Digital Infrastructure Exposure MCP Server avatar

Digital Infrastructure Exposure MCP Server

Pricing

from $300.00 / 1,000 full exposure audits

Go to Apify Store
Digital Infrastructure Exposure MCP Server

Digital Infrastructure Exposure MCP Server

Passive recon MCP wrapping 8 actors. DNS security audit (SPF/DKIM/DMARC), subdomain discovery, SSL health, tech-to-CVE-to-KEV mapping, infrastructure sprawl. Exposure Score 0-100. Pay-per-event.

Pricing

from $300.00 / 1,000 full exposure audits

Rating

0.0

(0)

Developer

ryan clinton

ryan clinton

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

a day ago

Last modified

Share

Passive infrastructure reconnaissance and misconfiguration detection intelligence for AI agents via the Model Context Protocol. This MCP server orchestrates 8 data sources covering domain WHOIS, DNS records, certificate transparency, IP geolocation, technology stacks, internet-wide service enumeration, and vulnerability databases to deliver subdomain discovery, DNS security auditing, SSL health checking, technology-to-CVE matching, hosting geography mapping, and a composite Digital Exposure Score (0-100).

What data can you access?

Data PointSourceCoverage
Domain registration and ownershipWHOIS LookupAll TLDs
DNS records including securityDNS LookupAny domain
Certificate transparency logsSSL/crt.sh CertificateAll issued certificates
IP location and ASN mappingIP GeolocationGlobal coverage
Website technology identificationTech Stack DetectorAny website
Internet-wide service enumerationCensys Host SearchIPv4 scan data
National Vulnerability DatabaseNVD CVE SearchAll published CVEs
Known Exploited VulnerabilitiesCISA KEV CatalogActively exploited CVEs

MCP Tools

ToolPriceDescription
full_exposure_audit$2.00Complete digital exposure audit across all 8 sources: subdomains, DNS, SSL, tech stack CVE mapping, hosting geography, Censys enumeration. Returns Digital Exposure Score (0-100).
subdomain_discovery$2.00Discover subdomains via certificate transparency logs (crt.sh), DNS records, and Censys index. Returns subdomain inventory with IP mapping.
dns_security_audit$2.00DNS security audit: SPF, DKIM, DMARC compliance, dangling CNAMEs, zone transfer exposure, and email security posture.
ssl_certificate_health$2.00SSL certificate health and chain validation: expiry, issuer, key strength, and certificate transparency compliance.
tech_stack_vulnerability_match$2.00Match detected technology stack to known CVEs (NVD) and CISA Known Exploited Vulnerabilities for exploit prioritization.
hosting_geography_map$2.00Map hosting geography and infrastructure concentration: IP geolocation, ASN distribution, and provider dependency analysis.
internet_service_enumeration$2.00Enumerate exposed internet services via Censys: open ports, service banners, and protocol versions.
compare_org_exposure$4.00Compare digital exposure profiles across organizations with side-by-side scoring and dimensional breakdown.

Data Sources

  • WHOIS Lookup -- Domain registration details including registrar, creation/expiry dates, and privacy protection status
  • DNS Lookup -- DNS record enumeration including A, AAAA, MX, TXT (SPF/DKIM/DMARC), CNAME, and NS records
  • SSL/crt.sh Certificate -- Certificate transparency logs for subdomain discovery and certificate chain analysis
  • IP Geolocation -- IP address to geographic location mapping with ASN, ISP, and organization identification
  • Tech Stack Detector -- Website technology identification including frameworks, CDNs, analytics, CMS, and hosting
  • Censys Host Search -- Internet-wide scan data revealing exposed services, open ports, and protocol versions
  • NVD CVE Search -- National Vulnerability Database with CVSS severity scores and affected product matching
  • CISA KEV Catalog -- Known Exploited Vulnerabilities with remediation deadlines and active exploitation indicators

How the scoring works

Five scoring dimensions quantify different aspects of digital infrastructure exposure.

Infrastructure Sprawl Index measures the number and geographic distribution of internet-facing assets discovered via certificate transparency, DNS, and Censys. More exposed assets across more providers indicates higher sprawl.

Misconfiguration Detection checks SPF, DKIM, and DMARC email security compliance; identifies dangling CNAME records vulnerable to subdomain takeover; and flags certificate issues (expired, weak keys, incomplete chains).

