Developed by ADEO Cybersecurity Services
A Model Context Protocol (MCP) server that provides access to both Shodan and VirusTotal APIs for comprehensive security analysis and threat intelligence. This server, developed and maintained by ADEO Cybersecurity Services, enables cybersecurity analysts to perform network intelligence operations including host information lookup, DNS operations, vulnerability analysis, network scanning, and alerts management through a collection of tools and prompt templates.
About ADEO Cybersecurity Services
ADEO Cybersecurity Services specializes in providing advanced security solutions and tools for cybersecurity professionals. This ADEO CTI MCP Server is part of our commitment to enhancing cybersecurity capabilities through innovative tools and integrations with industry-leading security data sources.
Features
Shodan Capabilities
- Detailed information about IP addresses including open ports, services, and location data
- DNS lookup and reverse DNS operations
- Domain information retrieval including subdomains
- Advanced search capabilities with facets and filters
- On-demand network scanning
- Network alerts and monitoring
- Vulnerability analysis and CVE tracking
- Account and API management
- Historical data access
VirusTotal Integration
- Malware analysis and detection
- URL scanning and reputation checking
- IP address reputation analysis
- Domain threat intelligence
- File hash analysis
- Comprehensive threat reports
Combined Analysis Features
- Unified security analysis using both platforms
- Correlated threat intelligence
- Integrated vulnerability assessment
- Cross-platform data enrichment
Enhanced Functionality
- Rich data formatting and presentation
- Intelligent workflow automation
- Pre-built analysis templates
- Custom search filters
- Batch processing capabilities
- Real-time monitoring
- host-info
- Get detailed information about a host from Shodan
- Parameters:
ip
(required): IP address to look up
history
(optional): Include historical information
minify
(optional): Return only basic host information
- Example:
@shodan host-info ip="8.8.8.8" history=true
DNS Operations
- dns-lookup
- Resolve hostnames to IP addresses
- Parameters:
hostnames
(required): Comma-separated list of hostnames to resolve
-
Example:
@shodan dns-lookup hostnames="google.com,facebook.com"
-
reverse-dns
- Look up hostnames for IP addresses
- Parameters:
ips
(required): Comma-separated list of IP addresses
-
Example:
@shodan reverse-dns ips="8.8.8.8,1.1.1.1"
-
domain-info
- Get DNS entries and subdomains for a domain
- Parameters:
domain
(required): Domain name to look up
- Example:
@shodan domain-info domain="example.com"
Search Operations
- search-host
- Search Shodan for hosts matching specific criteria
- Parameters:
query
(required): Shodan search query
facets
(optional): Comma-separated list of properties for summary information
page
(optional): Page number for results
-
Example:
@shodan search-host query="apache country:DE" facets="org,port"
-
search-host-count
- Get count of matching results without full details
- Parameters:
query
(required): Shodan search query
facets
(optional): Comma-separated list of facets
- Example:
@shodan search-host-count query="product:nginx"
Search Utilities
- list-search-facets
- List all available search facets
-
No parameters required
-
list-search-filters
- List all filters that can be used when searching
-
No parameters required
-
search-tokens
- Analyze and break down search query components
- Parameters:
query
(required): Shodan search query to analyze
- Example:
@shodan search-tokens query="apache port:80 country:DE"
-
list-ports
- List all ports that Shodan is actively scanning
- No parameters required
-
list-protocols
- List all protocols available for scanning
- No parameters required
Scanning Operations
-
request-scan
-
get-scan-status
-
list-scans
- View all your submitted scans
- No parameters required
Alert Management
-
list-triggers
- List available network alert triggers
- No parameters required
-
create-alert
-
get-alert-info
-
delete-alert
- Remove an existing alert
- Parameters:
id
(required): Alert ID to delete
-
edit-alert
- Modify an existing alert
- Parameters:
id
(required): Alert ID
name
(optional): New alert name
filters
(optional): Updated filters
-
list-alerts
- View all active alerts
- No parameters required
Query Management
-
list-queries
- View saved search queries
- Parameters:
page
(optional): Results page number
sort
(optional): Sort by "votes" or "timestamp"
order
(optional): "asc" or "desc"
-
search-queries
- Search through saved queries
- Parameters:
query
(required): Search term
page
(optional): Page number
-
list-query-tags
- View popular query tags
- Parameters:
size
(optional): Number of tags to return
Account Management
-
get-profile
- View account information
- No parameters required
-
get-api-info
- Check API subscription status
- No parameters required
-
get-billing
- View billing information
- No parameters required
-
get-http-headers
- Check your request headers
- No parameters required
-
get-my-ip
- View your current IP address
- No parameters required
Vulnerability Analysis
-
cve-lookup
-
cpe-vuln-search
URL Analysis
- virustotal-url-analysis
- Analyze URLs for security threats
- Parameters:
url
(required): Target URL
- Example:
@shodan virustotal-url-analysis url="https://example.com"
File Analysis
- virustotal-file-analysis
- Check file hashes for malware
- Parameters:
hash
(required): MD5/SHA-1/SHA-256 hash
- Example:
@shodan virustotal-file-analysis hash="a94a8fe5ccb19ba61c4c0873d391e987982fbbd3"
IP Analysis
- virustotal-ip-analysis
- Check IP reputation
- Parameters:
ip
(required): Target IP address
- Example:
@shodan virustotal-ip-analysis ip="8.8.8.8"
Domain Analysis
- virustotal-domain-analysis
- Analyze domain reputation
- Parameters:
domain
(required): Target domain
- Example:
@shodan virustotal-domain-analysis domain="example.com"
MCP Server Prompts
The server provides a set of intelligent prompts for comprehensive cybersecurity analysis workflows:
Asset Discovery
Vulnerability Assessment
Internet Search
Network Monitoring
ICS Analysis
DNS Intelligence
Service Exposure Analysis
Account Status
Scan Management
Search Analytics
Vulnerability Hunting
Malware Analysis
Infrastructure Analysis
Threat Hunting
Environment Setup
-
Set required environment variables:
SHODAN_API_KEY=your_shodan_api_key
VIRUSTOTAL_API_KEY=your_virustotal_api_key
-
Install dependencies:
npm install
-
Build the project:
npm run build
-
Start the server:
npm start
API Rate Limits
- Respect Shodan API limits based on your subscription
- VirusTotal API has separate rate limits
- Use batch operations when possible
- Implement appropriate delay between requests
Error Handling
The server handles various error scenarios:
- Invalid API keys
- Rate limiting
- Network issues
- Invalid parameters
- Missing permissions
Contributing
- Fork the repository
- Create a feature branch
- Submit a pull request
License
Copyright © 2024 ADEO Cybersecurity Services. All rights reserved.