mcpmap
Discover MCP (Model Context Protocol) servers on network ranges
claude mcp add --transport stdio canack-mcpmap docker run --rm ghcr.io/canack/mcpmap:latest
How to use
mcpmap is a network scanner designed to discover MCP (Model Context Protocol) servers across IP ranges, functioning similarly to a specialized version of nmap for MCP deployments. It performs a sequence of steps to identify MCP servers, enumerate available tools, and optionally run low- to high-risk security checks in a controlled manner. The tool supports passive discovery by default and can operate in an active mode to perform more intrusive probing with safety limits in place. Use it to quickly map MCP-capable hosts in a given subnet and assess potential security postures and exposed tools.
Typical usage involves providing a target CIDR range, optionally enabling enumeration and active probing, and choosing whether to pin, verify, or output in JSON for CI/CD pipelines. The command-line interface exposes flags to list discovered tools, perform limited tool calls, and save or verify tool hashes for baseline comparisons. Outputs can be verbose or concise depending on the requested format.
How to install
Prerequisites:
- Docker installed (recommended for the official image) or use an alternative supported deployment method if available.
- Access to a terminal with network access to pull the image or build locally if provided.
Installation (Docker):
-
Run the MCP server image with your target range:
docker run --rm ghcr.io/canack/mcpmap:latest 192.168.1.0/24
-
Optionally pass additional flags after the image name to customize behavior (examples in the README):
docker run --rm ghcr.io/canack/mcpmap:latest 192.168.1.0/24 --enumerate docker run --rm ghcr.io/canack/mcpmap:latest 192.168.1.0/24 --enumerate --active
-
If you build from source or use a different distribution method, follow the project’s normal build/install steps as documented in the repo (e.g., cargo install for Rust builds) and invoke the binary with the target range.
Prerequisites (alternative builds):
- Rust toolchain for cargo builds
- Basic familiarity with the MCP server’s CLI options
Additional notes
Notes:
- The tool supports both passive discovery and active probing; active modes enable more aggressive checks but are bounded by safety limits (e.g., max calls per tool, total probes, timeouts).
- For baseline comparisons, you can use --pin to save tool/resource hashes and --verify to compare against a saved baseline.
- If using Docker, ensure the container has network access to the target ranges and appropriate permissions to access the network.
- The tool provides a JSON output mode (--json) suitable for CI/CD integration.
- Be mindful of potential legal and ethical considerations when scanning networks you do not own or have explicit authorization to test.
Related MCP Servers
bridle
TUI / CLI config manager for agentic harnesses (Amp, Claude Code, Opencode, Goose, Copilot CLI, Crush, Droid)
kindly-web-search
Kindly Web Search MCP Server: Web search + robust content retrieval for AI coding tools (Claude Code, Codex, Cursor, GitHub Copilot, Gemini, etc.) and AI agents (Claude Desktop, OpenClaw, etc.). Supports Serper, Tavily, and SearXNG.
gemini-cli
> Gemini Rust Suite 🦀: A powerful, modular Rust toolkit for interacting with Google Gemini. Features a feature-rich CLI, persistent semantic memory (LanceDB), and extensible tool integration via the Model Context Protocol (MCP).
HydraMCP
Connect agents to agents. MCP server for querying any LLM through your existing subscriptions: compare, vote, and synthesize across GPT, Gemini, Claude, and local models from one terminal.
mcproc
A Model Context Protocol (MCP) server for comfortable background process management on AI agents.
gemini-code-assist
Model Context Protocol server integrating Google Gemini CLI with Claude Code for AI-powered development assistance