MCP Integration

This is a public HTTP streaming implementation of the Model Context Protocol (MCP) for https://www.robtex.com

Endpoint: https://mcp.robtex.com/mcp

You can try it out directly on ChatGPT as a GPT

🤖 Setup Instructions

Claude Desktop

Add to your Claude Desktop config file:

{ "mcpServers": { "robtex": { "url": "https://mcp.robtex.com/mcp" } } }
📍 Config file location
  • Windows:%APPDATA%\Claude\config.json
  • macOS:~/Library/Application Support/Claude/config.json
  • Linux:~/.config/Claude/config.json

Claude Code (Terminal)

Run this command:

claude mcp add --transport http robtex https://mcp.robtex.com/mcp

ChatGPT (Custom GPT)

Quick setup:

  1. Go to GPT Builder
  2. Click CreateConfigureActions
  3. Click "Import from URL"
  4. Enter: https://mcp.robtex.com/mcp/openapi.yaml
  5. Click Import and save

Or manually add the endpoint https://mcp.robtex.com/mcp as an action.

Note: After adding the configuration, restart your Claude application for changes to take effect.

🔧 Available Tools (42)

  • latest_lightning_channels: Returns the most recently opened Lightning Network channels, sorted by open time descending.
  • ip_reputation: Check an IP address reputation against 100+ real-time blocklists (DNSBLs). Returns listing status, threat categories, AS info, and blocklist details.
  • lookup_dns: Lookup DNS records (A, AAAA, MX, NS, TXT, CNAME, SOA) for a given hostname. Also returns domain reputation info (Majestic, Tranco rankings, blocklist status).
  • reverse_lookup_dns_records: Find hostnames that use a specific DNS record value. Query which hostnames point to an IP address, use a particular nameserver, or reference any DNS value. For example: 'which hostnames point to 1.2.3.4?' or 'which hostnames use chris.ns.cloudflare.com as their nameserver?'
  • reverse_lookup_mx: Find hostnames that use a specific mail server. For example: which hostnames use aspmx.l.google.com as their mail server?
  • reverse_lookup_ns: Find hostnames that use a specific nameserver. For example: which hostnames use chris.ns.cloudflare.com as their nameserver?
  • reverse_lookup_ip: Find hostnames that point to a specific IP address (IPv4 or IPv6). Searches both A and AAAA records. For example: which hostnames point to 1.2.3.4?
  • historic_reverse_lookup_ns: Find hostnames that *previously* used a specific nameserver but no longer do. Tracks infrastructure migrations and past delegation relationships.
  • historic_reverse_lookup_mx: Find hostnames that *previously* used a specific mail server but no longer do. Tracks email provider migrations and past MX relationships.
  • historic_reverse_lookup_ip: Find hostnames that *previously* pointed to a specific IP address but no longer do. Tracks hosting migrations and past IP relationships. Searches both A and AAAA records.
  • lookup_mac: Look up the manufacturer/vendor of a network device by its MAC address. Uses the official IEEE OUI (Organizationally Unique Identifier) database with ~30K entries.
  • lookup_as_whois: Lookup WHOIS information for an Autonomous System (AS) number from the RADB routing database. Returns routing policy, network information, and administrative contacts.
  • lookup_lightning_node: Lookup a Lightning Network node by public key. Returns node alias, peer count, channel count, and centrality ranking.
  • lookup_lightning_channel: Lookup a Lightning channel by channel ID. Supports numeric, block x txn x vout, or block:txn:vout formats.
  • lookup_lightning_channels_per_node: Lookup all Lightning Network channels for a given node by public key.
  • get_recommended_lightning_peers: Get recommended Lightning Network peers for a given node. Returns nodes that are NOT currently peered with the specified node but would improve its centrality score if connected.
  • search_lightning_nodes_by_alias: Search for Lightning Network nodes by partial alias match. Returns nodes whose aliases contain the search term (case-insensitive).
  • ipquery: Returns network info, geolocation, and DNS records for an IP address.
  • asquery: Returns networks associated with an AS number.
  • pdns_forward: Returns passive DNS records for a domain (A, AAAA, MX, NS, CNAME).
  • pdns_reverse: Returns domains that reference a given value. Use type=a (default) for IP, type=ns for nameserver, type=mx for mail server.
  • pdns_reverse_historic: Returns domains that previously referenced a given value but no longer do. Use type=a (default) for IP, type=ns for nameserver, type=mx for mail server.
  • parse_hostname: Parse a hostname into its constituent parts using the Mozilla Public Suffix List (9700+ entries). Returns eTLD (effective TLD), registered domain, subdomain, labels, and depth. Handles multi-level eTLDs (co.uk, co.jp, com.au) and platform suffixes (github.io, herokuapp.com).
  • is_subdomain: Check whether a hostname is a subdomain (has labels beyond the registered domain). Uses the Mozilla Public Suffix List for accurate eTLD detection.
  • registered_domain: Extract the registered domain (eTLD+1) from a hostname. For example, www.mail.example.co.uk returns example.co.uk.
  • tld_info: Get information about a top-level domain or effective TLD. Returns whether it is in the Public Suffix List, how many sub-suffixes exist, and classification (ccTLD, gTLD, or infrastructure).
  • reverse_lookup_cname: Find hostnames that have a CNAME record pointing to the specified target. Useful for CDN and load balancer investigations.
  • historic_reverse_lookup_cname: Find hostnames that previously had a CNAME record pointing to the specified target but no longer do. Tracks CDN and infrastructure migrations.
  • ip_geolocation: Get geographic location data for an IP address: country, city, region, latitude, longitude, timezone.
  • ip_network: Get the containing network (BGP route), AS number, AS name, and route description for an IP address.
  • ip_to_asn: Lightweight lookup: get just the AS number and netblock for an IP address. Fastest way to map IP to ASN.
  • ip_blocklist_check: Check an IP address against IPsum, FireHOL, Tor exit node lists, C2 indicators, and other threat intelligence feeds. Returns which lists the IP appears on and threat scores.
  • ip_threat_intel: Combined threat intelligence: DNSBL listings, IPsum score, FireHOL lists, bad ASN flag, Tor exit status. Comprehensive threat assessment for an IP address.
  • as_info: Get the name, organization, country, and description for an Autonomous System number. Lightweight version of as_whois.
  • as_prefixes: Get all IPv4 and IPv6 network prefixes (netblocks) announced by an Autonomous System. Returns BGP-visible routes.
  • domain_reputation: Get comprehensive domain reputation: Majestic rank, Tranco rank, HaGeZi blocklist status, Blackbook malware status, phishing database status, HSTS preload status, and disposable email detection.
  • domain_ranking: Get domain popularity rankings from five independent sources: Majestic Million (backlinks), Tranco top 1M (aggregated traffic), Cloudflare Radar (1.1.1.1 DNS query popularity), Cisco Umbrella (OpenDNS query popularity), and Chrome UX Report (real Chrome user traffic).
  • domain_blocklist_check: Check a domain against HaGeZi DNS blocklists, Steven Black unified hosts, Blackbook malware list, and phishing databases. Returns which lists the domain appears on.
  • domain_shared_ip: Find other domains hosted on the same IP address(es) as the target domain. Resolves the domain's A records, then performs reverse IP lookups for each.
  • domain_shared_ns: Find other domains using the same nameserver(s) as the target domain. Resolves the domain's NS records, then performs reverse NS lookups for each.
  • domain_shared_mx: Find other domains using the same mail server(s) as the target domain. Resolves the domain's MX records, then performs reverse MX lookups for each.
  • ping: Check if the API is responding. Returns status and server timestamp.

🔗 More Information