shodan-mcp
by Vorota-ai·★ 19·Score 43
An MCP server providing 20 tools for Shodan reconnaissance, vulnerability intelligence, and DNS analysis.
Overview
The Shodan MCP server integrates Shodan's internet intelligence database directly into AI clients like Claude, Cursor, and VS Code. It offers both free tools that require no API key and premium tools for comprehensive reconnaissance. The server provides structured output using Pydantic models and includes input validation to ensure secure operations. All queries are passive, meaning no packets are sent directly to target systems.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose this server when you need internet reconnaissance and vulnerability intelligence integrated directly into your AI workflow, especially for security research.
When NOT to choose this
Avoid this if you need active scanning capabilities (this is passive-only), have concerns about vendor lock-in to Shodan, or require more comprehensive vulnerability databases.
Tools this server exposes
12 tools extracted from the READMEshodan-cve-lookupLook up any CVE -- CVSS v3 scores, EPSS exploit prediction, references, affected CPEs
shodan-search-cvesSearch CVEs with filters -- CISA KEV catalog, EPSS sorting, date ranges
shodan-search-cpesSearch CPE identifiers by product name (e.g., 'apache', 'nginx')
shodan-internetdb-lookupFast free IP intelligence -- open ports, vulns, hostnames, CPEs, tags
shodan-ip-lookupFull IP reconnaissance -- ports, services, banners, geolocation, vulns, ISP/org, ASN
shodan-searchSearch Shodan's database of billions of devices with powerful query syntax
shodan-dns-resolveResolve hostnames to IP addresses
shodan-domain-infoDomain reconnaissance -- subdomains, DNS records, tags
shodan-honeypot-scoreDetect if an IP is a honeypot (0.0 = real, 1.0 = honeypot)
shodan-api-infoCheck API key usage -- plan type, remaining credits
shodan-my-ipGet your external IP address as seen by Shodan
shodan-list-filtersList available search filters
Comparable tools
Installation
Docker (recommended)
docker build -t shodan-mcp https://github.com/vorotaai/shodan-mcp.gitUsing uv
git clone https://github.com/vorotaai/shodan-mcp.git
cd shodan-mcp
uv sync --all-groups
shodan-mcpUsing pip
git clone https://github.com/vorotaai/shodan-mcp.git
cd shodan-mcp
pip install .
shodan-mcpClaude Desktop Configuration
Add to claude_desktop_config.json:
{
"mcpServers": {
"shodan-mcp": {
"command": "docker",
"args": ["run", "--rm", "-i", "-e", "SHODAN_API_KEY", "shodan-mcp"],
"env": {
"SHODAN_API_KEY": "your-api-key-here"
}
}
}
}FAQ
- Do I need a Shodan API key?
- Not to get started. 4 tools work immediately with no key: CVE lookup, CVE search, CPE search, and InternetDB. A free API key unlocks the remaining 16 tools.
- Is it safe?
- Yes. All queries are passive (no packets to targets), inputs are validated, and API keys are never exposed in error messages.
Compare shodan-mcp with
Last updated · Auto-generated from public README + GitHub signals.