The Model Context Protocol (MCP) server exposes Hyperping's monitoring data and controls to AI agents over HTTP. Works with any MCP-compatible client: Claude Desktop, Claude Code, Cursor, Windsurf, mcp-inspector, or custom clients built on the MCP SDK.
For a dense, agent-friendly spec (tools, query patterns, response shapes), point your client at /mcp/llms.txt. Zero-setup context.
read_only or read_write key. Keys are strictly scoped to one project.mcpServers block below into your Claude Desktop, Cursor, or Windsurf config.Claude Desktop, Cursor, Windsurf, Claude Code. Add to the mcpServers block of your client config:
{
"mcpServers": {
"hyperping": {
"type": "http",
"url": "https://api.hyperping.io/v1/mcp",
"headers": {
"Authorization": "Bearer sk_..."
}
}
}
}Older clients that only speak stdio can bridge via mcp-remote:
{
"mcpServers": {
"hyperping": {
"command": "npx",
"args": [
"-y",
"mcp-remote",
"https://api.hyperping.io/v1/mcp",
"--header",
"Authorization: Bearer sk_..."
]
}
}
}Your AI composes the queries; Hyperping returns the facts. Writes are scoped to reversible operations, delete_monitor is intentionally not exposed.
list_monitors(status?, page?, limit?)readup, down, paused, ssl_expiring.get_monitor(uuid)readsearch_monitors_by_name(query)readcreate_monitor(...)writeupdate_monitor(uuid, ...)writepause_monitor(uuid) / resume_monitor(uuid)writeget_status_summary()readget_monitor_uptime(from?, to?, resolution?, monitor_uuids?)readget_monitor_response_time(...)readget_monitor_mttr(...)readget_monitor_mtta(...)readlist_outages(page?, search?, status?, type?)readget_outage(uuid)readget_outage_timeline(uuid)readget_monitor_outages(monitor_uuid, page?, status?)readget_monitor_anomalies(uuid)readget_monitor_http_logs(uuid, page?, limit?, level?)readlist_recent_alerts(from?, to?, resolution?, monitor_uuids?)readlist_on_call_schedules()readget_on_call_schedule(uuid)readlist_escalation_policies()readget_escalation_policy(uuid)readlist_team_members()readlist_integrations()readget_integration(uuid)readreq.projectuuid is resolved server-side from the key. Client headers cannot override.projectuuid = ?. Cross-project access returns 404, never leaks.apiKeyPermissions === 'read_only' and refuse with a clear error. Enforced at the tool handler, not at the route.hasAccountRole with the user's actual project role. viewer keys cannot invoke write-adjacent endpoints.delete_monitor. Pause instead, or delete via dashboard / REST API./v3/incidents/*). Different resource. Contact us if you need them exposed.200 monitors or outages per page.300 req / min / key.from / to.