home / mcp / shodan mcp server
Provides access to Shodan network intelligence, CVE data, DNS, and device discovery via MCP endpoints.
Configuration
View docs{
"mcpServers": {
"burtthecoder-mcp-shodan": {
"command": "node",
"args": [
"/absolute/path/to/mcp-shodan/build/index.js"
],
"env": {
"SHODAN_API_KEY": "YOUR_API_KEY"
}
}
}
}This Model Context Protocol (MCP) server lets you query the Shodan API and Shodan CVEDB to access network intelligence, vulnerability data, DNS information, and device discovery results in a structured, MCP-friendly format. It enables you to perform IP lookups, Shodan searches, CVE queries, DNS resolutions, and more, making it easy to integrate Shodan data into your tools and workflows.
You will run this MCP server through an MCP client and send tool requests to it. Start the server using one of the supported startup methods, then call its tools to retrieve network intelligence, vulnerability data, DNS results, and device details.
Prerequisites you must have before installing this MCP server:
- Node.js v20 or later
- A valid Shodan API Key
Install the server locally via npm and configure Claude Desktop or your MCP client to run the server. The following options show how to set up the MCP server using common clients or by running from source.
If you choose to run the server from source, build the project and run the built index file with Node. The command shown assumes you have cloned the repository and built the project.
1. Install the server globally via npm:
npm install -g @burtthecoder/mcp-shodan2. Add to Claude Desktop configuration with your Shodan API key. For example, the configuration below registers a Shodan MCP server under the name "shodan".
{
"mcpServers": {
"shodan": {
"command": "mcp-shodan",
"env": {
"SHODAN_API_KEY": "your-shodan-api-key"
}
}
}
}If you built from source, add a Claude Desktop configuration that runs the built index file with Node. The following shows the structure and required environment variable.
{
"mcpServers": {
"shodan": {
"command": "node",
"args": ["/absolute/path/to/mcp-shodan/build/index.js"],
"env": {
"SHODAN_API_KEY": "your-shodan-api-key"
}
}
}
}Retrieve comprehensive information about an IP address, including geolocation, open ports, running services, SSL certificates, hostnames, and cloud provider details if available
Search Shodan's database of internet-connected devices and return a summary with results including country distribution and device details
Query detailed vulnerability information from Shodan's CVEDB by CVE identifier
Resolve domain names to IP addresses using Shodan's DNS service
Perform reverse DNS lookups to find hostnames associated with IP addresses
Search for Common Platform Enumeration (CPE) entries by product name with pagination and optional count mode
Search for vulnerabilities affecting specific products or CPEs with filtering, sorting, and pagination