npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

ctscout-mcp-server

v0.2.1

Published

MCP server for ctscout.dev — domain attribution via Certificate Transparency + multi-signal Pro enrichment

Readme

ctscout-mcp-server

MCP server for ctscout.dev — domain attribution via Certificate Transparency plus (on Pro) multi-signal enrichment, exposed as tools your LLM can call.

Two tools:

  • ctscout_search_company — find apex domains attributed to an organization by name
  • ctscout_lookup_domain — reverse-lookup the organization attributed to one or more domains

Both work over the public ctscout.dev /scan API. Free tier requires an API key (no email, no signup). Pro tier returns a confidence_band per attribution plus the underlying signal evidence (DNS brand tokens, og:site_name match, RDAP, IP/ASN, VLM verdict).

What's new in 0.2.0

  • Pro-tier response surfacing: confidence_band, evidence, matched_via, signal_health, vlm_status, vlm_override rendered in the markdown table when present.
  • VLM-veto indicator (🚫VLM-veto) when a visual verdict overrode positive-signal accumulation.
  • Backward-compatible: Free-tier responses render exactly as in v0.1.0; the new fields are additive.
  • Tool descriptions updated: "attributed to" rather than "owns" (lawful, defensible language for attribution claims).
  • Test suite added (Vitest). 20 tests covering both response shapes, truncation, error paths.

Install

For Claude Code, Claude Desktop, Cursor, or any other MCP client.

1. Get a free API key

Visit ctscout.dev and click "Get a free API key". Solve the Turnstile captcha. Copy the key (you can't recover it later — save it now).

2. Configure your MCP client

Important — Claude Code CLI vs Claude Desktop have separate config files. Adding via claude mcp add registers for the CLI only. If you use Claude Desktop, you must edit Desktop's config file directly.

Claude Code (CLI) — use the CLI:

claude mcp add ctscout \
  -s user \
  -e CTSCOUT_API_KEY=YOUR_KEY_HERE \
  -- npx -y ctscout-mcp-server

This writes to ~/.claude.json.

Claude Desktop — edit ~/Library/Application Support/Claude/claude_desktop_config.json (Mac) or the equivalent on Windows/Linux, and add:

{
  "mcpServers": {
    "ctscout": {
      "command": "npx",
      "args": ["-y", "ctscout-mcp-server"],
      "env": {
        "CTSCOUT_API_KEY": "YOUR_KEY_HERE"
      }
    }
  }
}

If the file already has other MCP servers, just add the ctscout key under the existing mcpServers object.

Cursor (~/.cursor/mcp.json):

Same JSON shape as the Desktop example.

After adding the config, fully quit and restart your MCP client (not just close the window). The tools will appear under "ctscout" in your available tools.

3. Use it

In Claude Code or Claude Desktop, just ask the model:

"Find all domains owned by Cloudflare"

"Who owns gs.com and goldmansachs.com? Are they the same parent?"

"List the domains attributed to The Hartford."

The model will pick the right ctscout tool, call it, and summarize.


Free tier vs Pro tier

| | Free | Pro | |---|---|---| | Queries per day | 10 | unlimited | | Results per query | top 5 | full set | | Data freshness | weekly snapshot | live (DNS, RDAP, homepage, IP/ASN, VLM) | | Per-attribution evidence | — | confidence_band + named signals | | Price | $0 | (coming soon) |

The MCP server uses the same API key for both — your tier is determined by the key. If you hit the daily quota, the tool returns a 429 error with an upgrade hint.

What the Pro response looks like

Free tier returns the legacy (domain, organization, certs, subdomains) table. Pro tier replaces it with a richer attribution table you can defend in a meeting:

| Domain          | Attributed to  | Band         | Signals                                         | Evidence                                                  |
|---|---|---|---|---|
| coalition.com   | Coalition Inc  | ✅ verified  | dns_txt_brand_token, og_site_name_match, +1     | verified via google-site-verification, atlassian-domain... |
| imposter.com    | Coalition Inc  | ⚪ insufficient 🚫VLM-veto | dns_txt_brand_token, vlm_verdict_no | Logo on screenshot is a different brand                   |

Bands map to confidence intervals (verified ≥ multiple strong independent signals, down to insufficient = no signals or signals disagree). The 🚫VLM-veto tag appears when visual brand verification overrode the positive-signal accumulation. Full structured payload is available via response_format: "json".


Coverage caveat (read this)

ctscout's index is built from Certificate Transparency logs (OV/EV certs that include the legal entity name in the cert subject). Best for established US/EU tech companies. Limited coverage on:

  • Small private companies that only use DV certs (Let's Encrypt, ZeroSSL)
  • Cyber insurance MGAs (Coalition, At-Bay, Resilience, etc.) — 0% coverage as of 2026-05
  • Small US mutual carriers (regional NAIC mutuals)

Approximately 5,976 organizations indexed as of 2026-05. See ctscout.dev for current coverage stats.

When ctscout_lookup_domain returns 0 results for a domain, that means the apex isn't in the warehouse — not necessarily that nobody owns it.


Local development

git clone https://github.com/minghsuy/ctscout-mcp.git
cd ctscout-mcp
npm install
npm run build

# Run the test suite (Vitest, no network)
npm test

# Run the server (will fail without CTSCOUT_API_KEY)
node dist/index.js

# With a real key
CTSCOUT_API_KEY=your_key node dist/index.js

# Inspect with the official MCP inspector (browser UI)
npm run inspect

Test the protocol handshake without a real key

echo '{"jsonrpc":"2.0","method":"initialize","params":{"protocolVersion":"2024-11-05","capabilities":{},"clientInfo":{"name":"test","version":"0.1"}},"id":1}' | \
  CTSCOUT_API_KEY=fake node dist/index.js

Should respond with the server's capabilities + tool registration. (Tool calls themselves require a real key.)


How it relates to ctscout.dev

This MCP server is a thin client over the public ctscout.dev /scan API. It does no auth-handling magic, no caching, no extra logic — just translates MCP tool calls into HTTP requests and formats the response for an LLM consumer.

If you're building your own integration in Python or another language, you can hit the same /scan endpoint directly. See ctscout.dev for curl examples.


License

MIT. See LICENSE.

The underlying ctscout service uses domain-scout (also MIT) for cert log analysis.