7 tools from the Shodan Server MCP Server, categorised by risk level.
View the Shodan Server policy →cpe_lookup Search for Common Platform Enumeration (CPE) entries by product name in Shodan's CVEDB. Supports pagination and can return either full CPE details ... cve_lookup Query detailed vulnerability information from Shodan's CVEDB. Returns comprehensive CVE details including CVSS scores (v2/v3), EPSS probability and... cves_by_product Search for vulnerabilities affecting specific products or CPEs. Supports filtering by KEV status, sorting by EPSS score, date ranges, and paginatio... dns_lookup Resolve domain names to IP addresses using Shodan's DNS service. Supports batch resolution of multiple hostnames in a single query. Returns IP addr... ip_lookup Retrieve comprehensive information about an IP address, including geolocation, open ports, running services, SSL certificates, hostnames, and cloud... reverse_dns_lookup Perform reverse DNS lookups to find hostnames associated with IP addresses. Supports batch lookups of multiple IP addresses in a single query. Retu... shodan_search Search Shodan's database of internet-connected devices. Returns detailed information about matching devices including services, vulnerabilities, an... 2/5 The Shodan Server MCP server exposes 7 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Shodan Server server.
Shodan Server tools are categorised as Read (7). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept