Loading...

mcp-recon provides a conversational interface for web reconnaissance, leveraging httpx and asnmap, accessible via the Model Context Protocol.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
mcp-recon provides a conversational interface for web reconnaissance, leveraging httpx and asnmap, accessible via the Model Context Protocol.
mcp-recon is relatively safe for basic reconnaissance tasks. However, the full_recon mode should be used judiciously, and the ProjectDiscovery API key must be securely managed. Ensure you have permission before scanning any domain.
Performance depends on the target website's responsiveness and network conditions. The http_lite_recon is faster than http_full_recon.
Costs are primarily associated with ProjectDiscovery API usage. Monitor API usage to avoid unexpected charges.
http_lite_scanPerforms a quick HTTP scan to gather basic information about a target.
Read-only operation, no modification of target systems.
katana_command_generatorGenerates Katana crawl commands based on specified goals.
Generates commands but does not execute them directly.
http_full_reconCollects comprehensive metadata including page previews, headers, and certificates.
Retrieves full page content, potentially exposing sensitive information.
asn_lookupLooks up information about IPs, ASNs, or organizations.
Read-only operation, retrieves publicly available information.
API Key
cloud
mcp-recon is relatively safe for basic reconnaissance tasks. However, the full_recon mode should be used judiciously, and the ProjectDiscovery API key must be securely managed. Ensure you have permission before scanning any domain.
Autonomy is limited as the tool primarily provides information. The user must interpret the results and take action.
Production Tip
Monitor API usage to avoid exceeding limits and incurring unexpected costs.
http_lite_recon performs a quick scan for basic information, while http_full_recon collects more comprehensive metadata.
Yes, an API key is required to use the httpx and asnmap tools.
You need to add mcp-recon to your MCP configuration file, specifying the Docker command to run the container.
You should only scan websites that you own or have permission to test.
You can retrieve information about IPs, ASNs, and organizations, such as ownership and geographic location.
Check that the target domain is publicly accessible, you've specified the correct tool, and the domain isn't blocking scans.
mcp-recon can help you gather information that may be useful for vulnerability assessment, but it does not directly identify vulnerabilities.