AlienVault OTX
live SecurityOpen Threat Exchange — community threat-intel pulses + per-indicator context (IPv4 / domain / URL / file hash).
3 tools
0ms auth
free tier 50 calls/day
Tools
search_pulses
required: query Keyword search across community threat-intel pulses.
Parameters
Name Type Description
query req string Search term limit opt number 1-50 (default 20) page opt number 1-based page Try it
Response
get_pulse
required: pulse_id Full pulse with indicators.
Parameters
Name Type Description
pulse_id req string OTX pulse ID Try it
Response
lookup_indicator
required: indicator Pulses referencing an IOC. Type auto-detected when omitted.
Parameters
Name Type Description
indicator req string IPv4 / domain / URL / hash type opt string Force type Try it
Response
Test with curl
The gateway speaks JSON-RPC 2.0 over HTTP POST. You can test any pack directly from the terminal.
List available tools
bash
curl -X POST https://gateway.pipeworx.io/alienvault-otx/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}' Call a tool
bash
curl -X POST https://gateway.pipeworx.io/alienvault-otx/mcp \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","id":2,"method":"tools/call","params":{"name":"search_pulses","arguments":{"query": "hello"}}}' Use with the SDK
Install @pipeworx/sdk to call tools from any TypeScript/Node project.
TypeScript
import { Pipeworx } from '@pipeworx/sdk';
const px = new Pipeworx();
const result = await px.call("search_pulses", {"query":"example"}); ask_pipeworx
// Or ask in plain English:
const answer = await px.ask("open threat exchange — community threat-intel pulses + per-indicator context (ipv4 / domain / url / file hash)");