Technology Vulnerability Mapping builds a pipeline from detected tech stack to CVE matching to CISA KEV prioritization. Technologies with known exploited vulnerabilities are flagged for immediate remediation.

Geographic Concentration Risk analyzes hosting distribution across providers, ASNs, and geographic regions. High concentration in a single provider or region creates availability risk.

Digital Exposure Score (0-100):

Score RangeLevelInterpretation
0-20LOWWell-managed infrastructure with minimal exposure
21-40MODERATESome exposure vectors, standard hardening recommended
41-60ELEVATEDMultiple exposure vectors requiring attention
61-80HIGHSignificant exposure with exploitable vulnerabilities
81-100CRITICALCritical exposure, immediate remediation required

How to connect this MCP server

Claude Desktop

{
"mcpServers": {
"digital-infrastructure-exposure": {
"url": "https://digital-infrastructure-exposure-mcp.apify.actor/mcp"
}
}
}

Programmatic (HTTP)

curl -X POST https://digital-infrastructure-exposure-mcp.apify.actor/mcp \
-H "Content-Type: application/json" \
-H "Authorization: Bearer YOUR_APIFY_TOKEN" \
-d '{"jsonrpc":"2.0","method":"tools/call","params":{"name":"full_exposure_audit","arguments":{"domain":"example.com"}},"id":1}'

This MCP server also works with Cursor, Windsurf, Cline, and any other MCP-compatible client.

Use cases for digital infrastructure intelligence

Security Ratings and Third-Party Risk

Score third-party digital exposure with full_exposure_audit for vendor risk management. The Digital Exposure Score provides a quantified metric for procurement and ongoing monitoring.

Cyber Insurance Pre-Binding Assessment

Assess digital exposure before binding cyber insurance policies with full_exposure_audit and tech_stack_vulnerability_match. Exploitable vulnerabilities and infrastructure sprawl inform underwriting.

Penetration Testing OSINT Phase

Automate the OSINT reconnaissance phase with subdomain_discovery, internet_service_enumeration, and tech_stack_vulnerability_match. Passive data collection before active testing.

IT Asset Management and Shadow IT

Discover unknown subdomains and services with subdomain_discovery and internet_service_enumeration. Certificate transparency reveals assets that may not be in your CMDB.

DNS and Email Security Posture

Audit email security configuration with dns_security_audit. Check SPF, DKIM, and DMARC compliance and identify dangling CNAMEs vulnerable to subdomain takeover.

Hosting Concentration Risk Assessment

Map hosting infrastructure with hosting_geography_map to identify provider concentration, geographic risk, and single points of failure.

How much does it cost?

Individual tools cost $2.00 per call. The comparison tool costs $4.00. The Apify Free plan includes $5 of monthly credits. Pay-per-event with no subscription.

FAQ

Q: Is this active or passive scanning? A: Entirely passive. Uses WHOIS records, DNS lookups, certificate transparency logs, and Censys pre-scanned index data. No packets are sent to target infrastructure.

Q: Does this find all subdomains? A: Certificate transparency covers all SSL/TLS certificates issued for domain variations. Combined with DNS and Censys, coverage is comprehensive but may miss internal-only or non-SSL subdomains.

Q: How does tech-to-CVE matching work? A: Detected technologies (e.g., "Apache 2.4.49") are matched against NVD CVE records for known vulnerabilities. CISA KEV cross-reference identifies which vulnerabilities are being actively exploited.

Q: Is it legal to use this? A: All data sources are publicly available passive data. No active scanning is performed. See Apify's guide on web scraping legality.

Q: Can I scan internal domains? A: Only internet-facing assets are visible through passive reconnaissance. Internal domains, private IP ranges, and intranet services are not accessible.

Q: How often should I run exposure audits? A: Monthly audits are recommended for standard monitoring. Weekly or daily for high-risk environments. Use Apify Schedules for automation.

MCP ServerFocus
autonomous-cyber-red-team-mcpAttack graph simulation and exploit chain analysis
counterparty-due-diligence-mcpDigital presence verification for entity screening
adversarial-corporate-opacity-mcpInfrastructure correlation for hidden entity relationships

Integrations

This MCP server runs on the Apify platform and supports scheduling, webhooks, API access, and dataset export for security platform integration.