The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful reconnaissance capabilities through an intuitive Model Context Protocol interface. It enables efficient asset discovery, vulnerability assessment, and security monitoring through 11 consolidated analysis prompts.
ADEO Cybersecurity Services specializes in providing advanced security solutions and tools for cybersecurity professionals. This ADEO CTI MCP Server is part of our commitment to enhancing cybersecurity capabilities through innovative tools and integrations with industry-leading security data sources.
ip
(required): IP address to look uphistory
(optional): Include historical informationminify
(optional): Return only basic host informationshell
@shodan host-info ip="8.8.8.8" history=true
hostnames
(required): Comma-separated list of hostnames to resolveExample:
shell
@shodan dns-lookup hostnames="google.com,facebook.com"
reverse-dns
ips
(required): Comma-separated list of IP addressesExample:
shell
@shodan reverse-dns ips="8.8.8.8,1.1.1.1"
domain-info
domain
(required): Domain name to look upshell
@shodan domain-info domain="example.com"
query
(required): Shodan search queryfacets
(optional): Comma-separated list of properties for summary informationpage
(optional): Page number for resultsExample:
shell
@shodan search-host query="apache country:DE" facets="org,port"
search-host-count
query
(required): Shodan search queryfacets
(optional): Comma-separated list of facetsshell
@shodan search-host-count query="product:nginx"
No parameters required
list-search-filters
No parameters required
search-tokens
query
(required): Shodan search query to analyzeshell
@shodan search-tokens query="apache port:80 country:DE"
list-ports
list-protocols
request-scan
ips
(required): Comma-separated list of IPs or networks in CIDR notationshell
@shodan request-s scan ips="192.168.1.0/24"
get-scan-status
id
(required): The unique scan IDshell
@shodan get-scan-status id="SCAN_ID"
list-scans
list-triggers
create-alert
name
(required): Alert namefilters
(required): Alert filtersexpires
(optional): Expiration time in secondsshell
@shodan create-alert name="My Alert" filters={"ip":["8.8.8.8"],"port":[80,443]}
get-alert-info
id
(required): Alert IDshell
@shodan get-alert-info id="ALERT_ID"
delete-alert
id
(required): Alert ID to deleteedit-alert
id
(required): Alert IDname
(optional): New alert namefilters
(optional): Updated filterslist-alerts
list-queries
page
(optional): Results page numbersort
(optional): Sort by "votes" or "timestamp"order
(optional): "asc" or "desc"search-queries
query
(required): Search termpage
(optional): Page numberlist-query-tags
size
(optional): Number of tags to returnget-profile
get-api-info
get-billing
get-http-headers
get-my-ip
cve-lookup
cve
(required): CVE ID (e.g., CVE-2021-44228)shell
@shodan cve-lookup cve="CVE-2021-44228"
cpe-vuln-search
cpe
(required): CPE 2.3 stringminCvss
(optional): Minimum CVSS scoremaxResults
(optional): Result limitshell
@shodan cpe-vuln-search cpe="cpe:2.3:a:apache:log4j:2.14.1:*:*:*:*:*:*:*" minCvss=7.0
url
(required): Target URLshell
@shodan virustotal-url-analysis url="https://example.com"
hash
(required): MD5/SHA-1/SHA-256 hashshell
@shodan virustotal-file-analysis hash="a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"
ip
(required): Target IP addressshell
@shodan virustotal-ip-analysis ip="8.8.8.8"
domain
(required): Target domainshell
@shodan virustotal-domain-analysis domain="example.com"
The server provides a set of intelligent prompts for comprehensive cybersecurity analysis workflows:
asset-discovery
target
(required): Domain, IP address, or organization name to analyzedepth
(optional): Depth of reconnaissance ("basic" or "comprehensive")shell
@shodan asset-discovery target=example.com depth=comprehensive
vulnerability-assessment
target_type
(required): Type of target to analyze ("host", "domain", "cpe", "cve")target
(required): Target identifier (IP, domain, CPE string, or CVE ID)severity_threshold
(optional): Minimum severity threshold ("all", "medium", "high", "critical")include_vt_analysis
(optional): Include VirusTotal security analysis ("yes" or "no")shell
@shodan vulnerability-assessment target_type=host target=192.168.1.1 severity_threshold=high
internet-search
search_type
(required): Type of search ("service", "product", "vulnerability", "organization", "custom")filters
(optional): Additional Shodan filters to applyshell
@shodan internet-search search_type=product query="nginx" filters="country:US port:443"
network-monitoring
target
(required): IP, network range, or domain to monitormonitor_type
(required): Type of changes to monitor ("new-service", "vulnerability", "certificate", "custom")notification_threshold
(optional): Minimum severity for notifications ("all", "high", "critical")shell
@shodan network-monitoring target=192.168.0.0/24 monitor_type=vulnerability notification_threshold=high
ics-analysis
target_type
(required): Type of target to analyze ("ip", "network", "product", "country")target
(required): Target identifier (IP, network range, product name, or country code)protocol
(optional): Specific protocol to focus onshell
@shodan ics-analysis target_type=country target=US protocol=modbus
target_type
(required): Type of target to analyze ("domain", "ip", "hostname")target
(required): Domain name, IP address, or hostname to analyzeinclude_history
(optional): Include historical information ("yes" or "no")include_vt_analysis
(optional): Include VirusTotal security analysis ("yes" or "no")shell
@shodan dns-intelligence target_type=domain target=example.com include_vt_analysis=yes
service_type
(required): Type of service ("database", "webcam", "industrial", "remote-access", "custom")target_scope
(required): Scope of analysis ("global", "country", "organization", "ip-range")target
(optional): Target value based on scopecustom_query
(optional): Custom query for the 'custom' service typeinclude_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")shell
@shodan service-exposure service_type=database target_scope=country target=US
info_type
(required): Type of information to retrieve ("profile", "api", "usage", "all")shell
@shodan account-status info_type=all
action
(required): Scan action to perform ("initiate", "check", "list")target
(optional): Target IPs or networks to scan (comma-separated)scan_id
(optional): Scan ID for checking statusshell
@shodan scan-management action=initiate target=192.168.1.0/24
action
(required): Type of analysis ("analyze-query", "explore-facets", "examine-filters", "saved-queries")query
(optional): Query to analyze (for analyze-query action)shell
@shodan search-analytics action=analyze-query query="apache country:DE port:443"
vuln_type
(required): Type of vulnerability to hunt ("cve", "product", "service", "custom")target
(required): Vulnerability target (CVE ID, product name, service type)scope
(optional): Scope of the search ("global", "regional", "industry")scope_value
(optional): Value for scope (country, industry)shell
@shodan vulnerability-hunting vuln_type=cve target=CVE-2021-44228 scope=regional scope_value=US
target_type
(required): Type of target to analyze ("file" or "url")target
(required): File hash (MD5/SHA1/SHA256) or URL to analyzeinclude_relationships
(optional): Include relationship data ("yes" or "no")shell
@shodan malware-analysis target_type=file target=a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
target_type
(required): Type of target to analyze ("ip" or "domain")target
(required): IP address or domain to analyzedepth
(optional): Analysis depth ("basic" or "comprehensive")include_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")shell
@shodan infrastructure-analysis target_type=domain target=example.com depth=comprehensive
indicator_type
(required): Type of indicator ("ip", "domain", "url", "file")indicator
(required): Indicator value to investigateinclude_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")shell
@shodan threat-hunting indicator_type=ip indicator=8.8.8.8 include_vt_analysis=yes