MCP Server
A Python MCP server based on the public ScanMalware.com API, providing functions such as malware scanning, phishing detection, and TLS certificate checking. It supports local running, Docker deployment, and DigitalOcean cloud server deployment.
rating : 2 points
downloads : 5.6K
What is the ScanMalware MCP Server?
The ScanMalware MCP server serves as a bridge, exposing the capabilities of the professional malware and phishing website scanning service (ScanMalware.com) to AI assistants through the Model Context Protocol (MCP) standard. This means that when chatting with an AI like Claude, you can directly request it to analyze a suspicious link without leaving the chat interface. The server will handle all complex communications with the backend scanning API and return structured results to the AI, which will then summarize them for you in an easy - to - understand manner.How to Use the ScanMalware MCP Server?
Using it requires two parts: 1) A running ScanMalware MCP server (you can run it locally on your computer or connect to our publicly deployed instance). 2) An AI client that supports the MCP protocol (such as Claude Desktop), and configure it to connect to the server. After configuration, you can naturally make analysis requests in the conversation, for example: "Please help me check if the link `https://suspicious - login.com` is safe." The AI will call the tools provided by the server to complete the scan and report to you.Applicable Scenarios
This service is very suitable for scenarios that require a quick preliminary judgment of website security, such as: - **Email security analysis**: When receiving a link in a suspicious email, immediately let the AI assistant perform a scan. - **Brand protection monitoring**: Regularly search for phishing websites that imitate the company's official website or login page. - **Security operations assistance**: Provide a tool for security analysts to quickly query scan history and details. - **Personal security protection**: Conduct a security check before clicking on an unfamiliar link.Main Features
Submit URL for Scanning
Submit a URL to ScanMalware.com for in - depth security scanning. You can specify the scanning depth (quick/deep) and choose whether to wait for the scan to complete before returning the results.
Get Scan Results and Status
Query the detailed results of a specific scan task through the scan ID, including the risk score, threat classification, detected indicators (such as suspicious JavaScript, malicious redirection), and the scan status (queued, in progress, completed).
Search Historical Scan Records
Search in the historical scan database using various filtering conditions (such as keywords, risk levels, time ranges, statuses) to facilitate threat hunting and trend analysis.
Download Scan Resources
Obtain rich resource files generated during the scan, such as:
- **Website screenshots**: Visual snapshots of the page during the scan.
- **TLS certificates**: Details of the website's SSL/TLS certificates (in PEM format).
- **Page text**: Extracted text content of the web page.
- **Technical metadata**: IP addresses, server header information, DNS records, etc.
TLS/SSL Certificate Check
Specifically obtain and analyze detailed information about the TLS/SSL certificates used by the website, including the issuer, validity period, and Subject Alternative Name (SAN), to help identify certificate fraud or configuration errors.
Flexible Deployment Modes
Support multiple running modes to meet different needs:
- **Local running**: Quickly test using a Python virtual environment.
- **Docker containerization**: Facilitate deployment and isolation in a server environment.
- **Cloud deployment**: Provide complete scripts for one - click deployment to cloud platforms such as DigitalOcean.
Advantages
**Seamless AI integration**: Enable AI assistants to directly obtain professional security scanning capabilities, improving work efficiency.
**Comprehensive functions**: Cover the complete workflow from submitting scans, querying results to downloading evidence.
**Easy to deploy**: Provide detailed local and cloud deployment guides, support Docker, and reduce the operation and maintenance threshold.
**Standardized protocol**: Based on the MCP protocol, compatible with any client that supports the protocol, with good future scalability.
**Secure and controllable**: Support configuration of API tokens and access control, and can be deployed in an intranet environment.
Limitations
**Dependence on the backend API**: The depth and quality of the scanning function depend on the capabilities and quotas of the ScanMalware.com public API.
**Non - real - time interaction**: Deep scans may take a long time (tens of seconds to minutes), which is not suitable for scenarios that require second - level responses.
**Requires technical knowledge**: Initial server deployment and client configuration require certain command - line and system management knowledge.
**Some advanced functions are restricted**: Some advanced or experimental API endpoints of ScanMalware.com are not exposed in this MCP server.
How to Use
Start the MCP Server
First, you need to get the ScanMalware MCP server up and running. The simplest way is to run it locally using Python.
Configure the AI Client
Next, add this MCP server to the configuration file of your AI client (such as Claude Desktop). This usually involves editing a JSON configuration file.
Use in Conversation
After restarting the AI client, you can directly use the scanning function in the conversation. The AI now knows it has tools such as 'submit scan' and 'query results'.
(Optional) Deploy to the Cloud
If you want to share it with the team or run it long - term, you can deploy the server to a DigitalOcean cloud server according to the documentation and provide secure HTTP access through Nginx.
Usage Cases
Rapid Identification of Phishing Links
A user receives an email pretending to be from a technology company (such as 'TechCorp') asking to update account information. The user is suspicious of the link in the email.
Brand Abuse Monitoring Report
The security team of a company wants to check once a week if there are any new phishing websites imitating its brand (such as 'Acme') on the Internet.
In - depth Website Security Analysis
Developers or security researchers need to conduct in - depth analysis of a website marked as suspicious to obtain technical details as evidence or research materials.
Frequently Asked Questions
Do I need to pay to use the ScanMalware.com API?
How long does it take to scan a link?
Can I scan websites in the company's intranet?
How to ensure the security of my MCP server communication?
Why do some search tools tell me that I need to provide at least one filtering condition?
Related Resources
ScanMalware.com Official Website
Learn detailed information, function demonstrations, and API documentation of the backend scanning service.
Model Context Protocol (MCP) Official Site
Learn the standards, specifications, and working principles of the MCP protocol.
Project Source Code Repository
Obtain the latest source code of this MCP server, submit issues, and contribute code.
DigitalOcean Console
If you choose cloud deployment, you can manage your Droplet (cloud server), firewall, and network settings here.
Claude Desktop Download and Configuration
Download the Claude Desktop client that supports MCP and view the official guide for configuring the MCP server.

Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
21.5K
4.5 points

Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
24.7K
4.3 points

Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
73.3K
4.3 points

Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
34.6K
5 points

Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
32.5K
5 points

Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
64.8K
4.5 points

Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
21.1K
4.5 points

Context7
Context7 MCP is a service that provides real-time, version-specific documentation and code examples for AI programming assistants. It is directly integrated into prompts through the Model Context Protocol to solve the problem of LLMs using outdated information.
TypeScript
97.5K
4.7 points



