Cloudflare Radar
HTTP-SSEMCP server supporting remote connections with Cloudflare OAuth for Internet traffic insights.
MCP server supporting remote connections with Cloudflare OAuth for Internet traffic insights.
This is a Model Context Protocol (MCP) server that supports remote MCP connections, with Cloudflare OAuth built-in.
It integrates tools powered by the Cloudflare Radar API to provide global Internet traffic insights, trends and other utilities.
Currently available tools:
Category | Tool | Description |
---|---|---|
AI | get_ai_data | Retrieves AI-related data, including traffic from AI user agents, as well as popular models and model tasks |
Autonomous Systems | list_autonomous_systems | Lists ASes; filter by location and sort by population size |
get_as_details | Retrieves detailed info for a specific ASN | |
Domains | get_domains_ranking | Gets top or trending domains |
get_domain_rank_details | Gets domain rank details | |
DNS | get_dns_data | Retrieves DNS query data to 1.1.1.1, including timeseries, summaries, and breakdowns by dimensions like queryType |
Email Routing | get_email_routing_data | Retrieves Email Routing data, including timeseries, and breakdowns by dimensions like encrypted |
Email Security | get_email_security_data | Retrieves Email Security data, including timeseries, and breakdowns by dimensions like threatCategory |
HTTP | get_http_data | Retrieves HTTP request data, including timeseries, and breakdowns by dimensions like deviceType |
IP Addresses | get_ip_details | Provides details about a specific IP address |
Internet Services | get_internet_services_ranking | Gets top Internet services |
Internet Quality | get_internet_quality_data | Retrieves a summary or time series of bandwidth, latency, or DNS response time from the Radar Internet Quality Index |
Internet Speed | get_internet_speed_data | Retrieves summary of bandwidth, latency, jitter, and packet loss, from the previous 90 days of Cloudflare Speed Test |
Layer 3 Attacks | get_l3_attack_data | Retrieves L3 attack data, including timeseries, top attacks, and breakdowns by dimensions like protocol |
Layer 7 Attacks | get_l7_attack_data | Retrieves L7 attack data, including timeseries, top attacks, and breakdowns by dimensions like mitigationProduct |
Traffic Anomalies | get_traffic_anomalies | Lists traffic anomalies and outages; filter by AS, location, start date, and end date |
URL Scanner | scan_url | Scans a URL via Cloudflare’s URL Scanner |
This MCP server is still a work in progress, and we plan to add more tools in the future.
What are the most used operating systems?
What are the top 5 ASes in Portugal?
Get information about ASN 13335.
What are the details of IP address 1.1.1.1?
List me traffic anomalies in Syria over the last year.
Compare domain rankings in the US and UK.
Give me rank details for google.com in March 2025.
Scan https://example.com.
Show me HTTP traffic trends from Portugal.
Show me application layer attack trends from the last 7 days.
If your MCP client has first class support for remote MCP servers, the client will provide a way to accept the server URL (https://radar.mcp.cloudflare.com
) directly within its interface (for example in Cloudflare AI Playground).
If your client does not yet support remote MCP servers, you will need to set up its respective configuration file using mcp-remote to specify which servers your client can access.
Replace the content with the following configuration:
{ "mcpServers": { "cloudflare": { "command": "npx", "args": ["mcp-remote", "https://radar.mcp.cloudflare.com/sse"] } } }
Once you've set up your configuration file, restart MCP client and a browser window will open showing your OAuth login page. Proceed through the authentication flow to grant the client access to your MCP server. After you grant access, the tools will become available for you to use.
Interested in contributing, and running this server locally? See CONTRIBUTING.md to get started.