Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Shodan MCP ServerFind hosts in the US vulnerable to CVE-2021-44228"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Shodan MCP Server (stdio)
Model Context Protocol (MCP) server integration for Shodan API, enabling Claude AI to perform comprehensive security reconnaissance, vulnerability assessment, and threat intelligence gathering.
Features
Comprehensive Host Search: Search Shodan's database of internet-connected devices
Detailed Host Information: Get in-depth data about specific IP addresses
DNS Operations: Forward and reverse DNS lookups
Vulnerability Discovery: Find hosts with specific CVEs and security issues
Exploit Database: Search for available exploits
API Management: Monitor query credits and usage
Protocol/Port Information: Access Shodan's supported protocols and ports
Prerequisites
Node.js 18.0.0 or higher
Shodan API key (Get one here)
Claude Desktop or compatible MCP client
Installation
1. Clone and Install Dependencies
2. Get Shodan API Key
3. Configure Environment
Create a .env file:
4. Configure Claude Desktop
Add to your Claude Desktop configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
5. Install Skills (Optional but Recommended)
Copy skills to your Claude skills directory:
Available Tools
shodan_host_search
Search Shodan for hosts matching a query.
Parameters:
query(required): Shodan search queryfacets(optional): Comma-separated facets for aggregationpage(optional): Page number for pagination
Example:
shodan_host_info
Get detailed information about a specific IP address.
Parameters:
ip(required): IP address to lookuphistory(optional): Include historical data
Example:
shodan_dns_lookup
Resolve domain names to IP addresses.
Parameters:
hostnames(required): Array of hostnames
Example:
shodan_dns_reverse
Perform reverse DNS lookup on IP addresses.
Parameters:
ips(required): Array of IP addresses
Example:
shodan_api_info
Get information about your API plan and remaining credits.
Parameters: None
shodan_exploits_search
Search the Shodan Exploits database.
Parameters:
query(required): Search queryfacets(optional): Facets for aggregationpage(optional): Page number
Example:
shodan_ports
Get list of ports that Shodan crawls.
Parameters: None
shodan_protocols
Get supported protocols for querying.
Parameters: None
shodan_count
Get total count of results for a query without returning data.
Parameters:
query(required): Shodan search queryfacets(optional): Facets for aggregated counts
shodan_query_search
Search for saved community queries.
Parameters:
query(required): Search termpage(optional): Page number
shodan_query_tags
Get popular tags for saved queries.
Parameters:
size(optional): Number of tags to return (default: 10)
Shodan Query Syntax
Basic Filters
Vulnerability Filters
HTTP Filters
SSL Filters
Combining Filters
Usage Examples
1. Asset Discovery
2. Vulnerability Assessment
3. Threat Intelligence
4. DNS Investigation
5. Exploit Research
Skills
Three comprehensive skills are included:
1. shodan-recon
Perform reconnaissance and asset discovery. Automates the process of:
DNS enumeration
Asset discovery
Port and service enumeration
Detailed host analysis
Comprehensive reporting
2. shodan-vuln-scan
Identify and assess vulnerabilities. Includes:
CVE discovery
Exploit availability checking
Risk assessment
Remediation recommendations
Vulnerability matrix generation
3. shodan-threat-intel
Gather threat intelligence. Capabilities:
C2 infrastructure tracking
Phishing infrastructure identification
Malware distribution point discovery
IOC enrichment
Threat actor tracking
Temporal analysis
Development
Running in Development
Testing Tools
Adding New Tools
Add tool definition to
TOOLSarray insrc/index.jsAdd case handler in
CallToolRequestSchemahandlerUpdate README with new tool documentation