IPLocate

IPLocate

Official
iplocate

Looks up detailed information about IP addresses including geolocation, network details, privacy detection, and abuse contacts using the IPLocate.io API.

Integrates with IPLocate.io API to provide IP address geolocation, network information, privacy detection, and abuse contact data for cybersecurity analysis, fraud prevention, and network administration.

16349 views7Local (stdio)

What it does

  • Get IP address geolocation data
  • Identify VPNs, proxies, and Tor exit nodes
  • Retrieve network and ISP information
  • Find abuse contact details for reporting
  • Detect hosting providers and company data

Best for

Cybersecurity analysis and threat huntingFraud prevention and risk assessmentNetwork administration and monitoringCompliance and abuse reporting
Comprehensive IP intelligence dataPrivacy and security detection features

About IPLocate

IPLocate is an official MCP server published by iplocate that provides AI assistants with tools and capabilities via the Model Context Protocol. Use IPLocate for accurate IP lookup, my address by IP, and IP number lookup. Get geolocation, network details, and priva It is categorized under auth security, analytics data.

How to install

You can install IPLocate in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

License

IPLocate is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

MCP Server for IP address geolocation and network data from IPLocate.io

Install MCP Server

An MCP (Model Context Protocol) server for IPLocate.io - providing comprehensive IP address intelligence including geolocation, network information, privacy detection, and abuse contacts.

Features

This MCP server provides tools to look up detailed information about IP addresses:

  • Geolocation: Country, city, coordinates, timezone, postal code and more
  • Network Information: ASN name, number, type, network range, ISP information
  • Privacy & Security: VPN detection, proxy detection, Tor exit nodes, hosting providers
  • Company Data: Organization name, domain, business type
  • Abuse Contacts: Email, phone, and address for reporting malicious activity

Requirements

To follow our quick start setup instructions, you will need:

  • Node.js 18 or higher
  • npm
  • A compatible MCP client. For example, Cursor, Claude Desktop.

Quick Start

The easiest way to use this MCP server is through your MCP client. Simply configure your client with the setup instructions below:

Configure your MCP client

Cursor

One-click setup:

Install MCP Server

Manual configuration:

  1. In your project directory, create the configuration:

    mkdir -p .cursor
    touch .cursor/mcp.json
    
  2. Add the following to .cursor/mcp.json:

    {
      "mcpServers": {
        "iplocate": {
          "command": "npx",
          "args": ["-y", "@iplocate/mcp-server"],
          "env": {
            "IPLOCATE_API_KEY": "your_api_key_here"
          }
        }
      }
    }
    

    Replace your_api_key_here with your actual API key from IPLocate.io.

Claude Desktop
  1. Open Claude Desktop settings

    • On macOS: Cmd + ,
    • On Windows: Ctrl + ,
  2. Go to the "Developer" tab and click "Edit Config"

  3. Add the IPLocate server configuration:

    {
      "mcpServers": {
        "iplocate": {
          "command": "npx",
          "args": ["-y", "@iplocate/mcp-server"],
          "env": {
            "IPLOCATE_API_KEY": "your_api_key_here"
          }
        }
      }
    }
    

    Replace your_api_key_here with your actual API key from IPLocate.io.

VS Code (Preview)
  1. Create the VS Code MCP configuration:

    mkdir -p .vscode
    touch .vscode/mcp.json
    
  2. Add the following to .vscode/mcp.json:

    {
      "servers": {
        "iplocate": {
          "type": "stdio",
          "command": "npx",
          "args": ["-y", "@iplocate/mcp-server"],
          "env": {
            "IPLOCATE_API_KEY": "your_api_key_here"
          }
        }
      }
    }
    

    Replace your_api_key_here with your actual API key from IPLocate.io.

Available tools

The server provides the following tools:

lookup_ip_address_details

Get comprehensive information about an IP address including all available data.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up. If not provided, returns information about the caller's IP address.

Example:

{
  "ip": "8.8.8.8"
}

Returns: All available data about the IP address, including geolocation, network information, privacy, and company data.

lookup_ip_address_location

Get geographic location information for an IP address.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up.

Returns: Country, city, coordinates, timezone, postal code, and more.

lookup_ip_address_privacy

Check whether an IP address is detected as a VPN, proxy, other anonymizing service; is on an abuse blocklist; or is a hosting provider.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up.

Returns: VPN status, proxy detection, Tor exit node status, hosting provider information.

lookup_ip_address_network

Get network and ASN (Autonomous System Number) information for an IP address.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up.

Returns: ASN details, network range, ISP information, regional registry.

lookup_ip_address_company

Get company/organization information for an IP address.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up.

