Conversational reconnaissance interface and MCP server powered by httpx and asnmap.
https://github.com/nickpending/mcp-reconYou know the drill. You need to quickly check if a domain is live, grab some HTTP headers, or identify what ASN owns an IP block. Instead of firing up a terminal, remembering the right httpx flags, and parsing JSON output, what if you could just ask: "What's the status of example.com?" or "Who owns ASN 14421?"
That's exactly what mcp-recon delivers—a conversational interface to ProjectDiscovery's httpx and asnmap tools through the Model Context Protocol. No more context switching to the terminal or hunting through documentation for the right flags.
We've all been there: you need quick recon intel but spend more time crafting the perfect httpx command than actually analyzing results. mcp-recon eliminates this friction by letting you ask natural questions directly in Claude Desktop or any MCP-compatible interface.
Instead of:
httpx -u target.com -status-code -title -server -ip -follow-redirects -json
You simply ask:
"Using quick http recon, what's the status code for target.com?"
The tool handles the httpx execution, parses the output, and gives you exactly what you need in plain English.
Quick Recon (http_lite_recon): Perfect for rapid status checks and basic fingerprinting. Get status codes, server headers, and IP addresses without the overhead of deep analysis.
Full Recon (http_full_recon): When you need comprehensive intel—certificates, technology detection, complete headers, and page previews. Ideal for threat assessment or competitive analysis.
ASN Lookup (asn_lookup): Standalone IP-to-organization mapping using asnmap. Quick answers to "who owns this IP?" or "what's the organization behind this ASN?"
Security Assessments: Instead of juggling multiple terminal windows, you can conduct reconnaissance through conversational queries while maintaining your analysis flow in the same interface.
Infrastructure Monitoring: Check domain health, certificate status, and server configurations through natural language queries. No need to remember specific flag combinations for different checks.
Competitive Intelligence: Gather technical intel on competitors' infrastructure with simple questions like "What technologies is competitor.com using?" rather than crafting complex tool chains.
mcp-recon runs as a Docker container, making it simple to integrate into any development environment. The MCP protocol means it works seamlessly with Claude Desktop—no custom interfaces to learn.
Add it to your MCP configuration:
"mcp-recon": {
"command": "docker",
"args": ["run", "--rm", "-i", "mcp/recon"]
}
That's it. Start asking reconnaissance questions immediately.
The tool automatically handles httpx's stdin/stdout leakage issues and provides fallback ASN lookups when httpx enrichment fails. It's built by someone who understands the pain points of reconnaissance tooling and has solved them proactively.
Docker isolation means you can run reconnaissance safely without worrying about tool dependencies or system conflicts. The conversational interface preserves context across queries, so you can build complex reconnaissance workflows through natural dialog.
mcp-recon transforms reconnaissance from a command-line chore into a natural conversation. Whether you're doing rapid domain checks, comprehensive infrastructure analysis, or ASN research, you get professional-grade results through simple questions.
Stop memorizing flags and start asking questions. Your reconnaissance workflow just got a lot more human.