MCP cover image
Shodan-MCP-Server-Sensector logo
Public

Shodan-MCP-Server-Sensector

See in Github
2025-03-27

这是一个模型上下文协议(MCP)服务器,可提供对Shodan API的访问。它使您可以通过编程方式查询Shodan了解有关设备,漏洞等的信息。

1

Github Watches

0

Github Forks

0

Github Stars

Shodan MCP Server

A Model Context Protocol (MCP) server that provides access to Shodan's internet scanning capabilities through a standardized interface.

Overview

This server implements the Model Context Protocol to expose Shodan's powerful internet scanning and reconnaissance capabilities. It provides a standardized interface for querying Shodan's database of internet-connected devices, services, and vulnerabilities.

Features

  • Search Capabilities: Query Shodan's database using advanced search filters
  • DNS Lookup: Resolve domain names and get detailed DNS information
  • CVE Information: Get detailed information about Common Vulnerabilities and Exposures
  • Get Vulnerabilities: Get detailed infor Vulnerabilities related to an IP address
  • Standardized Interface: Uses MCP protocol for consistent communication
  • Environment Variable Support: Secure API key management through environment variables

Prerequisites

  • Node.js (v14 or higher)
  • npm (v6 or higher)
  • Shodan API key

Installation

  1. Clone the repository:

    git clone https://github.com/X3r0K/Shodan-MCP-Server-Inspector.git
    cd shodan-mcp-server-Inspector
    
  2. Install dependencies:

    npm install
    
  3. Create a .env.local file in the root directory and add your Shodan API key:

    SHODAN_API_KEY=your_api_key_here
    

Usage

Starting the Server

  1. Build the server:

    npm run build
    
  2. Start the server:

    node build/index.js
    

Available Tools

  1. Search Tool

    • Query: Search for devices and services using Shodan's search syntax
    • Example: log4j country:US city:Atlanta
    • Returns: List of matching devices with detailed information
  2. DNS Lookup Tool

    • Query: Domain name to resolve
    • Example: example.com
    • Returns: DNS records and related information
  3. CVE Info Tool

    • Query: CVE identifier
    • Example: CVE-2021-44228
    • Returns: Detailed vulnerability information

Example Queries

// Search for Log4j vulnerable systems in the US
{
  "query": "log4j country:US"
}

// DNS lookup for a domain
{
  "query": "example.com"
}

// Get CVE information
{
  "query": "CVE-2021-44228"
}

Using the MCP Inspector

image

You can use the MCP inspector to interact with the server directly:

  1. Install the MCP inspector:
npm install -g @modelcontextprotocol/inspector
  1. Run the inspector with your server:
npx @modelcontextprotocol/inspector build/index.js

The inspector provides an interactive interface to:

  • Test all available tools
  • View tool documentation
  • Debug server responses
  • Monitor server status

Environment Variables

  • SHODAN_API_KEY: Your Shodan API key (required)
  • PORT: Server port (optional, defaults to 3000)
  • LOG_LEVEL: Logging level (optional, defaults to 'info')

Error Handling

The server implements comprehensive error handling for:

  • Invalid API keys
  • Rate limiting
  • Network issues
  • Invalid queries
  • Server errors

Security Considerations

  1. API Key Protection:

    • Never commit API keys to version control
    • Use environment variables for sensitive data
    • Rotate API keys regularly
  2. Rate Limiting:

    • Respect Shodan's API rate limits
    • Implement client-side rate limiting
  3. Data Privacy:

    • Filter sensitive information from responses
    • Implement access controls as needed

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

  • Shodan for providing the API
  • Model Context Protocol team for the MCP specification

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • Bora Yalcin
  • Evaluator for marketplace product descriptions, checks for relevancy and keyword stuffing.

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Yusuf Emre Yeşilyurt
  • I find academic articles and books for research and literature reviews.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • Carlos Ferrin
  • Encuentra películas y series en plataformas de streaming.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Alexandru Strujac
  • Efficient thumbnail creator for YouTube videos

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • lumpenspace
  • Take an adjectivised noun, and create images making it progressively more adjective!

  • apappascs
  • 发现市场上最全面,最新的MCP服务器集合。该存储库充当集中式枢纽,提供了广泛的开源和专有MCP服务器目录,并提供功能,文档链接和贡献者。

  • ShrimpingIt
  • MCP系列GPIO Expander的基于Micropython I2C的操作,源自ADAFRUIT_MCP230XX

  • modelcontextprotocol
  • 模型上下文协议服务器

  • huahuayu
  • 统一的API网关,用于将多个Etherscan样区块链Explorer API与对AI助手的模型上下文协议(MCP)支持。

  • Mintplex-Labs
  • 带有内置抹布,AI代理,无代理构建器,MCP兼容性等的多合一桌面和Docker AI应用程序。

    Reviews

    3 (1)
    Avatar
    user_YganBJmF
    2025-04-16

    The Shodan-MCP-Server-Inspector by X3r0K is an incredible tool for anyone using the MCP application. Its ability to inspect and analyze server details with ease is unmatched. The seamless integration with Shodan enhances its usability, making server management and security checks a breeze. Highly recommended for anyone needing robust server inspection capabilities. Find out more here: https://github.com/X3r0K/Shodan-MCP-Server-Inspector