Returns: Company name, domain, country, organization type.

lookup_ip_address_abuse_contacts

Get abuse contact information for an IP address to report malicious activity.

Parameters:

  • ip (optional): IPv4 or IPv6 address to look up.

Returns: Abuse contact email, phone, address, and network range.

Available prompts

The server also provides pre-configured prompts to help with common IP analysis tasks:

check_ip_security

Analyze an IP address for security concerns including VPN, proxy, Tor usage, and abuse history.

Example usage: "Use the check_ip_security prompt to analyze 192.168.1.1"

locate_ip_geographically

Get detailed geographic information about an IP address.

Example usage: "Use the locate_ip_geographically prompt to find where I am"

investigate_ip_ownership

Get detailed information about who owns and operates an IP address.

Example usage: "Use the investigate_ip_ownership prompt to check who owns 8.8.8.8"

ip_comparison

Compare geographic and network information between two IP addresses.

Example usage: "Use the ip_comparison prompt to compare 1.1.1.1 and 8.8.8.8"

Add your API key

You can make up to 50 requests per day without an API key.

Sign up for a free API key at IPLocate.io to increase your free quota to 1,000 requests per day.

Sign up for a free API key

  1. Visit https://iplocate.io/signup
  2. Create a free account
  3. Get your API key from the dashboard

Using an API key with this server

The server automatically reads your API key from the IPLOCATE_API_KEY environment variable. Configure it in your MCP client settings (see the configuration examples above) or set it when running manually.

Running the server manually

If you need to run the server manually (for development or testing), you have several options:

Prerequisites

  • Node.js 18 or higher
  • npm or yarn

Using npx (recommended)

npx -y @iplocate/mcp-server

With API key:

On macOS/Linux:

export IPLOCATE_API_KEY=your_api_key_here
npx -y @iplocate/mcp-server

On Windows:

set IPLOCATE_API_KEY=your_api_key_here
npx -y @iplocate/mcp-server

Install from npm

npm install -g @iplocate/mcp-server
mcp-server-iplocate

Install from source

git clone https://github.com/iplocate/mcp-server-iplocate.git
cd mcp-server-iplocate
yarn install
yarn build
yarn start

For development with auto-reload:

yarn dev

Testing

You can test the server using the MCP Inspector:

npx @modelcontextprotocol/inspector node dist/index.js

API Response Format

The IPLocate API returns comprehensive data about IP addresses. Here's an example response structure:

{
  "ip": "8.8.8.8",
  "country": "United States",
  "country_code": "US",
  "city": "Mountain View",
  "latitude": 37.386,
  "longitude": -122.0838,
  "asn": {
    "asn": "AS15169",
    "name": "Google LLC",
    "domain": "google.com"
  },
  "privacy": {
    "is_vpn": false,
    "is_proxy": false,
    "is_tor": false,
    "is_hosting": true
  }
  // ... and more fields
}

For full details, see the IPLocate API documentation.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Support

Acknowledgments

About IPLocate.io

Since 2017, IPLocate has set out to provide the most reliable and accurate IP address data.

We process 50TB+ of data to produce our comprehensive IP geolocation, IP to company, proxy and VPN detection, hosting detection, ASN, and WHOIS data sets. Our API handles over 15 billion requests a month for thousands of businesses and developers.

Alternatives

Related Skills

Browse all skills
firebase

Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I

3
senior-backend

Comprehensive backend development skill for building scalable backend systems using NodeJS, Express, Go, Python, Postgres, GraphQL, REST APIs. Includes API scaffolding, database optimization, security implementation, and performance tuning. Use when designing APIs, optimizing database queries, implementing business logic, handling authentication/authorization, or reviewing backend code.

3
supabase-rls-policy-generator

This skill should be used when the user requests to generate, create, or add Row-Level Security (RLS) policies for Supabase databases in multi-tenant or role-based applications. It generates comprehensive RLS policies using auth.uid(), auth.jwt() claims, and role-based access patterns. Trigger terms include RLS, row level security, supabase security, generate policies, auth policies, multi-tenant security, role-based access, database security policies, supabase permissions, tenant isolation.

2
hunt-data-source-identification

Identify relevant security data sources that could capture the behavior defined in a structured hunt hypothesis. Use this skill after the hunt focus has been defined to translate investigative intent into candidate telemetry sources using existing platform catalogs. This skill supports hunt planning by reasoning over available schemas and metadata before analytics development or query execution.

0
scanning-api-security

Detect API security vulnerabilities including injection, broken auth, and data exposure. Use when scanning APIs for security vulnerabilities. Trigger with phrases like "scan API security", "check for vulnerabilities", or "audit API security".

0
firebase-apk-scanner

Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only.

0