An MCP server that tracks the historical changes of Twitter usernames.
https://github.com/kukapay/twitter-username-changes-mcpStop manually tracking suspicious Twitter accounts that keep changing their usernames. This MCP server automatically maintains historical records of Twitter username changes—perfect for crypto investigations, OSINT research, and fraud detection.
You're investigating a crypto project promotion account, tracking a potential scammer, or building fraud detection systems. Twitter accounts frequently change usernames to evade detection, making it nearly impossible to maintain consistent tracking across name changes.
Traditional approaches require manual monitoring, screenshots, or complex Twitter API integrations just to answer: "What were this account's previous usernames?"
Instant Historical Context: Query any Twitter handle and get complete username history with timestamps. See exactly when @OSINT_Ukraine was previously @The_HelpfulHand and @nftpromo_s.
Fraud Pattern Recognition: Rapid username changes are a classic red flag in crypto scams. This server gives you the data to spot these patterns immediately.
OSINT Workflow Integration: Instead of building custom Twitter tracking infrastructure, plug this into your existing Claude Desktop workflow and query username histories conversationally.
Zero API Complexity: No need to manage Twitter API credentials, rate limits, or data persistence. Ask Claude "Show me the username history for @SuspiciousAccount" and get formatted results.
Crypto Due Diligence: Before engaging with a crypto project's social media, check if their accounts have suspicious username change patterns that suggest impersonation or scam activity.
Investigation Documentation: Generate timestamped reports of account behavior for security research, showing exactly when accounts changed names and how frequently.
Automated Monitoring: Integrate into larger fraud detection systems to flag accounts with unusual username change frequency in your risk scoring algorithms.
Social Engineering Detection: Identify accounts that frequently rebrand to impersonate legitimate projects or personalities.
Unlike standalone Twitter monitoring tools, this integrates directly into your Claude Desktop workflow. You're already using Claude for research and analysis—now you can query Twitter username histories without switching contexts.
# Setup takes 2 minutes
git clone https://github.com/kukapay/twitter-username-changes-mcp.git
cd twitter-username-changes-mcp
pip install mcp[cli] requests
mcp dev main.py
Add it to your Claude Desktop config and immediately start querying: "What's the username history for @Mormonger?"
The server returns formatted historical data:
Username change history for Mormonger:
User ID 1408886100:
- colenoorda (2016-04-02)
- Mormonger (2017-01-19 to 2025-02-25)
This isn't another generic social media monitoring tool. It's specifically designed for developers who understand that username change patterns reveal important behavioral signals.
The implementation is intentionally lightweight—just MCP and requests as dependencies. No bloated frameworks, no complex configuration. Clone, install, configure Claude Desktop, and you're tracking username changes in production.
Perfect for security researchers building larger investigation frameworks, crypto developers implementing due diligence checks, or anyone who needs reliable Twitter username change tracking without the infrastructure overhead.