Nmap MCP Server
This is a Model Control Protocol (MCP) server that provides access to nmap network scanning functionality.
Features
- Run nmap scans on specified targets with customizable options
- Store and retrieve scan results
- Analyze scan results using AI prompts
Installation
Requirements:
- Python 3.10+
- python-libnmap
- nmap (installed on the system)
pip install python-libnmap
Make sure nmap is installed on your system:
# On Debian/Ubuntu
sudo apt-get install nmap
# On Fedora/CentOS
sudo dnf install nmap
Usage
Running the Server
To run the server directly from the source code:
python -m src.nmap_mcp
To install the package and run as a command:
pip install -e .
nmap-mcp
Available Tools
run-nmap-scan
- Run an nmap scan on specified targets
- Parameters:
target
: Target host or network (e.g., 192.168.1.1 or 192.168.1.0/24)options
: Nmap options (e.g., -sV -p 1-1000)
get-scan-details
- Get detailed information about a specific scan
- Parameters:
scan_id
: ID of the scan to retrieve
list-all-scans
- List all available scan results
- No parameters required
Available Prompts
- analyze-scan
- Analyze an nmap scan result
- Parameters:
scan_id
: ID of the scan to analyzefocus
: Focus area (security/services/overview)
Resources
Scan results are available as resources with the nmap://scan/{scan_id}
URI scheme.
Example Workflow
Run a scan:
Call tool: run-nmap-scan Parameters: {"target": "192.168.1.0/24", "options": "-sV -p 22,80,443"}
Get scan details:
Call tool: get-scan-details Parameters: {"scan_id": "<scan_id from previous step>"}
List all scans:
Call tool: list-all-scans
Analyze scan results:
Get prompt: analyze-scan Parameters: {"scan_id": "<scan_id>", "focus": "security"}
Security Considerations
This server executes nmap commands on your system. Be cautious when scanning networks you don’t own or have permission to scan, as unauthorized scanning may be illegal in some jurisdictions.
Troubleshooting
If you encounter errors related to nmap not being found or being executed incorrectly:
- Make sure nmap is installed and available in your PATH
- Check the logs for which nmap executable is being used
- The server will attempt to use the full path to nmap to avoid conflicts
Nmap MCP Server
Project Details
- imjdl/nmap-mcpserver
- Last Updated: 4/2/2025
Recomended MCP Servers
A model context protocol server that reads mails with notmuch and sends mail with sendmail
Open Source, Self-Hosted, AI Search and LLM.txt for your website
可用于cursor 集成 mcp server
MCP server to connect LLMs with Prometheus HTTP API
Model Context Protocol Framework - Fixed version with NO logging
MCP server for searching and querying PubMed medical papers/research database
Gmail IMAP integration for Model Context Protocol (MCP)
The Logfire MCP Server is here! :tada:
A coincap mcp server to access crypto data from coincap API
Google Calendar MCP server with auto authentication support