Substack Newsletter Scraper avatar
Substack Newsletter Scraper

Pricing

$5.00 / 1,000 results

Go to Store
Substack Newsletter Scraper

Substack Newsletter Scraper

Developed by

AutomateLab

AutomateLab

Maintained by Community

Extract newsletter content, subscriber counts, post analytics, and creator intelligence from any Substack publication - completely free, no authentication needed!

0.0 (0)

Pricing

$5.00 / 1,000 results

0

Total users

7

Monthly users

7

Runs succeeded

58%

Last modified

14 hours ago

You can access the Substack Newsletter Scraper programmatically from your own applications by using the Apify API. You can also choose the language preference from below. To use the Apify API, youโ€™ll need an Apify account and your API token, found in Integrations settings in Apify Console.

{
"mcpServers": {
"apify": {
"command": "npx",
"args": [
"mcp-remote",
"https://mcp.apify.com/sse?actors=red.cars/substack-newsletter-scraper",
"--header",
"Authorization: Bearer <YOUR_API_TOKEN>"
]
}
}
}

Configure MCP server with Substack Newsletter Scraper

You have a few options for interacting with the MCP server:

  • Use mcp.apify.com via mcp-remote from your local machine to connect and authenticate using OAuth or an API token (as shown in the JSON configuration above).

  • Set up the connection directly in your MCP client UI by providing the URL https://mcp.apify.com/sse?actors=red.cars/substack-newsletter-scraper along with an API token (or use OAuth).

  • Connect to mcp.apify.com via Server-Sent Events (SSE), as shown below:

{
"mcpServers": {
"apify": {
"type": "sse",
"url": "https://mcp.apify.com/sse?actors=red.cars/substack-newsletter-scraper",
"headers": {
"Authorization": "Bearer <YOUR_API_TOKEN>"
}
}
}
}

You can connect to the Apify MCP Server using clients like Tester MCP Client, or any other MCP client of your choice.

If you want to learn more about our Apify MCP implementation, check out our MCP documentation. To learn more about the Model Context Protocol in general, refer to the official MCP documentation or read our blog post.