SecurityTrails MCP Server
Uncover IT infrastructure — access DNS history, subdomains, reverse IP lookups, WHOIS data and advanced domain intelligence for ultimate OSINT.
Ask AI about this MCP Server
Vinkius supports streamable HTTP and SSE.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
What is the SecurityTrails MCP Server?
The SecurityTrails MCP Server gives AI agents like Claude, ChatGPT, and Cursor direct access to SecurityTrails via 10 tools. Uncover IT infrastructure — access DNS history, subdomains, reverse IP lookups, WHOIS data and advanced domain intelligence for ultimate OSINT. Powered by the Vinkius - no API keys, no infrastructure, connect in under 2 minutes.
Built-in capabilities (10)
Tools for your AI Agents to operate SecurityTrails
Ask your AI agent "Find all subdomains for tesla.com." and get the answer without opening a single dashboard. With 10 tools connected to real SecurityTrails data, your agents reason over live information, cross-reference it with other MCP servers, and deliver insights you would spend hours assembling manually.
Works with Claude, ChatGPT, Cursor, and any MCP-compatible client. Powered by the Vinkius - your credentials never touch the AI model, every request is auditable. Connect in under two minutes.
Why teams choose Vinkius
One subscription gives you access to thousands of MCP servers - and you can deploy your own to the Vinkius Edge. Your AI agents only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure and security, zero maintenance.
Build your own MCP Server with our secure development framework →Vinkius works with every AI agent you already use
…and any MCP-compatible client


















SecurityTrails MCP Server capabilities
10 toolsCheck current SecurityTrails API quota usage
Great for expanding the scope of an investigation. Find other domains associated with a target domain
Useful for finding old IPs that might still be hosting vulnerable software, or tracking infrastructure migration over time. Retrieve historical DNS records for a domain
Essential for mapping out a target domain's existing infrastructure. Get complete domain intelligence and current DNS records
Get classification tags for a domain
Essential for understanding shared hosting environments or identifying hidden vhosts. Find all domains pointed to a specific IP address
Critical for attack surface mapping and asset discovery. Returns both active and inactive subdomains. Discover all subdomains for a given domain
Get current WHOIS information for a domain
Useful for OSINT investigations to uncover historical owners before privacy protection was enabled. Retrieve historical WHOIS records for a domain
Examples: `ipv4="1.1.1.1" AND mx="alt1.aspmx.l.google.com"` or `whois_email="admin@example.com"`. Check SecurityTrails docs for full DSL syntax. Advanced search using SecurityTrails DSL
What the SecurityTrails MCP Server unlocks
Connect your SecurityTrails account to any AI agent and empower your OSINT, bug bounty, and threat intelligence workflows with the world's most comprehensive domain and IP database.
What you can do
- Attack Surface Mapping — Instantly enumerate all subdomains for any target organization to map their external footprint
- Historical DNS Analysis — Look back in time at DNS records (A, MX, NS, TXT) to find hidden infrastructure, bypassed firewalls, or legacy systems
- Reverse IP Lookups — Find all domains hosted on a specific IP address to identify shared hosting or related corporate assets
- Advanced Threat Hunting — Use the SecurityTrails DSL (Domain Specific Language) to query the entire internet for specific tech stacks or vulnerable infrastructure
- Ownership Intelligence — Access current and historical WHOIS records to track domain ownership changes and unmask hidden threat actors
- Corporate Associations — Discover domains strongly associated with your primary target to expand your investigation scope
How it works
1. Subscribe to this server
2. Sign up at SecurityTrails to get your API key (Free tier available)
3. Run intelligence queries directly from Claude, Cursor, or any MCP-compatible client
Who is this for?
- Security Researchers & Pentesters — accelerate recon and asset discovery during engagements
- Bug Bounty Hunters — find forgotten subdomains and out-of-scope assets associated with target companies
- Threat Intelligence Analysts — correlate IPs, domains and WHOIS records to track APT infrastructure
- Brand Protection Teams — identify typosquatting and malicious domains targeting your organization
- System Administrators — audit their own external attack surface and verify DNS propagation
Frequently asked questions about the SecurityTrails MCP Server
Is the SecurityTrails API free to use?
SecurityTrails offers a Free Tier API plan which allows 50 API requests per month. This is excellent for specific, targeted OSINT investigations. For automated or large-scale recon, you would need a commercial subscription.
What is historical DNS good for?
Companies often migrate infrastructure and hide behind WAFs like Cloudflare. Historical DNS reveals the original origin IP addresses used before the WAF was implemented, which might still be active and vulnerable to direct attacks. It's a critical tool in penetration testing.
How can I find related domains for a target company?
Use the get_associated_domains tool. It uses proprietary correlation to find other domains owned by the same entity. You can also use get_domains_by_ip to find what else is hosted on their IP space.
More in this category
You might also like
Connect SecurityTrails with your favorite client
Step-by-step setup guides for every MCP-compatible client and framework:
Anthropic's native desktop app for Claude with built-in MCP support.
AI-first code editor with integrated LLM-powered coding assistance.
GitHub Copilot in VS Code with Agent mode and MCP support.
Purpose-built IDE for agentic AI coding workflows.
Autonomous AI coding agent that runs inside VS Code.
Anthropic's agentic CLI for terminal-first development.
Python SDK for building production-grade OpenAI agent workflows.
Google's framework for building production AI agents.
Type-safe agent development for Python with first-class MCP support.
TypeScript toolkit for building AI-powered web applications.
TypeScript-native agent framework for modern web stacks.
Python framework for orchestrating collaborative AI agent crews.
Leading Python framework for composable LLM applications.
Data-aware AI agent framework for structured and unstructured sources.
Microsoft's framework for multi-agent collaborative conversations.
Give your AI agents the power of SecurityTrails MCP Server
Production-grade SecurityTrails MCP Server. Verified, monitored, and maintained by Vinkius. Ready for your AI agents — connect and start using immediately.






