How to integrate Ip2proxy MCP with Codex

Ip2proxy logo
Codex logo
divider

Introduction

Codex is one of the most popular coding harnesses out there. And MCP makes the experience even better. With Ip2proxy MCP integration, you can draft, triage, summarise emails, and much more, all without leaving the terminal or the app, whichever you prefer.

Also integrate Ip2proxy with

Why use Composio?

Apart from a managed and hosted MCP server, you will get:

  • CodeAct: A dedicated workbench that allows GPT to write its code to handle complex tool chaining. Reduces to-and-fro with LLMs for frequent tool calling.
  • Large tool responses: Handle them to minimise context rot.
  • Dynamic just-in-time access to 20,000 tools across 870+ other Apps for cross-app workflows. It loads the tools you need, so GPTs aren't overwhelmed by tools you don't need.

How to install Ip2proxy MCP in Codex

Run the setup command

Run this command in your terminal to add the Composio MCP server to Codex.

Terminal

It will initiate the authentication in a browser window, authorize Codex to access your Composio account.

Composio authentication page

(Optional) Authenticate with OAuth

To authenticate manually, run the login command to open a browser window and authorize Codex to access your Composio account.

bash
codex mcp login composio

Verify the connection

Run codex mcp list to confirm Composio appears as a registered MCP server.

bash
codex mcp list

Codex App

Codex App follows the same approach as VS Code.

  1. Click ⚙️ on the bottom left → MCP Servers → + Add servers → Streamable HTTP:
  2. Fill the header and Key fields with { "x-consumer-api-key" = "ck_*******" }.
  3. The Key is the Composio API key, that you can find on connect.composio.dev
  4. Click on Authenticate and authorize Codex to your Composio account and you're all set.
Codex App MCP setup
  1. Restart and verify if it's there in .codex/config.toml
bash
[mcp_servers.composio]
url = "https://connect.composio.dev/mcp"
http_headers = { "x-consumer-api-key" = "ck_*******" }

What is the Ip2proxy MCP server, and what's possible with it?

The Ip2proxy MCP server is an implementation of the Model Context Protocol that connects your AI agent and assistants like Claude, Cursor, etc directly to your Ip2proxy account. It provides structured and secure access to IP proxy detection services, so your agent can identify proxy usage, detect VPNs, spot TOR nodes, and flag suspicious IPs on your behalf.

  • Instant proxy status checks: Your agent can determine if any given IP address is associated with an anonymous proxy, VPN, or TOR exit node.
  • Automated threat intelligence: Effortlessly screen and flag risky IPs to prevent fraudulent access, spam, or abuse.
  • Real-time user verification: Let your agent verify incoming IP addresses on sign-up or login to detect suspicious users in real time.
  • Enhanced bot and crawler detection: Identify search engine robots and residential proxies to tailor user experiences or block unwanted traffic.
  • Security workflow automation: Integrate proxy checks into your security flows for smarter, faster decision-making about user and traffic legitimacy.

Supported Tools & Triggers

Tools
Check Proxy Status of an IPTool to check if an IP address is a proxy.

Conclusion

You've successfully integrated Ip2proxy with Codex using Composio's MCP server. Now you can interact with Ip2proxy directly from your terminal, VS Code, or the Codex App using natural language commands.

Key benefits of this setup:

  • Seamless integration across CLI, VS Code, and standalone app
  • Natural language commands for Ip2proxy operations
  • Managed authentication through Composio
  • Access to 20,000+ tools across 870+ apps for cross-app workflows
  • CodeAct workbench for complex tool chaining

Next steps:

  • Try asking Codex to perform various Ip2proxy operations
  • Explore cross-app workflows by connecting more toolkits
  • Build automation scripts that leverage Codex's AI capabilities

How to build Ip2proxy MCP Agent with another framework

FAQ

What are the differences in Tool Router MCP and Ip2proxy MCP?

With a standalone Ip2proxy MCP server, the agents and LLMs can only access a fixed set of Ip2proxy tools tied to that server. However, with the Composio Tool Router, agents can dynamically load tools from Ip2proxy and many other apps based on the task at hand, all through a single MCP endpoint.

Can I use Tool Router MCP with Codex?

Yes, you can. Codex fully supports MCP integration. You get structured tool calling, message history handling, and model orchestration while Tool Router takes care of discovering and serving the right Ip2proxy tools.

Can I manage the permissions and scopes for Ip2proxy while using Tool Router?

Yes, absolutely. You can configure which Ip2proxy scopes and actions are allowed when connecting your account to Composio. You can also bring your own OAuth credentials or API configuration so you keep full control over what the agent can do.

How safe is my data with Composio Tool Router?

All sensitive data such as tokens, keys, and configuration is fully encrypted at rest and in transit. Composio is SOC 2 Type 2 compliant and follows strict security practices so your Ip2proxy data and credentials are handled as safely as possible.

Used by agents from

Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai
Context
Letta
glean
HubSpot
Agent.ai
Altera
DataStax
Entelligence
Rolai

Never worry about agent reliability

We handle tool reliability, observability, and security so you never have to second-guess an agent action.