Sponsored by Deepsite.site

Teckel Ipfs Mcp Toolkit

Created By
teckel-mcp-serversan hour ago
The Interplanetary File System (IPFS) MCP toolkit gives AI Agents and automated workflows the ability to utilize IPFS as a backend storage medium. Upload, retrieve, pin, and manage encrypted files on IPFS via a simple API accessible as MCP tools.
Overview

ipfs-toolkit

Interplanetary File System (IPFS) MCP toolkit

How to Use the teckel Toolkits

First download and install the teckel App.

Download_on_the_App_Store_Badge_US-UK_RGB_blk_092917 GetItOnGooglePlay_Badge_Web_color_English

Next generate an API key using the teckel App.

Do the following:

  1. Navigate to the Accounts page by tapping on the wallet icon in the upper right corner of the App home screen. Access the API Key Manager for the created or imported Ethereum Account by tapping “Manage API Key” on the Accounts page.

  2. Use the API key when making calls to the endpoints. All the available endpoints are available via the teckel App, incorporating the actual API key for the given Ethereum Account.

  3. For illustrative purposes, we will use the following fake key d1e12345-c234-45a6-9b76-1234567891ff in the examples presented below. You would substitute your actual API key in place of this fake key.

Next, decide if you are using the MCP servers or RESTful (API) to access the tools.

Using the MCP Servers

Configure your MCP client-of-choice

Whatever the client, the configuration is essentially the same. Namely, provide the client with the MCP server endpoint and access credentials. These are typically in the form of a configuration JSON snippet, using your API key as the “Bearer” token in the “Authorization” tag. For example, here is the precise configuration for use with the Cursor desktop app (navigate within the Cursor app to the Cursor Settings -> Tools & MCP -> + New MCP server and enter these details using your actual teckel API key to replace this fake one).

MCP JSON configuration (example for use with Cursor)

{
 "mcpServers": {    
    "teckel-ipfs-toolkit": {
      "url": "https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp",
      "headers": {
        "Authorization": "Bearer d1e12345-c234-45a6-9b76-1234567891ff"
      }
    }   
  }
}

NOTE: This configuration assumes the HTTP(streamable) protocol. If your client requires the older (now legacy) SSE protocol, replace “ipfs-mcp” with “ipfs-sse”.

Using the RESTful API Servers

The benefit of using the MCP servers is that the connected LLMs can parse the natural language in the user prompts, populate the required parameters for calling the toolbox API functions, then likewise unravel the returned JSON structure into natural language for presentation to the user. However, if you wish to utilise the teckel toolkits at a lower level (e.g., in your own app), you can call the functions directly using the RESTful (POST) API protocols. You are then responsible for populating the input parameters, and handling the returned JSON output. All methods called via RESTful web services must be "awaited": there is no fire-and-forget (with future polling for task completion etc).

Pricing

Pricing (via teckel credits purchased within the teckel App) for usage of teckel IPFS services can be found at https://teckel.io/pricing/

Rate Limiting

All MCP/API calls are subject to rate-limiting per API key. The thresholds are not published, but if a given API key has exceeded the rate limit, a 429 error code will be returned on the given call.

Errors

If the MCP/API call fails due to user error resulting in a 4xx error code, the user is charged one Base Call Fee (see https://teckel.io/ai-mcp-services/). If the API call fails due to server error resulting in a 5xx error code, the user is not charged. If the given call is part of a cascade of nested calls, the above rules apply to the “outer” call: In other words, if the outer call fails with a 4xx error code, the user is charged one Base Call Fee (for the failed outer call), and there will be no charge for any of the cascaded calls (whether they succeeded or not). Likewise, if the outer call fails with a 5xx error code, the user is not charged at all (even if the cascaded calls succeed).

Encryption

IPFS is a public service and all content is in principle available to anyone. Therefore if you deem your content to be private, you should make sure it is encrypted before uploading to IPFS. Teckel facilitates such encryption using your teckel API key to construct the encryption key. However, this does not provide end-to-end encryption of your content because your API key is known to the teckel servers. Instead, if you require end-to-end encryption, whereby only you (and not the teckel servers etc) can ever retrieve your content, you must first encrypt your files offline using your own chosen method, before uploading to IPFS via teckel.

Content moderation

To play our part in keeping the internet clean, teckel pre-scans all uploaded content for malware and inappropriate content (as per the teckel terms). Any content failing the pre-scan is rejected. The ethereum wallet address associated with the API key used for the attempted upload may be blacklisted at teckel's sole discretion.

