Skip to main content

Quicknode MCP

Updated on
Apr 02, 2026

Overview

The Quicknode MCP server connects your Quicknode account to MCP-compatible AI assistants like Claude Code, Claude Desktop, Cursor, VS Code, and more. Once connected, you can create and manage endpoints, monitor usage, configure security settings, and review billing data through natural language instead of navigating the dashboard or writing API scripts.

The server is hosted remotely at https://mcp.quicknode.com/mcp and authenticates via OAuth. It operates on top of Quicknode's Admin API, translating natural language instructions into API operations. The assistant interprets your request, selects the appropriate tool, and executes it after confirmation.

Requirements


  • A Quicknode account
  • An MCP-compatible AI assistant (Claude Code, Claude Desktop, Cursor, VS Code, Windsurf, Zed, or similar)

Configuration

Add the Quicknode MCP server to your assistant using the instructions for your client below.

TIP: If you want to authenticate using an API key instead of OAuth (e.g., for non-interactive environments), see the Using an API Key section below for instructions on how to pass your API key as a bearer token.

To add the Quicknode MCP server to Claude Code, run the following command in your terminal:


  1. Add the server:
claude mcp add quicknode --transport http https://mcp.quicknode.com/mcp

  1. Start Claude Code and type /mcp to authorize the server in the browser window that opens
Installation Scopes

By default, the command above installs the server in local scope (current project only). Claude Code supports three scopes:

  • Local (default) — Available only to you in the current project
  • Project (--scope project) — Shared with your team via a .mcp.json file in the project root
  • User (--scope user) — Available to you across all projects

To install globally for your user, add the --scope user flag:

claude mcp add --transport http --scope user quicknode https://mcp.quicknode.com/mcp

Authentication and Roles

When you connect for the first time, a browser window opens where you log in with your Quicknode account. If you belong to multiple Quicknode accounts, you'll choose which one to connect. You will then select an API key role that determines what the MCP server can do on your behalf:


  • Admin — Full read and write access. This allows your AI assistant to create and delete endpoints, modify security rules, update rate limits, and manage all account resources.
  • Viewer — Read-only access. Your assistant can list endpoints, view metrics, logs, usage, and billing data, but cannot create, modify, or delete any resources.

This process creates an API key under the hood, scoped to the role you selected. You do not need to create or manage the key yourself.


Choosing the Right Role

Choose the Viewer role if you only need to inspect your infrastructure. Use Admin only when you need the assistant to make changes. If you need to switch roles later, remove the server from your client, re-add it, and go through the authorization flow again to re-authenticate with a different role.

Using an API Key

If you're running in a non-interactive environment where a browser-based login isn't possible (e.g., CI/CD pipelines, remote VMs, or automation agents), you can skip the OAuth flow by passing your API key as a bearer token. The MCP server recognizes the Authorization header and treats the request as already authenticated.

Generate an API key from the Quicknode Dashboard under Account (avatar icon) > API Keys. The role you assign to the key (Admin or Viewer) determines the MCP server's permissions — the same as choosing a role during the OAuth flow.

claude mcp add quicknode --transport http https://mcp.quicknode.com/mcp --header "Authorization: Bearer YOUR_API_KEY"

Available Tools

The MCP server exposes the following tools through the Admin API. Tools marked as read-only are available to both Admin and Viewer roles. All other tools require the Admin role.

Endpoint Management

Create, read, update, and delete Quicknode endpoints across any supported chain and network.

ToolDescriptionAccess
list-endpointsList all endpoints on your accountread-only
get-endpointGet details for a specific endpointread-only
create-endpointCreate a new endpoint on a specified chain and networkadmin
delete-endpointDelete an endpointadmin
get-endpoint-metricsRetrieve performance metrics for an endpointread-only
list-endpoint-logsFetch recent logs for an endpointread-only
get-endpoint-log-detailsGet detailed information for a specific log entryread-only

Rate Limits

Configure method-level and endpoint-level rate limits.

ToolDescriptionAccess
update-endpoint-rate-limitsSet overall rate limits (RPS, RPM, RPD) for an endpointadmin
list-endpoint-method-rate-limitsList method-specific rate limitsread-only
create-endpoint-method-rate-limitAdd a rate limit for a specific RPC methodadmin
update-endpoint-method-rate-limitUpdate an existing method rate limitadmin
delete-endpoint-method-rate-limitRemove a method rate limitadmin

Security

Manage authentication and access control settings for endpoints. The create-security-rule and delete-security-rule tools support multiple rule types: IP allowlists, JWT validation, referrer restrictions, domain masks, and authentication tokens.

ToolDescriptionAccess
list-endpoint-securityView current security settings and rulesread-only
update-endpoint-security-optionsEnable or disable security features (CORS, HSTS, IP filtering, etc.)admin
create-security-ruleAdd a security rule (IP, JWT, referrer, domain mask, or token)admin
delete-security-ruleRemove a security ruleadmin

Usage and Billing

Monitor RPC usage and review billing information.

ToolDescriptionAccess
get-rpc-usageGet RPC usage with optional breakdown by endpoint, method, or chainread-only
get-billingView billing invoices or payment historyread-only

Chains

Query available chains and networks.

ToolDescriptionAccess
list-chainsList all supported chains and their available networksread-only

MCP Resources

In addition to tools, the Quicknode MCP server exposes your endpoints as MCP resources. Resources let your AI assistant reference endpoint details directly in context without needing to call a tool first. In clients that support MCP resources, you can type @quicknode to browse and attach your endpoints to the conversation (e.g., quicknode://endpoints/<endpoint-id>).

This is useful when you want the assistant to have your endpoint configuration readily available while working on a task, such as writing code that targets a specific chain or debugging a request.

Example Prompts

You do not need to reference tool names directly. The AI assistant maps natural language to the appropriate tool. Some examples:

Endpoint management:

  • "Create a new Base mainnet endpoint"
  • "Show me all my endpoints and their current status"

Monitoring and debugging:

  • "Check the logs for my Arbitrum endpoint from the last hour"
  • "Show me the performance metrics for my Ethereum endpoint over the past week"

Security:

  • "Add JWT authentication to my Ethereum mainnet endpoint"
  • "Review security settings across all endpoints"

Usage and billing:

  • "Show me my RPC usage broken down by chain for this month"
  • "Which endpoint is using the most credits this month?"

Rate limiting:

  • "Set a rate limit of 100 requests per second on my Polygon endpoint"
  • "Add a method-specific rate limit for eth_call"

tip
  • Start simple — Try asking "What endpoints do I have?" or "Show me my usage for this month" to get familiar with the available tools.
  • Be specific — When you have multiple endpoints, mention the chain or name to help the assistant find the right one quickly.

How It Works

The MCP server is hosted remotely at https://mcp.quicknode.com/mcp and uses OAuth 2.1 for authentication. When your AI assistant receives a request that involves Quicknode infrastructure, it calls the appropriate MCP tool, which makes authenticated requests to the Quicknode Admin API. The assistant handles the response formatting and presents the results in natural language.

Write operations (creating endpoints, modifying security settings, deleting resources) require the Admin role and your explicit confirmation before the assistant executes them. If you connected with the Viewer role, the assistant can only perform read-only operations.


tip

Quicknode MCP manages your account-level infrastructure. If you want AI coding agents to have accurate knowledge of Quicknode's APIs and products when writing code, see Blockchain Skills. For AI-optimized documentation discovery, see LLM-Optimized Docs.

Resources

We ❤️ Feedback!

If you have any feedback or questions about this documentation, let us know. We'd love to hear from you!

Share this doc