Store, retrieve, and pin encrypted files on IPFS via MCP tools for AI agents and workflows
https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcpAlso advertised: https://mcp-servers.bh.tkllabs.io:9780/ipfs-sse
Headers: Authorization
Add this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-tkllabs-bh-mcp-servers-ipfs-toolkit": {
"url": "https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp"
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
Paste an API key, bearer token, or session value from the provider. It is used once to list inventory and discarded after the request.
API key for authentication as Bearer token
ipfs-toolkit is an MCP server for Store, retrieve, and pin encrypted files on IPFS via MCP tools for AI agents and workflows. It supports HTTP transport.
Use the generated config in Install. It points your client at the advertised remote endpoint shown on this page.
Choose the Claude Desktop tab in Install, copy the config, and add it to Claude Desktop's MCP server settings. Endpoint: https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp.
Choose the Claude Code tab in Install, copy the config, and add it to Claude Code's MCP server settings. Endpoint: https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp.
Choose the Codex tab in Install, copy the config, and add it to Codex's MCP server settings. Endpoint: https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp.
Choose the Cursor or VS Code tab in Install, copy the config, and add it to Cursor or VS Code's MCP server settings. Endpoint: https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp.
ipfs-toolkit uses HTTP transport. Endpoint: https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp.
ipfs-toolkit inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
ipfs-toolkit is marked with Auth required by registry metadata auth. You may need provider login, an API key, a bearer token, or a session header.