API Key Security

Should you have concerns that your API key has been compromised (and someone else may be consuming your teckel credits by using your key), simply replace the key via the API Key Manager → Replace API key in the teckel App. The old key will then be immediately disabled. IMPORTANT: if you change your API key, any IPFS content previously encrypted via teckel will no longer be retrievable since the API key is used for encryption. Before you change your API key, make sure you have retrieved (and unencrypted) your previous IPFS data and stored the unencrypted versions offline.

teckel App

The IPFS toolkit functionality is wholly compatible with the IPFS functionality of the teckel app. This means that IPFS content uploaded via the teckel App can be accessed via the IPFS toolkit, and vice versa.

teckel MCP Server — IPFS API Reference

Base URL: https://mcp-servers.bh.tkllabs.io:9780


Authentication

All endpoints require a Bearer token in the Authorization header:

Authorization: Bearer YOUR_API_KEY

Endpoint Index

MethodPathMCP Tool NameDescription
POST/get_ipfs_content_for_apikeylist_ipfs_filesList IPFS files for account
POST/remove_ipfs_files_from_accountremove_ipfs_filesRemove multiple IPFS files by nickname search
POST/pin_ipfs_files_for_apikeypin_ipfs_filesPin multiple IPFS files by nickname search
POST/unpin_ipfs_files_for_apikeyunpin_ipfs_filesUnpin multiple IPFS files by nickname search
POST/pin_ipfs_cid_for_apikeypin_ipfs_cidPin a single IPFS file by CID
POST/remove_ipfs_cid_from_accountremove_ipfs_cid_from_accountRemove a single IPFS file by CID
POST/publish_ipfs_file_to_webserverpublish_ipfs_file_to_webserverPublish an IPFS file to the teckel web server
POST/upload_sender_file_to_ipfs_for_apikeyupload_file_to_ipfsUpload a file to IPFS
POST/upload_sender_base64_to_ipfs_for_apikeyupload_base64_file_to_ipfsUpload base64-encoded file to IPFS
POST/retrieve_ipfs_file_for_apikeyretrieve_ipfs_fileRetrieve an IPFS file by CID

Endpoints


POST /get_ipfs_content_for_apikey

List IPFS files for the account associated with the API key, with optional filtering by nickname, pinned status, encrypted state, and content type.

MCP tool: list_ipfs_files — List IPFS files (selected on nickname via fuzzy search_string) for the account corresponding to the teckel API key used in the call.

Parameters

NameTypeRequiredDefaultDescription
search_stringstringNo""Search for this string in the file nickname. Leave blank to return all.
pinned_stateintegerNo00 = all entries; 1 = pinned only; 2 = unpinned only
encrypted_stateintegerNo00 = all entries; 1 = encrypted only; 2 = unencrypted only
content_typestringNo""Filter by content type, e.g. image, audio, video. Leave blank to ignore.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/get_ipfs_content_for_apikey?search_string=my_video&pinned_state=0&encrypted_state=0&content_type=video" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /remove_ipfs_files_from_account

Unpin and remove IPFS files (selected by fuzzy nickname search) from the teckel IPFS node and account inventory.

Note: This only removes content from the teckel node and inventory. The content may still exist on the decentralised IPFS network.

MCP tool: remove_ipfs_files — Unpin and remove the IPFS files (selected on nickname via fuzzy search_string) from the teckel IPFS node and from the wallet account, for the account corresponding to the teckel API key used in the call. Note: this only removes the content from the teckel node and inventory. It may still exist on the IPFS decentralized network.

Parameters

NameTypeRequiredDefaultDescription
search_stringstringNo""Search for this string in the file nickname. Leave blank to match all.
pinned_stateintegerNo00 = all entries; 1 = pinned only; 2 = unpinned only
encrypted_stateintegerNo00 = all entries; 1 = encrypted only; 2 = unencrypted only
content_typestringNo""Filter by content type, e.g. image, audio, video. Leave blank to ignore.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/remove_ipfs_files_from_account?search_string=old_test_files&pinned_state=0&encrypted_state=0" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /pin_ipfs_files_for_apikey

Pin IPFS files (selected by fuzzy nickname search) on the teckel IPFS node. Pinning prevents automatic garbage collection of the content.

MCP tool: pin_ipfs_files — Pin the IPFS files (selected on nickname via fuzzy search_string) on to the teckel IPFS node for the account corresponding to the teckel API key used in the call. Pinning prevents automatic deletion of the content from the IPFS node.

