Shodan MCP Server provides cybersecurity analysts with direct access to Shodan's network intelligence capabilities through the Model Context Protocol. Developed by ADEO Cybersecurity Services, it exposes a comprehensive set of tools for host information lookup, DNS operations, vulnerability analysis, network scanning, and security alerts management. The implementation includes specialized prompt templates for common cybersecurity workflows like asset discovery, vulnerability assessment, and ICS analysis, making it particularly valuable for security reconnaissance, threat hunting, and infrastructure monitoring without leaving the AI assistant conversation.
Nessuna recensione ancora. Sii il primo a recensire!
Accedi per unirti alla conversazione
Get detailed information about a host from Shodan. Parameters: ip (required), history (optional), minify (optional)
Resolve hostnames to IP addresses. Parameters: hostnames (required)
Look up hostnames for IP addresses. Parameters: ips (required)
Get DNS entries and subdomains for a domain. Parameters: domain (required)
Search Shodan for hosts matching specific criteria. Parameters: query (required), facets (optional), page (optional)
Get count of matching results without full details. Parameters: query (required), facets (optional)
List all available search facets. No parameters required.
List all filters that can be used when searching. No parameters required.
Analyze and break down search query components. Parameters: query (required)
List all ports that Shodan is actively scanning. No parameters required.
List all protocols available for scanning. No parameters required.
Request Shodan to scan specific targets. Parameters: ips (required)
Check the status of a submitted scan. Parameters: id (required)
View all your submitted scans. No parameters required.
List available network alert triggers. No parameters required.
Set up network monitoring alerts. Parameters: name (required), filters (required), expires (optional)
Get details about a specific alert. Parameters: id (required)
Remove an existing alert. Parameters: id (required)
Modify an existing alert. Parameters: id (required), name (optional), filters (optional)
View all active alerts. No parameters required.
View saved search queries. Parameters: page (optional), sort (optional), order (optional)
Search through saved queries. Parameters: query (required), page (optional)
View popular query tags. Parameters: size (optional)
View account information. No parameters required.
Check API subscription status. No parameters required.
View billing information. No parameters required.
Check your request headers. No parameters required.
View your current IP address. No parameters required.
Get CVE details. Parameters: cve (required)
Search vulnerabilities by CPE. Parameters: cpe (required), minCvss (optional), maxResults (optional)
Analyze URLs for security threats. Parameters: url (required)
Check file hashes for malware. Parameters: hash (required)
Check IP reputation. Parameters: ip (required)
Analyze domain reputation. Parameters: domain (required)
Discover and analyze internet-facing assets and infrastructure. Parameters: target (required), depth (optional)
Find vulnerabilities in internet-connected systems. Parameters: target_type (required), target (required), severity_threshold (optional), include_vt_analysis (optional)
Search for specific internet-connected systems or services. Parameters: search_type (required), query (required), filters (optional)
Set up network monitoring and alerts. Parameters: target (required), monitor_type (required), notification_threshold (optional)
Analyze exposed industrial control systems and SCADA devices. Parameters: target_type (required), target (required), protocol (optional)
Analyze DNS information for domains and IP addresses. Parameters: target_type (required), target (required), include_history (optional), include_vt_analysis (optional)
Analyze specific service types exposed on the internet. Parameters: service_type (required), target_scope (required), target (optional), custom_query (optional), include_vt_analysis (optional)
Analyze account information and API usage status. Parameters: info_type (required)
Manage and analyze on-demand network scans. Parameters: action (required), target (optional), scan_id (optional)
Analyze Shodan search capabilities and patterns. Parameters: action (required), query (optional)
Hunt for specific vulnerabilities across the internet. Parameters: vuln_type (required), target (required), scope (optional), scope_value (optional)
Analyze files and URLs for malware and security threats. Parameters: target_type (required), target (required), include_relationships (optional)
Analyze network infrastructure using combined Shodan and VirusTotal data. Parameters: target_type (required), target (required), depth (optional), include_vt_analysis (optional)
Hunt for threats across multiple data sources using combined intelligence. Parameters: indicator_type (required), indicator (required), include_vt_analysis (optional)