Generate and analyze domain permutations to detect potential typosquatting, phishing, and brand impersonation
DNStwist is a powerful DNS fuzzing tool that helps security professionals detect typosquatting, phishing attempts, and corporate espionage. This MCP server provides an interface to generate and analyze domain permutations, identifying potentially malicious domains that could be used to impersonate legitimate websites. With DNStwist, you can check if permutated domains are registered, analyze DNS records, capture HTTP banner information, retrieve WHOIS data, and even detect phishing attempts through fuzzy hashing of web pages. The tool is highly configurable, allowing you to use custom DNS servers, adjust parallel processing, and output results in various formats.
DNStwist is a security tool that helps identify potential domain name impersonations by generating and analyzing domain permutations. This MCP server wraps the DNStwist functionality, making it accessible through Claude Desktop and other MCP-compatible applications.
Before installing DNStwist MCP, ensure you have:
The easiest way to install DNStwist MCP is through Smithery:
npx -y @smithery/cli install @burtthecoder/mcp-dnstwist --client claude
This command automatically configures DNStwist for Claude Desktop.
Install Docker:
Install the server globally via npm:
npm install -g mcp-dnstwist
Add the configuration to your Claude Desktop configuration file:
~/Library/Application Support/Claude/claude_desktop_config.json
%APPDATA%\Claude\claude_desktop_config.json
Add the following to your configuration:
{
"mcpServers": {
"dnstwist": {
"command": "mcp-dnstwist"
}
}
}
Restart Claude Desktop to apply the changes.
If you prefer to run from source or need to modify the code:
Clone and build the repository:
git clone https://github.com/BurtTheCoder/mcp-dnstwist.git
cd mcp-dnstwist
npm install
npm run build
Add to your Claude Desktop configuration:
{
"mcpServers": {
"dnstwist": {
"command": "node",
"args": ["/absolute/path/to/mcp-dnstwist/build/index.js"]
}
}
}
Once installed, you can use DNStwist through Claude Desktop by asking Claude to analyze domains for potential security issues. For example:
Verify Docker is installed and running:
docker --version
docker ps
Check Docker permissions:
sudo usermod -aG docker $USER
DNS resolution problems:
Performance issues:
After fixing any issues:
This tool is designed for legitimate security research purposes. Please: