Shodan MCP Server
平台与服务by Cyreslab-AI
接入 Shodan API,查询互联网暴露设备与服务详情,支持高级搜索和结果总结,增强 AI 助手在网络安全研究与威胁情报中的能力。
什么是 Shodan MCP Server?
接入 Shodan API,查询互联网暴露设备与服务详情,支持高级搜索和结果总结,增强 AI 助手在网络安全研究与威胁情报中的能力。
核心功能 (23 个工具)
get_host_infoGet detailed information about a specific IP address
search_shodanSearch Shodan's database for devices and services
scan_network_rangeScan a network range (CIDR notation) for devices
get_ssl_infoGet SSL certificate information for a domain
search_iot_devicesSearch for specific types of IoT devices
get_host_countGet the count of hosts matching a search query without consuming query credits
list_search_facetsList all available search facets that can be used with Shodan queries
list_search_filtersList all available search filters that can be used in Shodan queries
parse_search_tokensParse a search query to understand which filters and parameters are being used
list_portsList all ports that Shodan crawls on the Internet
list_protocolsList all protocols that can be used when performing on-demand Internet scans
get_api_infoGet information about your API plan including credits and limits
get_my_ipGet your current IP address as seen from the Internet
dns_lookupResolve hostnames to IP addresses using DNS lookup
reverse_dns_lookupGet hostnames for IP addresses using reverse DNS lookup
get_domain_infoGet comprehensive domain information including subdomains and DNS records
get_account_profileGet account profile information including membership status and credits
get_cve_infoGet detailed information about a specific CVE
search_cvesSearch for vulnerabilities with various filters
get_cpesGet Common Platform Enumeration (CPE) information for products
get_newest_cvesGet the newest vulnerabilities from the CVE database
get_kev_cvesGet Known Exploited Vulnerabilities (KEV) from CISA
get_cves_by_epssGet CVEs sorted by EPSS score (Exploit Prediction Scoring System)
README

Shodan MCP Server
A Model Context Protocol (MCP) server that provides access to Shodan API functionality and CVE database, allowing AI assistants to query information about internet-connected devices, services, and vulnerabilities.
Features
Network Intelligence
- Host Information: Get detailed information about specific IP addresses
- Search Capabilities: Search Shodan's database for devices and services
- Network Scanning: Scan network ranges (CIDR notation) for devices
- SSL Certificate Information: Get SSL certificate details for domains
- IoT Device Search: Find specific types of IoT devices
Vulnerability Intelligence
- CVE Lookup: Get detailed information about specific vulnerabilities
- Vulnerability Search: Search CVEs with advanced filters (product, KEV status, EPSS scores)
- CPE Information: Get Common Platform Enumeration data for products
- Latest Vulnerabilities: Access newest CVEs and Known Exploited Vulnerabilities
- Exploit Prediction: Get CVEs sorted by EPSS exploit prediction scores
Installation
-
Clone the repository:
bashgit clone https://github.com/Cyreslab-AI/shodan-mcp-server.git cd shodan-mcp-server -
Install dependencies:
bashnpm install -
Build the server:
bashnpm run build -
Set up your Shodan API key:
bashexport SHODAN_API_KEY="your-api-key-here" -
Start the server:
bashnpm start
MCP Integration
This server can be integrated with Claude or other MCP-compatible AI assistants. To add it to Claude Desktop or Claude.app:
-
Add the server to your MCP settings:
json{ "mcpServers": { "shodan": { "command": "node", "args": ["/path/to/shodan-mcp-server/build/index.js"], "env": { "SHODAN_API_KEY": "your-api-key-here" } } } } -
Restart Claude to load the new MCP server.
Available Tools
Search & Host Information Tools
get_host_info
Get detailed information about a specific IP address.
Parameters:
ip(required): IP address to look upmax_items(optional): Maximum number of items to include in arrays (default: 5)fields(optional): List of fields to include in the results (e.g., ['ip_str', 'ports', 'location.country_name'])
search_shodan
Search Shodan's database for devices and services.
Parameters:
query(required): Shodan search query (e.g., 'apache country:US')page(optional): Page number for results pagination (default: 1)facets(optional): List of facets to include in the search results (e.g., ['country', 'org'])max_items(optional): Maximum number of items to include in arrays (default: 5)fields(optional): List of fields to include in the results (e.g., ['ip_str', 'ports', 'location.country_name'])summarize(optional): Whether to return a summary of the results instead of the full data (default: false)
get_host_count
Get the count of hosts matching a search query without consuming query credits.
Parameters:
query(required): Shodan search query to count hosts forfacets(optional): List of facets to include in the count results (e.g., ['country', 'org'])
scan_network_range
Scan a network range (CIDR notation) for devices.
Parameters:
cidr(required): Network range in CIDR notation (e.g., 192.168.1.0/24)max_items(optional): Maximum number of items to include in results (default: 5)fields(optional): List of fields to include in the results (e.g., ['ip_str', 'ports', 'location.country_name'])
search_iot_devices
Search for specific types of IoT devices.
Parameters:
device_type(required): Type of IoT device to search for (e.g., 'webcam', 'router', 'smart tv')country(optional): Optional country code to limit search (e.g., 'US', 'DE')max_items(optional): Maximum number of items to include in results (default: 5)
SSL & Certificate Tools
get_ssl_info
Get SSL certificate information for a domain.
Parameters:
domain(required): Domain name to look up SSL certificates for (e.g., example.com)
DNS Tools
dns_lookup
Resolve hostnames to IP addresses using DNS lookup.
Parameters:
hostnames(required): List of hostnames to resolve (e.g., ['google.com', 'facebook.com'])
reverse_dns_lookup
Get hostnames for IP addresses using reverse DNS lookup.
Parameters:
ips(required): List of IP addresses to lookup (e.g., ['8.8.8.8', '1.1.1.1'])
get_domain_info
Get comprehensive domain information including subdomains and DNS records.
Parameters:
domain(required): Domain name to lookup (e.g., 'google.com')history(optional): Include historical DNS data (default: false)type(optional): DNS record type filter (A, AAAA, CNAME, NS, SOA, MX, TXT)page(optional): Page number for pagination (default: 1)
Search Utility Tools
list_search_facets
List all available search facets that can be used with Shodan queries.
Parameters: None
list_search_filters
List all available search filters that can be used in Shodan queries.
Parameters: None
parse_search_tokens
Parse a search query to understand which filters and parameters are being used.
Parameters:
query(required): Shodan search query to parse and analyze
Infrastructure Tools
list_ports
List all ports that Shodan crawls on the Internet.
Parameters: None
list_protocols
List all protocols that can be used when performing on-demand Internet scans.
Parameters: None
CVE & Vulnerability Tools
get_cve_info
Get detailed information about a specific CVE.
Parameters:
cve_id(required): CVE ID to look up (e.g., 'CVE-2021-44228')
search_cves
Search for vulnerabilities with various filters.
Parameters:
cpe23(optional): CPE 2.3 string to search for (e.g., 'cpe:2.3:a:apache:log4j:*')product(optional): Product name to search for vulnerabilities (e.g., 'apache', 'windows')is_kev(optional): Filter for Known Exploited Vulnerabilities onlysort_by_epss(optional): Sort results by EPSS score (Exploit Prediction Scoring System)start_date(optional): Start date for filtering CVEs (YYYY-MM-DD format)end_date(optional): End date for filtering CVEs (YYYY-MM-DD format)limit(optional): Maximum number of results to return (default: 10)skip(optional): Number of results to skip for pagination (default: 0)
get_cpes
Get Common Platform Enumeration (CPE) information for products.
Parameters:
product(optional): Product name to search for (e.g., 'apache', 'windows')vendor(optional): Vendor name to filter by (e.g., 'microsoft', 'apache')version(optional): Version to filter by (e.g., '2.4.1')limit(optional): Maximum number of results to return (default: 10)skip(optional): Number of results to skip for pagination (default: 0)
get_newest_cves
Get the newest vulnerabilities from the CVE database.
Parameters:
limit(optional): Maximum number of results to return (default: 10)
get_kev_cves
Get Known Exploited Vulnerabilities (KEV) from CISA.
Parameters:
limit(optional): Maximum number of results to return (default: 10)
get_cves_by_epss
Get CVEs sorted by EPSS score (Exploit Prediction Scoring System).
Parameters:
limit(optional): Maximum number of results to return (default: 10)
Account & Utility Tools
get_api_info
Get information about your API plan including credits and limits.
Parameters: None
get_account_profile
Get account profile information including membership status and credits.
Parameters: None
get_my_ip
Get your current IP address as seen from the Internet.
Parameters: None
Available Resources
shodan://host/{ip}: Information about a specific IP address
API Limitations
Some Shodan API endpoints require a paid membership. The following features are only available with a paid Shodan API key:
- Search functionality (search_shodan, scan_network_range, get_ssl_info, search_iot_devices, get_host_count, get_domain_info)
- Network scanning
- SSL certificate lookup
- IoT device search
Note: CVE database functionality (get_cve_info, search_cves, get_cpes, get_newest_cves, get_kev_cves, get_cves_by_epss) is completely free and does not require a paid Shodan subscription.
License
MIT
Developed by
Citation
If you use this project in your research or publications, please cite it as follows:
author = {Bassem Abidi and Moudather Chelbi},
title = {Shodan MCP Server},
year = {2025},
howpublished = {https://github.com/Cyreslab-AI/shodan-mcp-server},
note = {Accessed: 2025-06-29}
常见问题
Shodan MCP Server 是什么?
接入 Shodan API,查询互联网暴露设备与服务详情,支持高级搜索和结果总结,增强 AI 助手在网络安全研究与威胁情报中的能力。
Shodan MCP Server 提供哪些工具?
提供 23 个工具,包括 get_host_info、search_shodan、scan_network_range 等。
相关 Skills
Slack动图
by anthropics
面向Slack的动图制作Skill,内置emoji/消息GIF的尺寸、帧率和色彩约束、校验与优化流程,适合把创意或上传图片快速做成可直接发送的Slack动画。
✎ 帮你快速做出适配 Slack 的动图,内置约束规则和校验工具,少踩上传与播放坑,做表情包和演示都更省心。
MCP构建
by anthropics
聚焦高质量 MCP Server 开发,覆盖协议研究、工具设计、错误处理与传输选型,适合用 FastMCP 或 MCP SDK 对接外部 API、封装服务能力。
✎ 想让 LLM 稳定调用外部 API,就用 MCP构建:从 Python 到 Node 都有成熟指引,帮你更快做出高质量 MCP 服务器。
接口测试套件
by alirezarezvani
扫描 Next.js、Express、FastAPI、Django REST 的 API 路由,自动生成覆盖鉴权、参数校验、错误码、分页、上传与限流场景的 Vitest 或 Pytest 测试套件。
✎ 帮你把API与集成测试自动化跑顺,减少回归漏测;能力全面,尤其适合复杂接口场景的QA团队。
相关 MCP Server
Slack 消息
编辑精选by Anthropic
Slack 是让 AI 助手直接读写你的 Slack 频道和消息的 MCP 服务器。
✎ 这个服务器解决了团队协作中需要 AI 实时获取 Slack 信息的痛点,特别适合开发团队让 Claude 帮忙汇总频道讨论或发送通知。不过,它目前只是参考实现,文档有限,不建议在生产环境直接使用——更适合开发者学习 MCP 如何集成第三方服务。
by netdata
io.github.netdata/mcp-server 是让 AI 助手实时监控服务器指标和日志的 MCP 服务器。
✎ 这个工具解决了运维人员需要手动检查系统状态的痛点,最适合 DevOps 团队让 Claude 自动分析性能数据。不过,它依赖 NetData 的现有部署,如果你没用过这个监控平台,得先花时间配置。
by d4vinci
Scrapling MCP Server 是专为现代网页设计的智能爬虫工具,支持绕过 Cloudflare 等反爬机制。
✎ 这个工具解决了爬取动态网页和反爬网站时的头疼问题,特别适合需要批量采集电商价格或新闻数据的开发者。不过,它依赖外部浏览器引擎,资源消耗较大,不适合轻量级任务。