Shodan MCP server

Integrates with Shodan's network intelligence capabilities to provide cybersecurity analysts with tools for host information lookup, vulnerability analysis, network scanning, and security alerts management for effective reconnaissance and threat hunting.
Back to servers
Setup instructions
Provider
ADEO Cybersecurity Services
Release date
Mar 20, 2025
Language
TypeScript
Stats
14 stars

The ADEO CTI MCP Server provides access to both Shodan and VirusTotal APIs for comprehensive security analysis and threat intelligence. This server enables cybersecurity analysts to perform network intelligence operations including host information lookup, DNS operations, vulnerability analysis, network scanning, and alerts management through various tools and prompt templates.

Installation

Prerequisites

Before installing the ADEO CTI MCP Server, you'll need:

  • A Shodan API key
  • A VirusTotal API key
  • Node.js installed on your system

Setting Up

  1. Set the required environment variables:
SHODAN_API_KEY=your_shodan_api_key
VIRUSTOTAL_API_KEY=your_virustotal_api_key
  1. Install dependencies:
npm install
  1. Build the project:
npm run build
  1. Start the server:
npm start

Using Shodan Tools

Host Information

Get detailed information about a host from Shodan:

@shodan host-info ip="8.8.8.8" history=true

Parameters:

  • ip (required): IP address to look up
  • history (optional): Include historical information
  • minify (optional): Return only basic host information

DNS Operations

Resolve hostnames to IP addresses:

@shodan dns-lookup hostnames="google.com,facebook.com"

Look up hostnames for IP addresses:

@shodan reverse-dns ips="8.8.8.8,1.1.1.1"

Get DNS entries and subdomains for a domain:

@shodan domain-info domain="example.com"

Search Operations

Search Shodan for hosts matching specific criteria:

@shodan search-host query="apache country:DE" facets="org,port"

Get count of matching results without full details:

@shodan search-host-count query="product:nginx"

Network Scanning

Request Shodan to scan specific targets:

@shodan request-scan ips="192.168.1.0/24"

Check the status of a submitted scan:

@shodan get-scan-status id="SCAN_ID"

View all your submitted scans:

@shodan list-scans

Alert Management

Set up network monitoring alerts:

@shodan create-alert name="My Alert" filters={"ip":["8.8.8.8"],"port":[80,443]}

View all active alerts:

@shodan list-alerts

Vulnerability Analysis

Get CVE details:

@shodan cve-lookup cve="CVE-2021-44228"

Search vulnerabilities by CPE:

@shodan cpe-vuln-search cpe="cpe:2.3:a:apache:log4j:2.14.1:*:*:*:*:*:*:*" minCvss=7.0

Using VirusTotal Tools

URL Analysis

Analyze URLs for security threats:

@shodan virustotal-url-analysis url="https://example.com"

File Analysis

Check file hashes for malware:

@shodan virustotal-file-analysis hash="a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"

IP Analysis

Check IP reputation:

@shodan virustotal-ip-analysis ip="8.8.8.8"

Domain Analysis

Analyze domain reputation:

@shodan virustotal-domain-analysis domain="example.com"

Using MCP Server Prompts

The server provides intelligent prompts for comprehensive cybersecurity analysis workflows:

Asset Discovery

Discover and analyze internet-facing assets and infrastructure:

@shodan asset-discovery target=example.com depth=comprehensive

Vulnerability Assessment

Find vulnerabilities in internet-connected systems:

@shodan vulnerability-assessment target_type=host target=192.168.1.1 severity_threshold=high

Internet Search

Search for specific internet-connected systems or services:

@shodan internet-search search_type=product query="nginx" filters="country:US port:443"

Network Monitoring

Set up network monitoring and alerts:

@shodan network-monitoring target=192.168.0.0/24 monitor_type=vulnerability notification_threshold=high

ICS Analysis

Analyze exposed industrial control systems and SCADA devices:

@shodan ics-analysis target_type=country target=US protocol=modbus

DNS Intelligence

Analyze DNS information for domains and IP addresses:

@shodan dns-intelligence target_type=domain target=example.com include_vt_analysis=yes

Malware Analysis

Analyze files and URLs for malware and security threats:

@shodan malware-analysis target_type=file target=a94a8fe5ccb19ba61c4c0873d391e987982fbbd3

Threat Hunting

Hunt for threats across multiple data sources using combined intelligence:

@shodan threat-hunting indicator_type=ip indicator=8.8.8.8 include_vt_analysis=yes

API Rate Limits

When using the server, be aware of the following:

  • Respect Shodan API limits based on your subscription
  • VirusTotal API has separate rate limits
  • Use batch operations when possible for efficiency
  • Implement appropriate delay between requests to avoid rate limiting

The server automatically handles various error scenarios including invalid API keys, rate limiting, network issues, invalid parameters, and missing permissions.

How to install this MCP server

For Claude Code

To add this MCP server to Claude Code, run this command in your terminal:

claude mcp add-json "shodan" '{"command":"npx","args":["-y","@adeosec/mcp-shodan"]}'

See the official Claude Code MCP documentation for more details.

For Cursor

There are two ways to add an MCP server to Cursor. The most common way is to add the server globally in the ~/.cursor/mcp.json file so that it is available in all of your projects.

If you only need the server in a single project, you can add it to the project instead by creating or adding it to the .cursor/mcp.json file.

Adding an MCP server to Cursor globally

To add a global MCP server go to Cursor Settings > Tools & Integrations and click "New MCP Server".

When you click that button the ~/.cursor/mcp.json file will be opened and you can add your server like this:

{
    "mcpServers": {
        "shodan": {
            "command": "npx",
            "args": [
                "-y",
                "@adeosec/mcp-shodan"
            ]
        }
    }
}

Adding an MCP server to a project

To add an MCP server to a project you can create a new .cursor/mcp.json file or add it to the existing one. This will look exactly the same as the global MCP server example above.

How to use the MCP server

Once the server is installed, you might need to head back to Settings > MCP and click the refresh button.

The Cursor agent will then be able to see the available tools the added MCP server has available and will call them when it needs to.

You can also explicitly ask the agent to use the tool by mentioning the tool name and describing what the function does.

For Claude Desktop

To add this MCP server to Claude Desktop:

1. Find your configuration file:

  • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
  • Windows: %APPDATA%\Claude\claude_desktop_config.json
  • Linux: ~/.config/Claude/claude_desktop_config.json

2. Add this to your configuration file:

{
    "mcpServers": {
        "shodan": {
            "command": "npx",
            "args": [
                "-y",
                "@adeosec/mcp-shodan"
            ]
        }
    }
}

3. Restart Claude Desktop for the changes to take effect

Want to 10x your AI skills?

Get a free account and learn to code + market your apps using AI (with or without vibes!).

Nah, maybe later