Parameters

NameTypeRequiredDefaultDescription
search_stringstringNo""Search for this string in the file nickname. Leave blank to match all.
pinned_stateintegerNo00 = all entries; 1 = pinned only; 2 = unpinned only
encrypted_stateintegerNo00 = all entries; 1 = encrypted only; 2 = unencrypted only
content_typestringNo""Filter by content type, e.g. image, audio, video. Leave blank to ignore.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/pin_ipfs_files_for_apikey?search_string=important_files&pinned_state=2" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /unpin_ipfs_files_for_apikey

Unpin IPFS files (selected by fuzzy nickname search) from the teckel IPFS node. Unpinned files are eligible for automatic garbage collection.

MCP tool: unpin_ipfs_files — Unpin the IPFS files (selected on nickname via fuzzy search_string) from the teckel IPFS node for the account corresponding to the teckel API key used in the call. Unpinning allows automatic deletion of the content from the IPFS node.

Parameters

NameTypeRequiredDefaultDescription
search_stringstringNo""Search for this string in the file nickname. Leave blank to match all.
pinned_stateintegerNo00 = all entries; 1 = pinned only; 2 = unpinned only
encrypted_stateintegerNo00 = all entries; 1 = encrypted only; 2 = unencrypted only
content_typestringNo""Filter by content type, e.g. image, audio, video. Leave blank to ignore.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/unpin_ipfs_files_for_apikey?search_string=old_drafts&pinned_state=1" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /pin_ipfs_cid_for_apikey

Pin the individual IPFS entity identified by its CID on the teckel IPFS node. Pinning prevents automatic deletion.

MCP tool: pin_ipfs_cid — Pin the individual entity identified by its IPFS CID on to the teckel IPFS node for the account corresponding to the teckel API key used in the call. Pinning prevents automatic deletion of the content from the IPFS node.

Parameters

NameTypeRequiredDefaultDescription
cidstringNo""IPFS content identifier of the file to pin
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/pin_ipfs_cid_for_apikey?cid=QmExampleCID123" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /remove_ipfs_cid_from_account

Unpin and remove the individual IPFS entity identified by its CID from the teckel IPFS node and account inventory.

Note: This only removes content from the teckel node and inventory. The content may still exist on the decentralised IPFS network.

MCP tool: remove_ipfs_cid_from_account — Unpin and remove the individual entity identified by its IPFS CID from the teckel IPFS node and from the wallet account, for the account corresponding to the teckel API key used in the call. Note: this only removes the content from the teckel node and inventory. It may still exist on the IPFS de-centralized network.

Parameters

NameTypeRequiredDefaultDescription
cidstringNo""IPFS content identifier of the file to remove
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/remove_ipfs_cid_from_account?cid=QmExampleCID123" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /publish_ipfs_file_to_webserver

Retrieve an IPFS file by CID from the teckel node and publish it on the teckel web server, applying decryption if necessary. Returns a browseable public URL.

MCP tool: publish_ipfs_file_to_webserver — Retrieve the IPFS file, identified by its IPFS CID, from the teckel IPFS node, and publish it on the teckel web server, applying decryption if necessary, for the account corresponding to the teckel API key used in the call, returning the browseable URL.

Parameters

NameTypeRequiredDefaultDescription
cidstringNo""IPFS content identifier of the file to publish
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/publish_ipfs_file_to_webserver?cid=QmExampleCID123" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /upload_sender_file_to_ipfs_for_apikey

Upload a file to the teckel IPFS node for the account associated with the API key. The content is pre-scanned for compliance with teckel terms before being accepted.

MCP tool: upload_file_to_ipfs — Upload file contents to the teckel IPFS node for the account corresponding to the teckel API key used in the call. The content will be pre-scanned for compatibility with the teckel terms and will be rejected if not compliant.

Parameters

NameInTypeRequiredDefaultDescription
filemultipart form bodyfileYesFile to upload
nicknameOnIPFSquerystringNo""Nickname for the IPFS listing. Auto-generated if blank.
doEncryptOnIPFSquerystringNo"false"Apply encryption before uploading. true or false.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/upload_sender_file_to_ipfs_for_apikey?nicknameOnIPFS=my_document&doEncryptOnIPFS=false" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -F "file=@/path/to/your/file.pdf"

POST /upload_sender_base64_to_ipfs_for_apikey

Upload base64-encoded file data to the teckel IPFS node for the account associated with the API key. The content is pre-scanned for compliance with teckel terms before being accepted.

