@pipeworx/shodan-internetdb
Connect: https://gateway.pipeworx.io/shodan-internetdb/mcp · Install: one-click buttons
Tools: 1
Shodan’s free InternetDB API. Lookup any IP and get its open ports, detected services, hostnames, vulnerabilities, and tags (CDN, cloud, ICS, etc.). The data behind “what’s actually running on this IP?” — derived from Shodan’s continuous internet scanning. Free, no auth.
Why this matters for AI agents
For security analysis, attack-surface reconnaissance (your own assets), or threat-hunting context, Shodan’s data is canonical. InternetDB specifically is the free, lightweight subset — for full Shodan capabilities (search, historical, alerts), commercial Shodan API is needed.
Common flows:
- IP lookup. “What’s running on 1.2.3.4?” → open ports, services, vulnerabilities.
- Pre-attack reconnaissance (defensive). Audit your own infrastructure as it appears externally.
- Pair with threat intel. Cross-reference with AbuseIPDB (reputation), PhishTank / URLhaus (URL threat).
Auth
None. InternetDB is free, no key, no signup. Generous rate limits.
For the full Shodan search API (historical scans, advanced search, real-time alerts), a Shodan membership is required (~$59/year for hobbyist tier). InternetDB exposes the static-snapshot subset.
What InternetDB returns
For a queried IP:
{
"ip": "1.2.3.4",
"hostnames": ["example.com"],
"ports": [22, 80, 443],
"vulns": ["CVE-2021-44228"],
"tags": ["cdn", "cloud"]
}
| Field | Meaning |
|---|---|
ports | Open ports detected by Shodan’s scanners |
vulns | CVE IDs that Shodan’s heuristics flag as likely vulnerable based on detected service banners |
hostnames | Reverse DNS or self-reported hostnames |
tags | Categorical tags (cdn, cloud, ics, vpn, tor, etc.) |
cpes | (in some responses) detected software fingerprints |
Common pitfalls
- Snapshot, not real-time. InternetDB data may be days or weeks stale. The IP may have closed those ports since the last scan. For “current state,” you need live scanning of your own assets.
- Vulnerability flags are heuristic. Shodan flags
vulnsbased on service banner matching —nginx 1.18.0→ CVE-2021-23017. The actual instance may be patched (banners often retain old version strings post-patch). Never act onvulnsalone — confirm with direct verification. - CDN / proxy IPs. Cloudflare, Akamai, AWS CloudFront IPs surface massive port footprints because they front many sites. The data isn’t about a specific website — it’s about the proxy infrastructure.
- Tor exit nodes. Tagged
torin InternetDB. Reputation systems sometimes blacklist them; legitimate users (privacy-conscious) come through too. - Coverage gaps. Not every IP is scanned. Behind-NAT, IPv6, and dynamically-assigned IPs may have no Shodan record.
- Don’t use for attack. Shodan data is for defensive reconnaissance and research. Using it to identify and attack vulnerable systems you don’t own is illegal and against Shodan’s TOS.
Tools
- lookup_ip — Look up an IP address in the Shodan InternetDB. Returns open ports, hostnames, known vulnerabilities (CVEs), CPEs (software identifiers), and tags. Free, no API key needed. Example: lookup_ip(“8.8.8.8
Tools
-
lookup_ip— Look up an IP address in the Shodan InternetDB. Returns open ports, hostnames, known vulnerabilities (CVEs), CPEs (software identifiers), and tags. Free, no API key needed. Example: lookup_ip( 8.8.8.8