Open Source MCP Server

DNS management
for AI assistants

An MCP server that gives Claude and other AI assistants full control over your Namecheap domains and DNS records. OAuth login, encrypted tokens, nothing stored.

claude.ai
you add a CNAME record pointing api.mmp.chat to my Railway deployment

claude I'll add that DNS record for you.

tool: add_dns_record
domain: mmp.chat
host: api | type: CNAME | value: api-production.up.railway.app

Added CNAME: api.mmp.chat -> api-production.up.railway.app
All records (5): ...

8 tools, one conversation

setup
Detects the server IP and walks you through enabling the Namecheap API
list_domains
All domains with status, expiry, auto-renew, and whois guard
get_domain_info
Nameservers, whois privacy, registration dates, lock status
list_dns_records
View all A, AAAA, CNAME, MX, TXT, and NS records
add_dns_record
Safely add records without overwriting existing ones
update_dns_record
Update a specific record by hostname and type
delete_dns_record
Remove a record while preserving everything else
set_nameservers
Switch to custom nameservers or reset to Namecheap defaults

Three steps, then forget about it

1

Add the MCP server

Paste the server URL into claude.ai as a remote MCP integration. You'll be redirected to a login page.

2

Enter your Namecheap credentials

Your username and API key. They're AES-256-GCM encrypted into your OAuth token. The server stores nothing.

3

Whitelist the server IP

Your first tool call tells you exactly which IP to whitelist, with a direct link. One click, done forever.

Your credentials, your control

Stateless tokens

Credentials are encrypted into the OAuth token itself. The server has no database, no storage, no state.

AES-256-GCM

Industry-standard authenticated encryption. Tokens can't be tampered with or forged.

PKCE verification

Authorization codes use S256 code challenge to prevent interception attacks.

Safe DNS writes

Every write fetches all records first, modifies, then writes back. No accidental deletions.