Integrates with Shodan's network intelligence capabilities to provide cybersecurity analysts with tools for host informa...
Created byApr 23, 2025
ADEO CTI MCP Server
Developed by ADEO Cybersecurity Services
A Model Context Protocol (MCP) server that provides access to both Shodan and VirusTotal APIs for comprehensive security analysis and threat intelligence. This server, developed and maintained by ADEO Cybersecurity Services, enables cybersecurity analysts to perform network intelligence operations including host information lookup, DNS operations, vulnerability analysis, network scanning, and alerts management through a collection of tools and prompt templates.
About ADEO Cybersecurity Services
ADEO Cybersecurity Services specializes in providing advanced security solutions and tools for cybersecurity professionals. This ADEO CTI MCP Server is part of our commitment to enhancing cybersecurity capabilities through innovative tools and integrations with industry-leading security data sources.
Features
Shodan Capabilities
Detailed information about IP addresses including open ports, services, and location data
DNS lookup and reverse DNS operations
Domain information retrieval including subdomains
Advanced search capabilities with facets and filters
On-demand network scanning
Network alerts and monitoring
Vulnerability analysis and CVE tracking
Account and API management
Historical data access
VirusTotal Integration
Malware analysis and detection
URL scanning and reputation checking
IP address reputation analysis
Domain threat intelligence
File hash analysis
Comprehensive threat reports
Combined Analysis Features
Unified security analysis using both platforms
Correlated threat intelligence
Integrated vulnerability assessment
Cross-platform data enrichment
Enhanced Functionality
Rich data formatting and presentation
Intelligent workflow automation
Pre-built analysis templates
Custom search filters
Batch processing capabilities
Real-time monitoring
Tools
Shodan Tools
Host Information
**host-info**
- Get detailed information about a host from Shodan
- Parameters:
- `ip` (required): IP address to look up
- `history` (optional): Include historical information
- `minify` (optional): Return only basic host information
- Example:
```
@shodan host-info ip="8.8.8.8" history=true
```
DNS Operations
**dns-lookup**
- Resolve hostnames to IP addresses
- Parameters:
- `hostnames` (required): Comma-separated list of hostnames to resolve
- Example:
```
@shodan dns-lookup hostnames="google.com,facebook.com"
```
**reverse-dns**
- Look up hostnames for IP addresses
- Parameters:
- `ips` (required): Comma-separated list of IP addresses
- Example:
```
@shodan reverse-dns ips="8.8.8.8,1.1.1.1"
```
**domain-info**
- Get DNS entries and subdomains for a domain
- Parameters:
- `domain` (required): Domain name to look up
- Example:
```
@shodan domain-info domain="example.com"
```
Search Operations
**search-host**
- Search Shodan for hosts matching specific criteria
- Parameters:
- `query` (required): Shodan search query
- `facets` (optional): Comma-separated list of properties for summary information
- `page` (optional): Page number for results
- Example:
```
@shodan search-host query="apache country:DE" facets="org,port"
```
**search-host-count**
- Get count of matching results without full details
- Parameters:
- `query` (required): Shodan search query
- `facets` (optional): Comma-separated list of facets
- Example:
```
@shodan search-host-count query="product:nginx"
```
Search Utilities
**list-search-facets**
- List all available search facets
- No parameters required
**list-search-filters**
- List all filters that can be used when searching
- No parameters required
**search-tokens**
- Analyze and break down search query components
- Parameters:
- `query` (required): Shodan search query to analyze
- Example:
```
@shodan search-tokens query="apache port:80 country:DE"
```
Network Information
**list-ports**
- List all ports that Shodan is actively scanning
- No parameters required
**list-protocols**
- List all protocols available for scanning
- No parameters required
Scanning Operations
**request-scan**
- Request Shodan to scan specific targets
- Parameters:
- `ips` (required): Comma-separated list of IPs or networks in CIDR notation
- Example:
```
@shodan request-scan ips="192.168.1.0/24"
```
**get-scan-status**
- Check the status of a submitted scan
- Parameters:
- `id` (required): The unique scan ID
- Example:
```
@shodan get-scan-status id="SCAN_ID"
```
**list-scans**
- View all your submitted scans
- No parameters required
