An MCP server for the LeakIX API, enabling security research and reconnaissance through Claude and other MCP clients.
Model Context Protocol (MCP) is an open standard that allows AI assistants like Claude to securely connect to external data sources and tools. Instead of copying and pasting data, MCP lets Claude directly query APIs, databases, and services on your behalf.
This server implements MCP to give Claude access to LeakIX's security intelligence platform, allowing you to search for exposed services, data leaks, and security issues through natural conversation.
- Service Search: Find exposed services, open ports, and running software
- Leak Search: Discover data leaks and exposed databases
- Host Lookup: Get detailed information about specific IP addresses
- Domain Lookup: Investigate domains and their associated services
- Subdomain Enumeration: List discovered subdomains
- Plugin Discovery: Browse available detection plugins
- Python 3.13 or later
pip install leakix-mcppip install poetry
git clone https://github.com/LeakIX/leakix-mcp.git
cd leakix-mcp
poetry installgit clone https://github.com/LeakIX/leakix-mcp.git
cd leakix-mcp
make setupSet your LeakIX API key as an environment variable:
export LEAKIX_API_KEY="your-api-key-here"Get your API key from LeakIX Settings.
Add to your Claude Desktop configuration (~/Library/Application Support/Claude/claude_desktop_config.json):
{
"mcpServers": {
"leakix": {
"command": "leakix-mcp",
"env": {
"LEAKIX_API_KEY": "your-api-key-here"
}
}
}
}Add to your Claude Code MCP settings:
{
"mcpServers": {
"leakix": {
"command": "leakix-mcp",
"env": {
"LEAKIX_API_KEY": "your-api-key-here"
}
}
}
}Search for exposed services using LeakIX query syntax.
Parameters:
query(required): Search query (e.g.,+country:"US" +port:22)page(optional): Page number (default: 0)
Example queries:
+country:"France" +port:3306- MySQL servers in France+plugin:OpenSSH- OpenSSH servers+ip:192.168.0.0/16- Services in a CIDR range
Search for data leaks and exposed databases.
Parameters:
query(required): Search querypage(optional): Page number (default: 0)
Example queries:
+leak.severity:critical- Critical severity leaks+leak.dataset.rows:>10000- Leaks with more than 10k rows+plugin:GitConfigHttpPlugin- Exposed Git configurations
Get information about a specific IP address.
Parameters:
ip(required): IPv4 or IPv6 address
Get information about a domain and its subdomains.
Parameters:
domain(required): Domain name (e.g.,example.com)
Enumerate discovered subdomains for a domain.
Parameters:
domain(required): Domain name
Get available LeakIX detection plugins.
LeakIX uses a powerful query syntax:
+field:value- Must match-field:value- Must not matchfield:>100- Range queriesfield:"exact phrase"- Phrase matching
| Field | Description |
|---|---|
ip |
IP address (supports CIDR) |
port |
Service port |
host |
Domain/hostname |
country |
Country name |
plugin |
Detection plugin |
leak.severity |
Leak severity level |
service.software.name |
Software name |
See LeakIX Query Documentation for the full list of available fields.
# Setup development environment
make setup
# Run checks
make check
# Run tests
make test
# Format code
make formatThe LeakIX API is rate-limited to approximately 1 request per second. The client automatically handles rate limiting by waiting when necessary.
MIT