
IPLocate
OfficialLooks up detailed information about IP addresses including geolocation, network details, privacy detection, and abuse contacts using the IPLocate.io API.
Integrates with IPLocate.io API to provide IP address geolocation, network information, privacy detection, and abuse contact data for cybersecurity analysis, fraud prevention, and network administration.
What it does
- Get IP address geolocation data
- Identify VPNs, proxies, and Tor exit nodes
- Retrieve network and ISP information
- Find abuse contact details for reporting
- Detect hosting providers and company data
Best for
About IPLocate
IPLocate is an official MCP server published by iplocate that provides AI assistants with tools and capabilities via the Model Context Protocol. Use IPLocate for accurate IP lookup, my address by IP, and IP number lookup. Get geolocation, network details, and priva It is categorized under auth security, analytics data.
How to install
You can install IPLocate in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
License
IPLocate is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.
MCP Server for IP address geolocation and network data from IPLocate.io
An MCP (Model Context Protocol) server for IPLocate.io - providing comprehensive IP address intelligence including geolocation, network information, privacy detection, and abuse contacts.
Features
This MCP server provides tools to look up detailed information about IP addresses:
- Geolocation: Country, city, coordinates, timezone, postal code and more
- Network Information: ASN name, number, type, network range, ISP information
- Privacy & Security: VPN detection, proxy detection, Tor exit nodes, hosting providers
- Company Data: Organization name, domain, business type
- Abuse Contacts: Email, phone, and address for reporting malicious activity
Requirements
To follow our quick start setup instructions, you will need:
- Node.js 18 or higher
- npm
- A compatible MCP client. For example, Cursor, Claude Desktop.
Quick Start
The easiest way to use this MCP server is through your MCP client. Simply configure your client with the setup instructions below:
Configure your MCP client
Cursor
One-click setup:
Manual configuration:
-
In your project directory, create the configuration:
mkdir -p .cursor touch .cursor/mcp.json -
Add the following to
.cursor/mcp.json:{ "mcpServers": { "iplocate": { "command": "npx", "args": ["-y", "@iplocate/mcp-server"], "env": { "IPLOCATE_API_KEY": "your_api_key_here" } } } }Replace
your_api_key_herewith your actual API key from IPLocate.io.
Claude Desktop
-
Open Claude Desktop settings
- On macOS:
Cmd + , - On Windows:
Ctrl + ,
- On macOS:
-
Go to the "Developer" tab and click "Edit Config"
-
Add the IPLocate server configuration:
{ "mcpServers": { "iplocate": { "command": "npx", "args": ["-y", "@iplocate/mcp-server"], "env": { "IPLOCATE_API_KEY": "your_api_key_here" } } } }Replace
your_api_key_herewith your actual API key from IPLocate.io.
VS Code (Preview)
-
Create the VS Code MCP configuration:
mkdir -p .vscode touch .vscode/mcp.json -
Add the following to
.vscode/mcp.json:{ "servers": { "iplocate": { "type": "stdio", "command": "npx", "args": ["-y", "@iplocate/mcp-server"], "env": { "IPLOCATE_API_KEY": "your_api_key_here" } } } }Replace
your_api_key_herewith your actual API key from IPLocate.io.
Available tools
The server provides the following tools:
lookup_ip_address_details
Get comprehensive information about an IP address including all available data.
Parameters:
ip(optional): IPv4 or IPv6 address to look up. If not provided, returns information about the caller's IP address.
Example:
{
"ip": "8.8.8.8"
}
Returns: All available data about the IP address, including geolocation, network information, privacy, and company data.
lookup_ip_address_location
Get geographic location information for an IP address.
Parameters:
ip(optional): IPv4 or IPv6 address to look up.
Returns: Country, city, coordinates, timezone, postal code, and more.
lookup_ip_address_privacy
Check whether an IP address is detected as a VPN, proxy, other anonymizing service; is on an abuse blocklist; or is a hosting provider.
Parameters:
ip(optional): IPv4 or IPv6 address to look up.
Returns: VPN status, proxy detection, Tor exit node status, hosting provider information.
lookup_ip_address_network
Get network and ASN (Autonomous System Number) information for an IP address.
Parameters:
ip(optional): IPv4 or IPv6 address to look up.
