Skip to main content
Glama

MCP NMAP Server

MCP NMAP Server

A Model Context Protocol (MCP) server that enables AI assistants to perform network scanning operations using NMAP. This server provides a standardized interface for AI models to interact with NMAP, making it possible to perform network analysis and security assessments through AI conversations.

Prerequisites

  • Windows operating system
  • Node.js (v18 or higher)
  • NMAP installed and accessible from Windows command line
  • TypeScript for development

Installation

Installing via Smithery

To install NMAP Server for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install mcp-nmap-server --client claude

Manual Installation

Install the package globally using npm:

npm install -g mcp-nmap-server

Or install locally in your project:

npm install mcp-nmap-server

Features

The server provides access to NMAP's core functionality through a simple interface. It supports quick scans, full port scans, version detection, and custom timing templates. The implementation uses NMAP's native command-line interface, ensuring reliability and consistency with standard NMAP operations.

Configuration with Claude Desktop

To use this server with Claude Desktop on Windows, you'll need to configure it in the Claude configuration file located at: C:\Users\YOUR_USERNAME\AppData\Roaming\Claude\config.json

Add the NMAP server to your configuration by adding it to the mcpServers section. Here's a complete example of a Claude Desktop configuration file:

{ "mcpServers": { "nmap": { "command": "node", "args": [ "C:\\Users\\YOUR_USERNAME\\Downloads\\mcp-nmap-server\\dist\\index.js" ] } }, "globalShortcut": "Ctrl+Q" }

Replace YOUR_USERNAME with your Windows username and adjust the path to where you've installed the NMAP server.

Usage with AI

Once configured, AI assistants like Claude can use the server through the run_nmap_scan function. The function accepts the following parameters:

{ target: string; // Host or network to scan ports?: string; // Optional port specification (e.g., "80,443" or "1-1000") scanType?: 'quick' | 'full' | 'version'; // Scan type (default: 'quick') timing?: number; // NMAP timing template 0-5 (default: 3) additionalFlags?: string; // Optional additional NMAP flags }

Example conversation with Claude:

Human: Can you scan localhost for open ports? Claude: I'll help you scan localhost using NMAP. <runs nmap scan with parameters> target: "localhost" scanType: "quick" timing: 3

License

MIT License

Support

For issues, suggestions, or contributions, please visit the GitHub repository.

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Enables AI assistants to perform network scanning operations using NMAP, offering a standardized interface for network analysis and security assessments through AI conversations.

  1. Prerequisites
    1. Installation
      1. Installing via Smithery
      2. Manual Installation
    2. Features
      1. Configuration with Claude Desktop
        1. Usage with AI
          1. License
            1. Support

              Related MCP Servers

              • A
                security
                A
                license
                A
                quality
                A Model Control Protocol server that provides access to nmap network scanning functionality, allowing users to run customizable scans, store results, and analyze network security using AI prompts.
                Last updated -
                3
                8
                Python
                MIT License
                • Linux
              • -
                security
                F
                license
                -
                quality
                An integration that enables AI assistants to interact with network data through a standardized protocol, providing AI-ready tools and interfaces for network automation and management.
                Last updated -
                14
                Python
              • -
                security
                A
                license
                -
                quality
                A module that enables AI assistants to access and utilize common penetration testing and security tools like Nmap and Metasploit through a simple interface.
                Last updated -
                1
                Python
                GPL 3.0
              • -
                security
                F
                license
                -
                quality
                An agent-based network scanning system that uses Nmap for network discovery and leverages DeepSeek API to analyze scan results for security vulnerabilities and recommendations.
                Last updated -
                Python

              View all related MCP servers

              MCP directory API

              We provide all the information about MCP servers via our MCP API.

              curl -X GET 'https://glama.ai/api/mcp/v1/servers/PhialsBasement/nmap-mcp-server'

              If you have feedback or need assistance with the MCP directory API, please join our Discord server