mcp-shodan and Wazuh-MCP-Server
These are complementary tools, as BurtTheCoder/mcp-shodan provides reconnaissance and vulnerability intelligence that could feed into the AI-powered security operations and threat detection offered by gensecaihq/Wazuh-MCP-Server for a more comprehensive security posture.
About mcp-shodan
BurtTheCoder/mcp-shodan
MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and CVE/CPE vulnerability intelligence. Works with Claude Code, Codex, Gemini CLI, and Claude Desktop.
This tool helps cybersecurity analysts and IT professionals gather intelligence about internet-connected devices, IP addresses, and potential vulnerabilities. You input an IP address, domain name, product name, or a CVE identifier, and it provides structured data on network services, open ports, geographical location, and vulnerability details. It's designed for security researchers, network administrators, and incident response teams.
About Wazuh-MCP-Server
gensecaihq/Wazuh-MCP-Server
AI-powered security operations for Wazuh SIEM—use any MCP-compatible client to ask security questions in plain English. Faster threat detection, incident triage, and compliance checks with real-time monitoring and anomaly spotting. Production-ready MCP server for conversational SOC workflows.
This project helps security operations teams manage their Wazuh SIEM more efficiently. It allows security analysts to ask plain English questions about alerts, threats, and vulnerabilities, and receive actionable responses. By connecting to any AI assistant, security teams can investigate security events, hunt for threats, and perform incident response actions using natural language.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work