Returns: ASN details, network range, ISP information, regional registry.
lookup_ip_address_company
Get company/organization information for an IP address.
Parameters:
ip(optional): IPv4 or IPv6 address to look up.
Returns: Company name, domain, country, organization type.
lookup_ip_address_abuse_contacts
Get abuse contact information for an IP address to report malicious activity.
Parameters:
ip(optional): IPv4 or IPv6 address to look up.
Returns: Abuse contact email, phone, address, and network range.
Available prompts
The server also provides pre-configured prompts to help with common IP analysis tasks:
check_ip_security
Analyze an IP address for security concerns including VPN, proxy, Tor usage, and abuse history.
Example usage: "Use the check_ip_security prompt to analyze 192.168.1.1"
locate_ip_geographically
Get detailed geographic information about an IP address.
Example usage: "Use the locate_ip_geographically prompt to find where I am"
investigate_ip_ownership
Get detailed information about who owns and operates an IP address.
Example usage: "Use the investigate_ip_ownership prompt to check who owns 8.8.8.8"
ip_comparison
Compare geographic and network information between two IP addresses.
Example usage: "Use the ip_comparison prompt to compare 1.1.1.1 and 8.8.8.8"
Add your API key
You can make up to 50 requests per day without an API key.
Sign up for a free API key at IPLocate.io to increase your free quota to 1,000 requests per day.
Sign up for a free API key
- Visit https://iplocate.io/signup
- Create a free account
- Get your API key from the dashboard
Using an API key with this server
The server automatically reads your API key from the IPLOCATE_API_KEY environment variable. Configure it in your MCP client settings (see the configuration examples above) or set it when running manually.
Running the server manually
If you need to run the server manually (for development or testing), you have several options:
Prerequisites
- Node.js 18 or higher
- npm or yarn
Using npx (recommended)
npx -y @iplocate/mcp-server
With API key:
On macOS/Linux:
export IPLOCATE_API_KEY=your_api_key_here
npx -y @iplocate/mcp-server
On Windows:
set IPLOCATE_API_KEY=your_api_key_here
npx -y @iplocate/mcp-server
Install from npm
npm install -g @iplocate/mcp-server
mcp-server-iplocate
Install from source
git clone https://github.com/iplocate/mcp-server-iplocate.git
cd mcp-server-iplocate
yarn install
yarn build
yarn start
For development with auto-reload:
yarn dev
Testing
You can test the server using the MCP Inspector:
npx @modelcontextprotocol/inspector node dist/index.js
API Response Format
The IPLocate API returns comprehensive data about IP addresses. Here's an example response structure:
{
"ip": "8.8.8.8",
"country": "United States",
"country_code": "US",
"city": "Mountain View",
"latitude": 37.386,
"longitude": -122.0838,
"asn": {
"asn": "AS15169",
"name": "Google LLC",
"domain": "google.com"
},
"privacy": {
"is_vpn": false,
"is_proxy": false,
"is_tor": false,
"is_hosting": true
}
// ... and more fields
}
For full details, see the IPLocate API documentation.
Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
License
This project is licensed under the MIT License - see the LICENSE file for details.
Support
- For issues with this MCP server, please open an issue on GitHub
- For IPLocate API support, contact support@iplocate.io
- For IPLocate API documentation, visit https://iplocate.io/docs
Acknowledgments
- Model Context Protocol for the MCP specification
- Anthropic for the MCP TypeScript SDK
About IPLocate.io
Since 2017, IPLocate has set out to provide the most reliable and accurate IP address data.
We process 50TB+ of data to produce our comprehensive IP geolocation, IP to company, proxy and VPN detection, hosting detection, ASN, and WHOIS data sets. Our API handles over 15 billion requests a month for thousands of businesses and developers.
- Email: support@iplocate.io
- Website: iplocate.io
- Documentation: iplocate.io/docs
- Sign up for a free API Key: iplocate.io/signup
Alternatives
Related Skills
Browse all skillsFirebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I
Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.
This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.
Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution.
Detect API security vulnerabilities including injection, broken auth, and data exposure. Use when scanning APIs for security vulnerabilities. Trigger with phrases like "scan API security", "check for vulnerabilities", or "audit API security".
Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only.