Automatically Deployed

Built & deployed entirely by Claude

This server was provisioned, configured, hardened, and deployed autonomously by Claude using two custom MCP servers — without a single manual SSH command or click in a dashboard.

BinaryLane MCP
Infrastructure control — create servers, manage DNS, configure firewalls, and more via the BinaryLane API.
SSH MCP
Remote execution — run commands, transfer files, and manage servers over SSH with auto-discovery.

How this was deployed

1BinaryLane MCP created a 4-vCPU Ubuntu 24.04 server in Brisbane
2SSH MCP auto-discovered the server and connected via key-based auth
3Claude ran apt update & upgrade, installed nginx, and hardened the config
4BinaryLane advanced firewall configured via MCP — explicit allow/deny rules applied
5Nginx hardened — version hidden, security headers added, TLS 1.2+ only, gzip enabled
6SSH hardened to key-only authentication, password login disabled
7DNS registered, SSL certificate provisioned via Let's Encrypt, and this page deployed

See what we built with these MCPs

Using the same BinaryLane MCP and SSH MCP shown above, Claude autonomously deployed a fully redundant WordPress stack across three Australian cities — 9 servers, anycast load balancing, HyperDB read/write splitting, and MariaDB replication. All for $59/month.

Read the full technical deep-dive →

Firewall Rules

Applied via BinaryLane advanced firewall API — managed entirely through the BinaryLane MCP server.

ProtocolPortSourceActionDescription
TCP220.0.0.0/0ACCEPTAllow SSH
TCP800.0.0.0/0ACCEPTAllow HTTP
TCP4430.0.0.0/0ACCEPTAllow HTTPS
ICMP0.0.0.0/0ACCEPTAllow ping
TCP*0.0.0.0/0DROPDeny all other TCP
UDP*0.0.0.0/0DROPDeny all other UDP

Nginx Security Headers

Configured via SSH MCP — nginx version hidden, strict transport security, content security policy, and more.

📅

Let's Talk

Want to explore what BinaryLane infrastructure can do for you? Curious about how AI and MCP tooling can automate your cloud workflows? Book a time and let's chat.