Skip to main content
Glama
duksh

PeerGlass

by duksh

peerglass_threat_intel

Read-onlyIdempotent

Analyze IP addresses for security threats using Shodan and GreyNoise intelligence, identifying open ports, CVEs, malicious activity, and calculating risk scores.

Instructions

Passive threat intelligence for an IP address from two sources:

  1. Shodan InternetDB (always available, no API key required):

    • Open ports detected via internet scanning

    • CVE identifiers for detected services

    • Reverse DNS hostnames

    • Shodan tags (cdn, vpn, tor-exit, etc.)

  2. GreyNoise Community (requires GREYNOISE_API_KEY env var):

    • Classification: malicious / benign / unknown

    • RIOT flag: trusted service (Google, Amazon, etc.)

    • Noise flag: benign internet background scanner

    • Named actor or service attribution

Produces an aggregated risk score (0–100) and level (LOW / MEDIUM / HIGH / CRITICAL).

Args: params (ThreatIntelInput): - ip (str): IPv4 address (e.g. '1.2.3.4') - response_format (str): 'markdown' (default) or 'json'

Returns: str: Open ports, CVEs, GreyNoise classification, and risk assessment.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
paramsYes

Output Schema

TableJSON Schema
NameRequiredDescriptionDefault
resultYes

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/duksh/peerglass'

If you have feedback or need assistance with the MCP directory API, please join our Discord server