Alert Management
**list-triggers**
- List available network alert triggers
- No parameters required
**create-alert**
- Set up network monitoring alerts
- Parameters:
- `name` (required): Alert name
- `filters` (required): Alert filters
- `expires` (optional): Expiration time in seconds
- Example:
```
@shodan create-alert name="My Alert" filters={"ip":["8.8.8.8"],"port":[80,443]}
```
**get-alert-info**
- Get details about a specific alert
- Parameters:
- `id` (required): Alert ID
- Example:
```
@shodan get-alert-info id="ALERT_ID"
```
**delete-alert**
- Remove an existing alert
- Parameters:
- `id` (required): Alert ID to delete
**edit-alert**
- Modify an existing alert
- Parameters:
- `id` (required): Alert ID
- `name` (optional): New alert name
- `filters` (optional): Updated filters
**list-alerts**
- View all active alerts
- No parameters required
Query Management
**list-queries**
- View saved search queries
- Parameters:
- `page` (optional): Results page number
- `sort` (optional): Sort by "votes" or "timestamp"
- `order` (optional): "asc" or "desc"
**search-queries**
- Search through saved queries
- Parameters:
- `query` (required): Search term
- `page` (optional): Page number
**list-query-tags**
- View popular query tags
- Parameters:
- `size` (optional): Number of tags to return
Account Management
**get-profile**
- View account information
- No parameters required
**get-api-info**
- Check API subscription status
- No parameters required
**get-billing**
- View billing information
- No parameters required
**get-http-headers**
- Check your request headers
- No parameters required
**get-my-ip**
- View your current IP address
- No parameters required
The server provides a set of intelligent prompts for comprehensive cybersecurity analysis workflows:
Asset Discovery
**Name**: `asset-discovery`
**Description**: Discover and analyze internet-facing assets and infrastructure
**Parameters**:
- `target` (required): Domain, IP address, or organization name to analyze
- `depth` (optional): Depth of reconnaissance ("basic" or "comprehensive")
**Description**: Analyze exposed industrial control systems and SCADA devices
**Parameters**:
- `target_type` (required): Type of target to analyze ("ip", "network", "product", "country")
- `target` (required): Target identifier (IP, network range, product name, or country code)
- `protocol` (optional): Specific protocol to focus on
**Description**: Analyze DNS information for domains and IP addresses
**Parameters**:
- `target_type` (required): Type of target to analyze ("domain", "ip", "hostname")
- `target` (required): Domain name, IP address, or hostname to analyze
- `include_history` (optional): Include historical information ("yes" or "no")
- `include_vt_analysis` (optional): Include VirusTotal security analysis ("yes" or "no")
**Description**: Analyze specific service types exposed on the internet
**Parameters**:
- `service_type` (required): Type of service ("database", "webcam", "industrial", "remote-access", "custom")
- `target_scope` (required): Scope of analysis ("global", "country", "organization", "ip-range")
- `target` (optional): Target value based on scope
- `custom_query` (optional): Custom query for the 'custom' service type
- `include_vt_analysis` (optional): Include VirusTotal analysis ("yes" or "no")
**Description**: Manage and analyze on-demand network scans
**Parameters**:
- `action` (required): Scan action to perform ("initiate", "check", "list")
- `target` (optional): Target IPs or networks to scan (comma-separated)
- `scan_id` (optional): Scan ID for checking status
**Description**: Analyze files and URLs for malware and security threats
**Parameters**:
- `target_type` (required): Type of target to analyze ("file" or "url")
- `target` (required): File hash (MD5/SHA1/SHA256) or URL to analyze
- `include_relationships` (optional): Include relationship data ("yes" or "no")
**Description**: Analyze network infrastructure using combined Shodan and VirusTotal data
**Parameters**:
- `target_type` (required): Type of target to analyze ("ip" or "domain")
- `target` (required): IP address or domain to analyze
- `depth` (optional): Analysis depth ("basic" or "comprehensive")
- `include_vt_analysis` (optional): Include VirusTotal analysis ("yes" or "no")
**Description**: Hunt for threats across multiple data sources using combined intelligence
**Parameters**:
- `indicator_type` (required): Type of indicator ("ip", "domain", "url", "file")
- `indicator` (required): Indicator value to investigate
- `include_vt_analysis` (optional): Include VirusTotal analysis ("yes" or "no")