ADEO CTI Shodan VirusTotal
STDIOMCP server providing Shodan and VirusTotal API access for comprehensive security analysis.
MCP server providing Shodan and VirusTotal API access for comprehensive security analysis.
Developed by ADEO Cybersecurity Services
A Model Context Protocol (MCP) server that provides access to both Shodan and VirusTotal APIs for comprehensive security analysis and threat intelligence. This server, developed and maintained by ADEO Cybersecurity Services, enables cybersecurity analysts to perform network intelligence operations including host information lookup, DNS operations, vulnerability analysis, network scanning, and alerts management through a collection of tools and prompt templates.
ADEO Cybersecurity Services specializes in providing advanced security solutions and tools for cybersecurity professionals. This ADEO CTI MCP Server is part of our commitment to enhancing cybersecurity capabilities through innovative tools and integrations with industry-leading security data sources.
ip
(required): IP address to look uphistory
(optional): Include historical informationminify
(optional): Return only basic host information@shodan host-info ip="8.8.8.8" history=true
dns-lookup
hostnames
(required): Comma-separated list of hostnames to resolve@shodan dns-lookup hostnames="google.com,facebook.com"
reverse-dns
ips
(required): Comma-separated list of IP addresses@shodan reverse-dns ips="8.8.8.8,1.1.1.1"
domain-info
domain
(required): Domain name to look up@shodan domain-info domain="example.com"
search-host
query
(required): Shodan search queryfacets
(optional): Comma-separated list of properties for summary informationpage
(optional): Page number for results@shodan search-host query="apache country:DE" facets="org,port"
search-host-count
query
(required): Shodan search queryfacets
(optional): Comma-separated list of facets@shodan search-host-count query="product:nginx"
list-search-facets
list-search-filters
search-tokens
query
(required): Shodan search query to analyze@shodan search-tokens query="apache port:80 country:DE"
list-ports
list-protocols
request-scan
ips
(required): Comma-separated list of IPs or networks in CIDR notation@shodan request-scan ips="192.168.1.0/24"
get-scan-status
id
(required): The unique scan ID@shodan get-scan-status id="SCAN_ID"
list-scans
list-triggers
create-alert
name
(required): Alert namefilters
(required): Alert filtersexpires
(optional): Expiration time in seconds@shodan create-alert name="My Alert" filters={"ip":["8.8.8.8"],"port":[80,443]}
get-alert-info
id
(required): Alert ID@shodan get-alert-info id="ALERT_ID"
delete-alert
id
(required): Alert ID to deleteedit-alert
id
(required): Alert IDname
(optional): New alert namefilters
(optional): Updated filterslist-alerts
list-queries
page
(optional): Results page numbersort
(optional): Sort by "votes" or "timestamp"order
(optional): "asc" or "desc"search-queries
query
(required): Search termpage
(optional): Page numberlist-query-tags
size
(optional): Number of tags to returnget-profile
get-api-info
get-billing
get-http-headers
get-my-ip
cve-lookup
cve
(required): CVE ID (e.g., CVE-2021-44228)@shodan cve-lookup cve="CVE-2021-44228"
cpe-vuln-search
cpe
(required): CPE 2.3 stringminCvss
(optional): Minimum CVSS scoremaxResults
(optional): Result limit@shodan cpe-vuln-search cpe="cpe:2.3:a:apache:log4j:2.14.1:*:*:*:*:*:*:*" minCvss=7.0
url
(required): Target URL@shodan virustotal-url-analysis url="https://example.com"
hash
(required): MD5/SHA-1/SHA-256 hash@shodan virustotal-file-analysis hash="a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"
ip
(required): Target IP address@shodan virustotal-ip-analysis ip="8.8.8.8"
domain
(required): Target domain@shodan virustotal-domain-analysis domain="example.com"
The server provides a set of intelligent prompts for comprehensive cybersecurity analysis workflows:
asset-discovery
target
(required): Domain, IP address, or organization name to analyzedepth
(optional): Depth of reconnaissance ("basic" or "comprehensive")@shodan asset-discovery target=example.com depth=comprehensive
vulnerability-assessment
target_type
(required): Type of target to analyze ("host", "domain", "cpe", "cve")target
(required): Target identifier (IP, domain, CPE string, or CVE ID)severity_threshold
(optional): Minimum severity threshold ("all", "medium", "high", "critical")include_vt_analysis
