2,500+ MCP servers ready to use
Vinkius
MCP VERIFIED · PRODUCTION READY · VINKIUS GUARANTEED
SecurityTrails

SecurityTrails MCP Server

Built by Vinkius GDPR ToolsFree for Subscribers

Uncover IT infrastructure — access DNS history, subdomains, reverse IP lookups, WHOIS data and advanced domain intelligence for ultimate OSINT.

Vinkius supports streamable HTTP and SSE.

AI AgentVinkius
High Security·Kill Switch·Plug and Play
SecurityTrails
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

What is the SecurityTrails MCP Server?

The SecurityTrails MCP Server gives AI agents like Claude, ChatGPT, and Cursor direct access to SecurityTrails via 10 tools. Uncover IT infrastructure — access DNS history, subdomains, reverse IP lookups, WHOIS data and advanced domain intelligence for ultimate OSINT. Powered by the Vinkius - no API keys, no infrastructure, connect in under 2 minutes.

Built-in capabilities (10)

get_api_usageget_associated_domainsget_dns_historyget_domain_detailsget_domain_tagsget_domains_by_ipget_subdomainsget_whoisget_whois_historysearch_dsl

Tools for your AI Agents to operate SecurityTrails

Ask your AI agent "Find all subdomains for tesla.com." and get the answer without opening a single dashboard. With 10 tools connected to real SecurityTrails data, your agents reason over live information, cross-reference it with other MCP servers, and deliver insights you would spend hours assembling manually.

Works with Claude, ChatGPT, Cursor, and any MCP-compatible client. Powered by the Vinkius - your credentials never touch the AI model, every request is auditable. Connect in under two minutes.

Why teams choose Vinkius

One subscription gives you access to thousands of MCP servers - and you can deploy your own to the Vinkius Edge. Your AI agents only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure and security, zero maintenance.

Build your own MCP Server with our secure development framework →

Vinkius works with every AI agent you already use

…and any MCP-compatible client

CursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWSCursorClaudeOpenAIVS CodeCopilotGoogleLovableMistralAWS

SecurityTrails MCP Server capabilities

10 tools
get_api_usage

Check current SecurityTrails API quota usage

get_associated_domains

Great for expanding the scope of an investigation. Find other domains associated with a target domain

get_dns_history

Useful for finding old IPs that might still be hosting vulnerable software, or tracking infrastructure migration over time. Retrieve historical DNS records for a domain

get_domain_details

Essential for mapping out a target domain's existing infrastructure. Get complete domain intelligence and current DNS records

get_domain_tags

Get classification tags for a domain

get_domains_by_ip

Essential for understanding shared hosting environments or identifying hidden vhosts. Find all domains pointed to a specific IP address

get_subdomains

Critical for attack surface mapping and asset discovery. Returns both active and inactive subdomains. Discover all subdomains for a given domain

get_whois

Get current WHOIS information for a domain

get_whois_history

Useful for OSINT investigations to uncover historical owners before privacy protection was enabled. Retrieve historical WHOIS records for a domain

search_dsl

Examples: `ipv4="1.1.1.1" AND mx="alt1.aspmx.l.google.com"` or `whois_email="admin@example.com"`. Check SecurityTrails docs for full DSL syntax. Advanced search using SecurityTrails DSL

What the SecurityTrails MCP Server unlocks

Connect your SecurityTrails account to any AI agent and empower your OSINT, bug bounty, and threat intelligence workflows with the world's most comprehensive domain and IP database.

What you can do

  • Attack Surface Mapping — Instantly enumerate all subdomains for any target organization to map their external footprint
  • Historical DNS Analysis — Look back in time at DNS records (A, MX, NS, TXT) to find hidden infrastructure, bypassed firewalls, or legacy systems
  • Reverse IP Lookups — Find all domains hosted on a specific IP address to identify shared hosting or related corporate assets
  • Advanced Threat Hunting — Use the SecurityTrails DSL (Domain Specific Language) to query the entire internet for specific tech stacks or vulnerable infrastructure
  • Ownership Intelligence — Access current and historical WHOIS records to track domain ownership changes and unmask hidden threat actors
  • Corporate Associations — Discover domains strongly associated with your primary target to expand your investigation scope

How it works

1. Subscribe to this server
2. Sign up at SecurityTrails to get your API key (Free tier available)
3. Run intelligence queries directly from Claude, Cursor, or any MCP-compatible client

Who is this for?

  • Security Researchers & Pentesters — accelerate recon and asset discovery during engagements
  • Bug Bounty Hunters — find forgotten subdomains and out-of-scope assets associated with target companies
  • Threat Intelligence Analysts — correlate IPs, domains and WHOIS records to track APT infrastructure
  • Brand Protection Teams — identify typosquatting and malicious domains targeting your organization
  • System Administrators — audit their own external attack surface and verify DNS propagation

Frequently asked questions about the SecurityTrails MCP Server

01

Is the SecurityTrails API free to use?

SecurityTrails offers a Free Tier API plan which allows 50 API requests per month. This is excellent for specific, targeted OSINT investigations. For automated or large-scale recon, you would need a commercial subscription.

02

What is historical DNS good for?

Companies often migrate infrastructure and hide behind WAFs like Cloudflare. Historical DNS reveals the original origin IP addresses used before the WAF was implemented, which might still be active and vulnerable to direct attacks. It's a critical tool in penetration testing.

03

How can I find related domains for a target company?

Use the get_associated_domains tool. It uses proprietary correlation to find other domains owned by the same entity. You can also use get_domains_by_ip to find what else is hosted on their IP space.

More in this category

You might also like

Give your AI agents the power of SecurityTrails MCP Server

Production-grade SecurityTrails MCP Server. Verified, monitored, and maintained by Vinkius. Ready for your AI agents — connect and start using immediately.