The Shodan MCP server, developed by Cyreslab.ai, provides AI assistants with secure access to Shodan's extensive database of internet-connected devices and services through three primary tools: host information lookup, search functionality, and vulnerability information retrieval. The implementation features intelligent response sampling to reduce token usage, field selection for targeted data retrieval, and result summarization capabilities that distill large datasets into actionable intelligence. This server enhances cybersecurity research and threat intelligence workflows by enabling AI assistants to query detailed information about IP addresses, search for specific devices or services using various filters, and retrieve vulnerability details - all while maintaining efficient token usage through automatic response optimization.
暂无评论. 成为第一个评论的人!
登录以参与讨论
Get detailed information about a specific IP address. Parameters: ip (required), max_items (optional), fields (optional)
Search Shodan's database for devices and services. Parameters: query (required), page (optional), facets (optional), max_items (optional), fields (optional), summarize (optional)
Get the count of hosts matching a search query without consuming query credits. Parameters: query (required), facets (optional)
Scan a network range (CIDR notation) for devices. Parameters: cidr (required), max_items (optional), fields (optional)
Search for specific types of IoT devices. Parameters: device_type (required), country (optional), max_items (optional)
Get SSL certificate information for a domain. Parameters: domain (required)
Resolve hostnames to IP addresses using DNS lookup. Parameters: hostnames (required)
Get hostnames for IP addresses using reverse DNS lookup. Parameters: ips (required)
Get comprehensive domain information including subdomains and DNS records. Parameters: domain (required), history (optional), type (optional), page (optional)
List all available search facets that can be used with Shodan queries. Parameters: None
List all available search filters that can be used in Shodan queries. Parameters: None
Parse a search query to understand which filters and parameters are being used. Parameters: query (required)
List all ports that Shodan crawls on the Internet. Parameters: None
List all protocols that can be used when performing on-demand Internet scans. Parameters: None
Get detailed information about a specific CVE. Parameters: cve_id (required)
Search for vulnerabilities with various filters. Parameters: cpe23 (optional), product (optional), is_kev (optional), sort_by_epss (optional), start_date (optional), end_date (optional), limit (optional), skip (optional)
Get Common Platform Enumeration (CPE) information for products. Parameters: product (optional), vendor (optional), version (optional), limit (optional), skip (optional)
Get the newest vulnerabilities from the CVE database. Parameters: limit (optional)
Get Known Exploited Vulnerabilities (KEV) from CISA. Parameters: limit (optional)
Get CVEs sorted by EPSS score (Exploit Prediction Scoring System). Parameters: limit (optional)
Get information about your API plan including credits and limits. Parameters: None
Get account profile information including membership status and credits. Parameters: None
Get your current IP address as seen from the Internet. Parameters: None