SHODAN MCP SERVER TOOLS

23 tools from the Shodan MCP Server MCP Server, categorised by risk level.

View the Shodan MCP Server policy →

READ TOOLS

22
dns_lookup Resolve hostnames to IP addresses using DNS lookup get_account_profile Get account profile information including membership status and credits get_api_info Get information about your API plan including credits and limits get_cpes Get Common Platform Enumeration (CPE) information for products get_cve_info Get detailed information about a specific CVE get_cves_by_epss Get CVEs sorted by EPSS score (Exploit Prediction Scoring System) get_domain_info Get comprehensive domain information including subdomains and DNS records get_host_count Get the count of hosts matching a search query without consuming query credits 2/5 get_host_info Get detailed information about a specific IP address get_kev_cves Get Known Exploited Vulnerabilities (KEV) from CISA get_my_ip Get your current IP address as seen from the Internet get_newest_cves Get the newest vulnerabilities from the CVE database get_ssl_info Get SSL certificate information for a domain list_ports List all ports that Shodan crawls on the Internet list_protocols List all protocols that can be used when performing on-demand Internet scans list_search_facets List all available search facets that can be used with Shodan queries list_search_filters List all available search filters that can be used in Shodan queries reverse_dns_lookup Get hostnames for IP addresses using reverse DNS lookup scan_network_range Scan a network range (CIDR notation) for devices search_cves Search for vulnerabilities with various filters search_iot_devices Search for specific types of IoT devices search_shodan Search Shodan's database for devices and services 2/5

EXECUTE TOOLS

1
How many tools does the Shodan MCP Server MCP server have? +

The Shodan MCP Server MCP server exposes 23 tools across 2 categories: Read, Execute.

How do I enforce policies on Shodan MCP Server tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Shodan MCP Server server.

What risk categories do Shodan MCP Server tools fall into? +

Shodan MCP Server tools are categorised as Read (22), Execute (1). Each category has a recommended default policy.

Enforce policies on Shodan MCP Server

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.