BLOCKSCOUT MCP SERVER TOOLS

18 tools from the Blockscout MCP Server MCP Server, categorised by risk level.

View the Blockscout MCP Server policy →

READ TOOLS

17
direct_api_call Call a raw Blockscout API endpoint for advanced or chain-specific data. Do not include query strings in ``endpoint_path``; pass all query para... get_address_by_ens_name Useful for when you need to convert an ENS domain name (e.g. "blockscout.eth") to its corresponding Ethereum address. get_address_info Get comprehensive information about an address, including: - Address existence check - Native token (ETH) balance (provided as is, wit... get_block_info Get block information like timestamp, gas used, burnt fees, transaction count etc. Can optionally include the list of transaction hashes c... get_chains_list Get the list of known blockchain chains with their IDs. Useful for getting a chain ID when the chain name is known. This information can b... get_contract_abi Get smart contract ABI (Application Binary Interface). An ABI defines all functions, events, their parameters, and return types. The ABI i... get_latest_block Get the latest indexed block number and timestamp, which represents the most recent state of the blockchain. No transactions or token tran... get_token_transfers_by_address Get ERC-20 token transfers for an address within a specific time range. Use cases: - `get_token_transfers_by_address(address, age_fr... get_tokens_by_address Get comprehensive ERC20 token holdings for an address with enriched metadata and market data. Returns detailed token information including... get_transaction_info Get comprehensive transaction information. Unlike standard eth_getTransactionByHash, this tool returns enriched data including decoded inp... get_transaction_logs Get comprehensive transaction logs. Unlike standard eth_getLogs, this tool returns enriched logs, primarily focusing on decoded event para... get_transactions_by_address Retrieves native currency transfers and smart contract interactions (calls, internal txs) for an address. **EXCLUDES TOKEN TRANSFERS**: Fi... inspect_contract_code Inspects a verified contract's source code or metadata. lookup_token_by_symbol Search for token addresses by symbol or name. Returns multiple potential matches based on symbol or token name similarity. Only the first ... nft_tokens_by_address Retrieve NFT tokens (ERC-721, ERC-404, ERC-1155) owned by an address, grouped by collection. Provides collection details (type, address, n... read_contract Calls a smart contract function (view/pure, or non-view/pure simulated via eth_call) and returns the decoded result. This... transaction_summary Get human-readable transaction summaries from Blockscout Transaction Interpreter. Automatically classifies transactions into natural langu...

WRITE TOOLS

1
How many tools does the Blockscout MCP Server MCP server have? +

The Blockscout MCP Server MCP server exposes 18 tools across 2 categories: Read, Write.

How do I enforce policies on Blockscout MCP Server tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Blockscout MCP Server server.

What risk categories do Blockscout MCP Server tools fall into? +

Blockscout MCP Server tools are categorised as Read (17), Write (1). Each category has a recommended default policy.

Enforce policies on Blockscout MCP Server

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.