(optional): Include VirusTotal security analysis ("yes" or "no")@shodan vulnerability-assessment target_type=host target=192.168.1.1 severity_threshold=high
internet-search
search_type
(required): Type of search ("service", "product", "vulnerability", "organization", "custom")query
(required): Search terms or Shodan query stringfilters
(optional): Additional Shodan filters to apply@shodan internet-search search_type=product query="nginx" filters="country:US port:443"
network-monitoring
target
(required): IP, network range, or domain to monitormonitor_type
(required): Type of changes to monitor ("new-service", "vulnerability", "certificate", "custom")notification_threshold
(optional): Minimum severity for notifications ("all", "high", "critical")@shodan network-monitoring target=192.168.0.0/24 monitor_type=vulnerability notification_threshold=high
ics-analysis
target_type
(required): Type of target to analyze ("ip", "network", "product", "country")target
(required): Target identifier (IP, network range, product name, or country code)protocol
(optional): Specific protocol to focus on@shodan ics-analysis target_type=country target=US protocol=modbus
dns-intelligence
target_type
(required): Type of target to analyze ("domain", "ip", "hostname")target
(required): Domain name, IP address, or hostname to analyzeinclude_history
(optional): Include historical information ("yes" or "no")include_vt_analysis
(optional): Include VirusTotal security analysis ("yes" or "no")@shodan dns-intelligence target_type=domain target=example.com include_vt_analysis=yes
service-exposure
service_type
(required): Type of service ("database", "webcam", "industrial", "remote-access", "custom")target_scope
(required): Scope of analysis ("global", "country", "organization", "ip-range")target
(optional): Target value based on scopecustom_query
(optional): Custom query for the 'custom' service typeinclude_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")@shodan service-exposure service_type=database target_scope=country target=US
account-status
info_type
(required): Type of information to retrieve ("profile", "api", "usage", "all")@shodan account-status info_type=all
scan-management
action
(required): Scan action to perform ("initiate", "check", "list")target
(optional): Target IPs or networks to scan (comma-separated)scan_id
(optional): Scan ID for checking status@shodan scan-management action=initiate target=192.168.1.0/24
search-analytics
action
(required): Type of analysis ("analyze-query", "explore-facets", "examine-filters", "saved-queries")query
(optional): Query to analyze (for analyze-query action)@shodan search-analytics action=analyze-query query="apache country:DE port:443"
vulnerability-hunting
vuln_type
(required): Type of vulnerability to hunt ("cve", "product", "service", "custom")target
(required): Vulnerability target (CVE ID, product name, service type)scope
(optional): Scope of the search ("global", "regional", "industry")scope_value
(optional): Value for scope (country, industry)@shodan vulnerability-hunting vuln_type=cve target=CVE-2021-44228 scope=regional scope_value=US
malware-analysis
target_type
(required): Type of target to analyze ("file" or "url")target
(required): File hash (MD5/SHA1/SHA256) or URL to analyzeinclude_relationships
(optional): Include relationship data ("yes" or "no")@shodan malware-analysis target_type=file target=a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
infrastructure-analysis
target_type
(required): Type of target to analyze ("ip" or "domain")target
(required): IP address or domain to analyzedepth
(optional): Analysis depth ("basic" or "comprehensive")include_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")@shodan infrastructure-analysis target_type=domain target=example.com depth=comprehensive
threat-hunting
indicator_type
(required): Type of indicator ("ip", "domain", "url", "file")indicator
(required): Indicator value to investigateinclude_vt_analysis
(optional): Include VirusTotal analysis ("yes" or "no")@shodan threat-hunting indicator_type=ip indicator=8.8.8.8 include_vt_analysis=yes
Set required environment variables:
SHODAN_API_KEY=your_shodan_api_key VIRUSTOTAL_API_KEY=your_virustotal_api_key
Install dependencies:
npm install
Build the project:
npm run build
Start the server:
npm start
The server handles various error scenarios:
Copyright © 2024 ADEO Cybersecurity Services. All rights reserved.