MCPSERV.CLUB
zoomeye-ai

ZoomEye MCP Server

MCP Server

Real‑time cyber asset search for AI assistants

Stale(55)
48stars
0views
Updated 22 days ago

About

The ZoomEye MCP Server lets LLMs query the ZoomEye platform for network asset information using dorks and search parameters. It provides real‑time cyber intelligence, caching, retry logic, and comprehensive error handling for seamless integration with AI development environments.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

searchexample

The ZoomEye MCP Server transforms the powerful, real‑time cyber asset intelligence platform into a first‑class data source for AI assistants. By exposing ZoomEye’s search API through the Model Context Protocol, developers can inject live network asset information—IP addresses, open ports, banners, and more—directly into LLM conversations or automated workflows. This eliminates the need to manually query ZoomEye from a browser, parse JSON responses, or manage API keys in each tool; the MCP server handles authentication, caching, and retry logic on behalf of the client.

At its core, the server offers a single tool that accepts a Base64‑encoded query string () and optional pagination, field selection, and data type flags. The tool returns structured results that can be consumed by any MCP‑compatible assistant, enabling features such as “Show me all web servers on port 80 in the EU” or “Find vulnerable IoT devices with open SSH.” The caching layer significantly reduces API usage, while automatic retries ensure resilience against transient network errors. Detailed logging and error handling make it straightforward to monitor usage patterns and troubleshoot failures.

Developers benefit from the seamless integration with popular MCP environments—Claude Desktop, Cursor, Windsurf, Zed, and many more. Once the server is running, an assistant can simply invoke the tool with natural language prompts, and the MCP runtime translates that into a ZoomEye query. The result can be formatted as tables, maps, or embedded in code snippets, providing actionable intelligence within the context of a conversation. This workflow is ideal for security analysts building threat hunting pipelines, researchers automating reconnaissance, or DevOps teams monitoring exposed services.

Real‑world use cases include continuous vulnerability scanning where the MCP server feeds ZoomEye data into a SIEM, automated compliance checks that verify no unauthorized ports are exposed, or chatbot‑driven threat intelligence where a user asks for the latest public exploits targeting a specific service. Because ZoomEye covers IPv4, IPv6, and web assets, the server supports a wide range of scenarios—from discovering new attack surfaces to tracking changes in infrastructure over time.

What sets ZoomEye MCP apart is its blend of real‑time cyber intelligence and developer-friendly tooling. The server’s simple, declarative API abstracts away the complexities of ZoomEye’s pagination and field selection, while its built‑in caching and retry logic deliver robust performance. By plugging this server into an AI workflow, teams can turn raw network data into contextual insights without leaving their preferred assistant or IDE.