auth-securitydeveloper-tools

Shodan

by burtthecoder

Access Shodan API and CVEDB for detailed IoT device data, shodan io searches, and the latest NVD CVE vulnerability infor

Access Shodan API and CVEDB to query IoT device data and vulnerability information.

github stars

114

Direct access to Shodan's massive IoT databaseIncludes CVE vulnerability trackingStructured output for easy analysis

best for

  • / Security researchers conducting reconnaissance
  • / DevSecOps teams monitoring infrastructure exposure
  • / Penetration testers mapping attack surfaces
  • / Network administrators auditing public-facing services

capabilities

  • / Search for IoT devices and services by IP, port, or banner
  • / Perform DNS lookups and reverse DNS operations
  • / Query vulnerability databases for CVE information
  • / Discover open ports and services on target networks
  • / Analyze device fingerprints and service banners
  • / Track security vulnerabilities across internet infrastructure

what it does

Query Shodan's database of internet-connected devices and security vulnerabilities through their API. Access network intelligence, device discovery, and CVE information for security research and reconnaissance.

about

Shodan is a community-built MCP server published by burtthecoder that provides AI assistants with tools and capabilities via the Model Context Protocol. Access Shodan API and CVEDB for detailed IoT device data, shodan io searches, and the latest NVD CVE vulnerability infor It is categorized under auth security, developer tools.

how to install

You can install Shodan in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.

license

MIT

Shodan is released under the MIT license. This is a permissive open-source license, meaning you can freely use, modify, and distribute the software.

readme

Access Shodan API and CVEDB for detailed IoT device data, shodan io searches, and the latest NVD CVE vulnerability infor

TL;DR: Query Shodan's database of internet-connected devices and security vulnerabilities through their API. Access network intelligence, device discovery, and CVE information for security research and reconnaissance.

What it does

  • Search for IoT devices and services by IP, port, or banner
  • Perform DNS lookups and reverse DNS operations
  • Query vulnerability databases for CVE information
  • Discover open ports and services on target networks
  • Analyze device fingerprints and service banners
  • Track security vulnerabilities across internet infrastructure

Best for

  • Security researchers conducting reconnaissance
  • DevSecOps teams monitoring infrastructure exposure
  • Penetration testers mapping attack surfaces
  • Network administrators auditing public-facing services

Highlights

  • Direct access to Shodan's massive IoT database
  • Includes CVE vulnerability tracking
  • Structured output for easy analysis