyze domains you own or have permission to test
- Respect rate limits and DNS server policies
- Use responsibly and ethically
- Be aware that some DNS servers may rate-limit or block automated queries
- Consider the impact on DNS infrastructure when running large scans
Requirements
- Node.js (v18 or later)
- Docker
- macOS, Linux, or Windows with Docker Desktop installed
Quick Start
Installing via Smithery
To install DNStwist for Claude Desktop automatically via Smitheryβ:
npx -y @smithery/cli install @burtthecoder/mcp-dnstwist --client claude
Installing Manually
-
Install Docker:
- macOS: Install Docker Desktopβ
- Linux: Follow the Docker Engine installation guideβ
-
Install the server globally via npm:
npm install -g mcp-dnstwist
- Add to your Claude Desktop configuration file:
{
"mcpServers": {
"dnstwist": {
"command": "mcp-dnstwist"
}
}
}
Configuration file location:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
- Windows:
%APPDATA%\Claude\claude_desktop_config.json
- Restart Claude Desktop
Alternative Setup (From Source)
If you prefer to run from source or need to modify the code:
- Clone and build:
git clone <repository_url>
cd mcp-dnstwist
npm install
npm run build
- Add to your Claude Desktop configuration:
{
"mcpServers": {
"dnstwist": {
"command": "node",
"args": ["/absolute/path/to/mcp-dnstwist/build/index.js"]
}
}
}
Features
- Domain Fuzzing: Generate domain permutations using various algorithms
- Registration Check: Verify if permutated domains are registered
- DNS Analysis: Check A, AAAA, MX, and NS records
- Web Presence: Capture HTTP banner information
- WHOIS Data: Retrieve registration dates and registrar information
- Phishing Detection: Generate fuzzy hashes of web pages
- Configurable: Custom DNS servers and parallel processing
- Multiple Formats: Support for json, csv, and list output formats
Tools
Domain Fuzzing Tool
- Name:
fuzz_domain
- Description: Generate and analyze domain permutations to detect potential typosquatting, phishing, and brand impersonation
- Parameters:
domain
(required): Domain name to analyze (e.g., example.com)nameservers
(optional, default: β1.1.1.1β): Comma-separated list of DNS serversthreads
(optional, default: 50): Number of threads for parallel processingformat
(optional, default: βjsonβ): Output format (json, csv, list)registered_only
(optional, default: true): Show only registered domainsmxcheck
(optional, default: true): Check for MX recordsssdeep
(optional, default: false): Generate fuzzy hashes of web pagesbanners
(optional, default: true): Capture HTTP banner information
Example:
{
"domain": "example.com",
"nameservers": "1.1.1.1,8.8.8.8",
"threads": 50,
"format": "json",
"registered_only": true,
"mxcheck": true,
"banners": true
}
Troubleshooting
Docker Issues
- Verify Docker is installed and running:
docker --version
docker ps
- Check Docker permissions:
- Ensure your user has permissions to run Docker commands
- On Linux, add your user to the docker group:
sudo usermod -aG docker $USER
Common Issues
-
DNS resolution problems:
- Verify DNS servers are accessible
- Try alternative DNS servers (e.g., 8.8.8.8)
- Check for rate limiting or blocking
-
Performance issues:
- Adjust thread count based on system capabilities
- Consider network bandwidth and latency
- Monitor DNS server response times
-
After fixing any issues:
- Save the configuration file
- Restart Claude Desktop
Error Messages
- βDocker is not installed or not runningβ: Install Docker and start the Docker daemon
- βFailed to parse dnstwist outputβ: Check if the domain is valid and the format is correct
- βError executing dnstwistβ: Check Docker logs and ensure proper permissions
- βDNS server not respondingβ: Verify DNS server accessibility and try alternative servers
Contributing
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
License
This project is licensed under the MIT License - see the LICENSE file for details.