50+ JSON endpoints — auth, billing, servers, snapshots, networking, transparency.
https://nordbastion.com/v1/
Open the API page
A native MCP server, a full REST API, OAuth 2.1 with dynamic client registration, and pay-per-call x402 settlement. No KYC. Crypto-billed. Four Nordic jurisdictions.
Pick the surface that matches your client. Same identity floor across the three: email and password, no humans in the loop.
Paste the server-card URL into Claude Desktop, Claude Code, Cursor or any MCP-aware client. The host discovers the tool list and the OAuth dance starts automatically.
https://nordbastion.com/.well-known/mcp/server-card.json
Or with Claude Code from the CLI:
claude mcp add nordbastion https://nordbastion.com/mcp
All three pay the same price. All three honour the same kill-switch. All three are KYC-free.
Every surface is content-typed, CORS-open, and described by a standard. Plug in once, follow the cross-links, find everything else.
50+ JSON endpoints — auth, billing, servers, snapshots, networking, transparency.
https://nordbastion.com/v1/
Open the API page
Machine-readable spec for every endpoint — feed it to your codegen of choice.
/.well-known/openapi.json
Fetch the spec
SEP-1649 discovery document — paste into any MCP host, tools auto-register.
/.well-known/mcp/server-card.json
View the card
Linux Foundation A2A agent card — capabilities, auth schemes, contact endpoint.
/.well-known/agent.json
View the agent card
RFC 8414 metadata + RFC 7591 dynamic client registration. Agents self-onboard without paperwork.
/.well-known/oauth-authorization-server
OAuth metadata
Extended llms.txt — pointers to every machine surface, written for LLM ingestion.
/.well-known/llms-agents.txt
Read the map
Same prices on both rails. Choose the one that matches how your agent thinks about money.
Your agent calls POST /v1/billing/topups once, sends crypto to the returned address, and every subsequent API call settles against the prepaid balance. Best for long-running agents that make many small calls.
Minimum $30 USD per isi ulang, maksimum $10,000 USD — diterapkan di sisi server. Nilai yang lebih rendah mengembalikan HTTP 422 amount_too_low.
POST /v1/billing/topups
{
"amount_usd": 50,
"coin": "XMR"
}
→ 201 Created
{
"address": "8B5x…",
"qr": "data:image/png;base64,…",
"expires_at": "2026-05-16T15:00:00Z"
}
Protected endpoints answer 402 Payment Required with a quote. Your agent pays the on-chain quote and replays the request with the receipt header. Best for transient agents with no long-lived account.
POST /v1/servers
→ 402 Payment Required
X-Payment-Quote: nb_q_3f9c2a…
{
"amount_usd": 23.90,
"accepts": ["XMR","BTC","USDC"],
"settle_url": "https://…",
"expires_in": 600
}
POST /v1/servers
X-Payment-Receipt: nb_r_8b71…
→ 202 Accepted
Live list at /v1/billing/coins
Bots that present a valid HTTP Message Signature from a Cloudflare / Google / AWS / OpenAI / Anthropic crawler-pool key are recognised and granted a 5× rate-limit multiplier. The verification is in front of every endpoint, including unauthenticated catalogue calls.
Signature-Agent: "https://crawl.anthropic.com"
Issue keys with scopes (read-only, billing, servers, full), optional IP allowlist, optional expiry. Agents get the smallest key they need. Revocation is immediate.
scope: servers · billing-read
NordBastion stores the minimum needed to run the rate-limiter. Customers who want a full audit trail of agent actions can flip it on at /v1/account/audit-log and download it any time.
GET /v1/account/audit-log?from=2026-05-01
Builders who shipped something interesting on top of the API. Publish yours with POST /v1/agents/directory.
No vetting fee, no exclusivity clause — a NordBastion human just confirms the agent does what its description says. Send a POST and we will review within a few days.
POST /v1/agents/directory
Same answers whether the requester is a human, a script, or a foundation-model agent.
Yes. POST /v1/auth/register accepts an email and a password and returns an account, no human review and no identity check. The same floor applies whether the requester is a human or an agent.
Two paths. The classic flow: top up the account balance once in cryptocurrency, then every API call settles against the prepaid balance. The agent-native flow: per-call x402 — protected endpoints answer 402 Payment Required with a quote, your agent pays the on-chain quote and replays with the receipt header. Both pay the same prices.
No KYC, even for agents. Email plus password is the entire identity floor. The doctrine page explains why.
Claude (Desktop, Code), Cursor, OpenClaw, and any custom client speaking MCP, A2A or plain REST. Paste the MCP server-card URL into the host and the tools register automatically.
120 requests per minute and 3000 per hour by default, per API key. Verified bots from Cloudflare, Google, AWS, OpenAI and Anthropic — signed with Web Bot Auth — get five times that.
Yes, and it is transparent. If payments are paused, write endpoints return 503 with kill_switch_blocked: true and a structured tooltip code, so your agent can defer the action without guessing at the cause.
Yes. POST /v1/agents/directory from an authenticated session. A NordBastion human verifies the entry within a few days before it goes live on this page.
The /doctrine/ page explains the privacy contract — what is collected, what is not, what is logged and for how long. The same contract binds agent traffic and human traffic.