MCP tool: upload_base64_file_to_ipfs — Upload base64-encoded file contents to the teckel IPFS node for the account corresponding to the teckel API key used in the call. The content will be pre-scanned for compatibility with the teckel terms and will be rejected if not compliant.

Parameters

NameTypeRequiredDefaultDescription
base64_datastringNo""Base64-encoded file data
nicknameOnIPFSstringNo""Nickname for the IPFS listing. Auto-generated if blank.
doEncryptOnIPFSstringNo"false"Apply encryption before uploading. true or false.
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/upload_sender_base64_to_ipfs_for_apikey?base64_data=SGVsbG8gV29ybGQ%3D&nicknameOnIPFS=my_file&doEncryptOnIPFS=false" \
  -H "Authorization: Bearer YOUR_API_KEY"

POST /retrieve_ipfs_file_for_apikey

Retrieve the contents of an IPFS file by CID from the account inventory. Automatically decrypts if the file is encrypted. Only files originally posted to IPFS via teckel are supported.

MCP tool: retrieve_ipfs_file — Retrieve the contents of the IPFS file identified by the provided CID, from the inventory of the account corresponding to the teckel API key used in the call. Will automatically decrypt if encrypted. Only files originally posted to IPFS via teckel are supported i.e., not generic (non-teckel origin) IPFS content.

Parameters

NameTypeRequiredDefaultDescription
cidstringNo""IPFS content identifier of the file to retrieve
curl -X POST "https://mcp-servers.bh.tkllabs.io:9780/retrieve_ipfs_file_for_apikey?cid=QmExampleCID123" \
  -H "Authorization: Bearer YOUR_API_KEY"

Server Config

{
  "mcpServers": {
    "teckel-ipfs-toolkit": {
      "url": "https://mcp-servers.bh.tkllabs.io:9780/ipfs-mcp",
      "headers": {
        "Authorization": "Bearer <MY TECKEL APIKEY"
      }
    }
  }
}
Recommend Servers
TraeBuild with Free GPT-4.1 & Claude 3.7. Fully MCP-Ready.
AiimagemultistyleA Model Context Protocol (MCP) server for image generation and manipulation using fal.ai's Stable Diffusion model.
Tavily Mcp
Jina AI MCP ToolsA Model Context Protocol (MCP) server that integrates with Jina AI Search Foundation APIs.
CursorThe AI Code Editor
BlenderBlenderMCP connects Blender to Claude AI through the Model Context Protocol (MCP), allowing Claude to directly interact with and control Blender. This integration enables prompt assisted 3D modeling, scene creation, and manipulation.
EdgeOne Pages MCPAn MCP service designed for deploying HTML content to EdgeOne Pages and obtaining an accessible public URL.
ChatWiseThe second fastest AI chatbot™
DeepChatYour AI Partner on Desktop
MiniMax MCPOfficial MiniMax Model Context Protocol (MCP) server that enables interaction with powerful Text to Speech, image generation and video generation APIs.
WindsurfThe new purpose-built IDE to harness magic
MCP AdvisorMCP Advisor & Installation - Use the right MCP server for your needs
Amap Maps高德地图官方 MCP Server
Visual Studio Code - Open Source ("Code - OSS")Visual Studio Code
Playwright McpPlaywright MCP server
Zhipu Web SearchZhipu Web Search MCP Server is a search engine specifically designed for large models. It integrates four search engines, allowing users to flexibly compare and switch between them. Building upon the web crawling and ranking capabilities of traditional search engines, it enhances intent recognition capabilities, returning results more suitable for large model processing (such as webpage titles, URLs, summaries, site names, site icons, etc.). This helps AI applications achieve "dynamic knowledge acquisition" and "precise scenario adaptation" capabilities.
Serper MCP ServerA Serper MCP Server
Y GuiA web-based graphical interface for AI chat interactions with support for multiple AI models and MCP (Model Context Protocol) servers.
Baidu Map百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Howtocook Mcp基于Anduin2017 / HowToCook (程序员在家做饭指南)的mcp server,帮你推荐菜谱、规划膳食,解决“今天吃什么“的世纪难题; Based on Anduin2017/HowToCook (Programmer's Guide to Cooking at Home), MCP Server helps you recommend recipes, plan meals, and solve the century old problem of "what to eat today"
RedisA Model Context Protocol server that provides access to Redis databases. This server enables LLMs to interact with Redis key-value stores through a set of standardized tools.