MCP Integration
This is a public HTTP streaming implementation of the Model Context Protocol (MCP) for https://www.robtex.com
Endpoint: https://mcp.robtex.com/mcp
You can try it out directly on ChatGPT as a GPT
🤖 Setup Instructions
Claude Desktop
Add to your Claude Desktop config file:
{ "mcpServers": { "robtex": { "url": "https://mcp.robtex.com/mcp" } } }📍 Config file location
- Windows:
%APPDATA%\Claude\config.json - macOS:
~/Library/Application Support/Claude/config.json - Linux:
~/.config/Claude/config.json
Claude Code (Terminal)
Run this command:
claude mcp add --transport http robtex https://mcp.robtex.com/mcp
ChatGPT (Custom GPT)
Quick setup:
- Go to GPT Builder
- Click Create → Configure → Actions
- Click "Import from URL"
- Enter:
https://mcp.robtex.com/mcp/openapi.yaml - Click Import and save
Or manually add the endpoint https://mcp.robtex.com/mcp as an action.
Note: After adding the configuration, restart your Claude application for changes to take effect.
🔧 Available Tools (42)
- latest_lightning_channels: Returns the most recently opened Lightning Network channels, sorted by open time descending.
- ip_reputation: Check an IP address reputation against 100+ real-time blocklists (DNSBLs). Returns listing status, threat categories, AS info, and blocklist details.
- lookup_dns: Lookup DNS records (A, AAAA, MX, NS, TXT, CNAME, SOA) for a given hostname. Also returns domain reputation info (Majestic, Tranco rankings, blocklist status).
- reverse_lookup_dns_records: Find hostnames that use a specific DNS record value. Query which hostnames point to an IP address, use a particular nameserver, or reference any DNS value. For example: 'which hostnames point to 1.2.3.4?' or 'which hostnames use chris.ns.cloudflare.com as their nameserver?'
- reverse_lookup_mx: Find hostnames that use a specific mail server. For example: which hostnames use aspmx.l.google.com as their mail server?
- reverse_lookup_ns: Find hostnames that use a specific nameserver. For example: which hostnames use chris.ns.cloudflare.com as their nameserver?
- reverse_lookup_ip: Find hostnames that point to a specific IP address (IPv4 or IPv6). Searches both A and AAAA records. For example: which hostnames point to 1.2.3.4?
- historic_reverse_lookup_ns: Find hostnames that *previously* used a specific nameserver but no longer do. Tracks infrastructure migrations and past delegation relationships.
- historic_reverse_lookup_mx: Find hostnames that *previously* used a specific mail server but no longer do. Tracks email provider migrations and past MX relationships.
- historic_reverse_lookup_ip: Find hostnames that *previously* pointed to a specific IP address but no longer do. Tracks hosting migrations and past IP relationships. Searches both A and AAAA records.
- lookup_mac: Look up the manufacturer/vendor of a network device by its MAC address. Uses the official IEEE OUI (Organizationally Unique Identifier) database with ~30K entries.
- lookup_as_whois: Lookup WHOIS information for an Autonomous System (AS) number from the RADB routing database. Returns routing policy, network information, and administrative contacts.
- lookup_lightning_node: Lookup a Lightning Network node by public key. Returns node alias, peer count, channel count, and centrality ranking.
- lookup_lightning_channel: Lookup a Lightning channel by channel ID. Supports numeric, block x txn x vout, or block:txn:vout formats.
- lookup_lightning_channels_per_node: Lookup all Lightning Network channels for a given node by public key.
- get_recommended_lightning_peers: Get recommended Lightning Network peers for a given node. Returns nodes that are NOT currently peered with the specified node but would improve its centrality score if connected.
- search_lightning_nodes_by_alias: Search for Lightning Network nodes by partial alias match. Returns nodes whose aliases contain the search term (case-insensitive).
- ipquery: Returns network info, geolocation, and DNS records for an IP address.
- asquery: Returns networks associated with an AS number.
- pdns_forward: Returns passive DNS records for a domain (A, AAAA, MX, NS, CNAME).
- pdns_reverse: Returns domains that reference a given value. Use type=a (default) for IP, type=ns for nameserver, type=mx for mail server.
- pdns_reverse_historic: Returns domains that previously referenced a given value but no longer do. Use type=a (default) for IP, type=ns for nameserver, type=mx for mail server.
- parse_hostname: Parse a hostname into its constituent parts using the Mozilla Public Suffix List (9700+ entries). Returns eTLD (effective TLD), registered domain, subdomain, labels, and depth. Handles multi-level eTLDs (co.uk, co.jp, com.au) and platform suffixes (github.io, herokuapp.com).
- is_subdomain: Check whether a hostname is a subdomain (has labels beyond the registered domain). Uses the Mozilla Public Suffix List for accurate eTLD detection.
- registered_domain: Extract the registered domain (eTLD+1) from a hostname. For example, www.mail.example.co.uk returns example.co.uk.
- tld_info: Get information about a top-level domain or effective TLD. Returns whether it is in the Public Suffix List, how many sub-suffixes exist, and classification (ccTLD, gTLD, or infrastructure).
- reverse_lookup_cname: Find hostnames that have a CNAME record pointing to the specified target. Useful for CDN and load balancer investigations.
- historic_reverse_lookup_cname: Find hostnames that previously had a CNAME record pointing to the specified target but no longer do. Tracks CDN and infrastructure migrations.
- ip_geolocation: Get geographic location data for an IP address: country, city, region, latitude, longitude, timezone.
- ip_network: Get the containing network (BGP route), AS number, AS name, and route description for an IP address.
- ip_to_asn: Lightweight lookup: get just the AS number and netblock for an IP address. Fastest way to map IP to ASN.
- ip_blocklist_check: Check an IP address against IPsum, FireHOL, Tor exit node lists, C2 indicators, and other threat intelligence feeds. Returns which lists the IP appears on and threat scores.
- ip_threat_intel: Combined threat intelligence: DNSBL listings, IPsum score, FireHOL lists, bad ASN flag, Tor exit status. Comprehensive threat assessment for an IP address.
- as_info: Get the name, organization, country, and description for an Autonomous System number. Lightweight version of as_whois.
- as_prefixes: Get all IPv4 and IPv6 network prefixes (netblocks) announced by an Autonomous System. Returns BGP-visible routes.
- domain_reputation: Get comprehensive domain reputation: Majestic rank, Tranco rank, HaGeZi blocklist status, Blackbook malware status, phishing database status, HSTS preload status, and disposable email detection.
- domain_ranking: Get domain popularity rankings from five independent sources: Majestic Million (backlinks), Tranco top 1M (aggregated traffic), Cloudflare Radar (1.1.1.1 DNS query popularity), Cisco Umbrella (OpenDNS query popularity), and Chrome UX Report (real Chrome user traffic).
- domain_blocklist_check: Check a domain against HaGeZi DNS blocklists, Steven Black unified hosts, Blackbook malware list, and phishing databases. Returns which lists the domain appears on.
- domain_shared_ip: Find other domains hosted on the same IP address(es) as the target domain. Resolves the domain's A records, then performs reverse IP lookups for each.
- domain_shared_ns: Find other domains using the same nameserver(s) as the target domain. Resolves the domain's NS records, then performs reverse NS lookups for each.
- domain_shared_mx: Find other domains using the same mail server(s) as the target domain. Resolves the domain's MX records, then performs reverse MX lookups for each.
- ping: Check if the API is responding. Returns status and server timestamp.