14 Integrations with Shodan

View a list of Shodan integrations and software that integrates with Shodan below. Compare the best Shodan integrations as well as features, ratings, user reviews, and pricing of software that integrates with Shodan. Here are the current Shodan integrations in 2026:

  • 1
    Google Chrome
    Google Chrome is a fast, secure, and user-friendly web browser designed to help people get more done online. Built by Google, Chrome combines speed, performance, and simplicity across desktop and mobile devices. The browser includes built-in AI features like Gemini in Chrome, which helps users understand content, manage tasks, and work more efficiently directly from their tabs. Chrome integrates powerful tools such as Google Search, Google Lens, and autofill to streamline everyday browsing. Advanced security features like Safe Browsing, Password Manager, and Safety Check help protect users from threats and keep data secure. Chrome syncs seamlessly across devices, allowing access to bookmarks, passwords, and tabs anywhere. With frequent automatic updates, Chrome stays optimized with the latest features and performance improvements.
    Leader badge
    Starting Price: Free
  • 2
    Mozilla Firefox
    Mozilla Firefox is a free, open-source web browser developed by the Mozilla Foundation, a non-profit organization dedicated to internet health and privacy. Designed to prioritize user privacy and security, Firefox offers features like Total Cookie Protection, which provides outstanding privacy by default. The browser includes tools such as Firefox View, allowing users to see tabs open on other devices and access recent history, and built-in PDF editing capabilities, enabling form edits directly within the browser. Available across various platforms, including Windows, macOS, Linux, Android, and iOS, Firefox ensures a consistent and secure browsing experience. Its commitment to user-centric development and transparency makes it a preferred choice for those seeking a trustworthy alternative to proprietary browsers.
    Leader badge
    Starting Price: Free
  • 3
    Dropzone AI

    Dropzone AI

    Dropzone AI

    Dropzone AI replicates the techniques of elite analysts and autonomously investigates every alert. Our specialized AI agent autonomously performs end-to-end investigations and will cover 100% of your alerts. ‍ Trained to replicate the investigation techniques of best-in-class SOC analysts, its reports are fast, detailed and accurate. You can also go deeper with its chatbot. Dropzone’s cybersecurity reasoning system, purpose-built on top of advanced LLMs, runs a full end-to-end investigation tailored for each alert. Its security pre-training, organizational context understanding and guardrails make it highly accurate. Dropzone then generates a full report, with the conclusion, executive summary, and full insights in plain English. You can also converse with its chatbot for ad-hoc inquiries.
    Starting Price: $36,000/year
  • 4
    runZero

    runZero

    runZero

    Active scanning, passive discovery, and API integrations unite in one powerful platform to deliver complete visibility into managed and unmanaged assets across IT, OT, IoT, cloud, mobile, and remote environments. Some CAASM solutions rely solely on integrations to inventory your network, but those other tools are notoriously incomplete because they rely on existing sources. runZero combines our own active scanning and passive discovery with integrations so you see absolutely everything. Our unique, safe scanning technology creatively gathers data points just like an attacker would, extracting asset details to deliver mind-blowing, in-depth fingerprinting and insights into OSs, services, hardware, and more. runZero surfaces all sorts of things you had no idea were on your network, like unmanaged and unpatched assets, misconfigured and abandoned cloud resources, rogue OT devices, and unknown subnets.
    Starting Price: $5,000 for 500 assets
  • 5
    Kadabra

    Kadabra

    Kadabra

    Kadabra is an AI-powered workflow automation platform that enables teams to convert plain-English descriptions of tasks into live pipelines in minutes. Users simply chat their goal, such as “when a new signup arrives, enrich the lead, add to Notion CRM, and ping Slack,” and Kadabra’s AI designs, tests, and deploys the automation. It connects natively to apps like Slack, Notion, Google Sheets, Gmail, and webhooks, presents the workflow on a visual canvas where users can review and approve each step, and supports both scheduled and event-triggered execution. Built-in monitoring, error-handling, and one-click deployment mean teams can scale automations without heavy engineering resources. With control surfaces that let users refine workflows, it retains transparency, and guardrails even as it accelerates automation across marketing, sales, operations, and product workflows.
    Starting Price: $9 per month
  • 6
    MCPTotal

    MCPTotal

    MCPTotal

    MCPTotal is a secure, enterprise-grade platform designed to manage, host, and govern MCP (Model Context Protocol) servers and AI-tool integrations in a controlled, audit-ready environment rather than letting them run ad hoc on developers’ machines. It offers a “Hub”, a centralized, sandboxed runtime environment where MCP servers are containerized, hardened, and pre-vetted for security. A built-in “MCP Gateway” acts like an AI-native firewall: it inspects MCP traffic in real time, enforces policies, monitors all tool calls and data flows, and prevents common risks such as data exfiltration, prompt-injection attacks, or uncontrolled credential usage. All API keys, environment variables, and credentials are stored securely in an encrypted vault, avoiding the risk of credential-sprawl or storing secrets in plaintext files on local machines. MCPTotal supports discovery and governance; security teams can scan desktops and cloud instances to detect where MCP servers are in use.
    Starting Price: Free
  • 7
    Query Federated Search
    Query is a federated search platform delivering a single search bar to access all your security-relevant data, wherever it is stored. The Query Federated Search Platform unlocks access to and value from cybersecurity data wherever it is stored (in the cloud, third-party SaaS, or on-prem), regardless of vendor or technology, and without requiring centralization. This leads to massive cost savings, more efficient security operations across real-time and historical data sources, and reduced security analyst ramp-up time.
  • 8
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 9
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 10
    Filigran

    Filigran

    Filigran

    Embrace a proactive approach with end-to-end cyber threat management, from anticipation to response. Tailored to elevate cybersecurity through comprehensive threat intelligence, advanced adversary simulation, and strategic cyber risk management solutions. Get a holistic view of your threat environment and improved decision-making for faster incident response. Organize your cyber threat intelligence knowledge to enhance and disseminate actionable insights. Access consolidated view of threat data from multiple sources. Transform raw data into actionable insights. Enhance sharing and actionable insights dissemination across teams and tools. Streamline incident response with powerful case management capabilities. Create dynamic attack scenarios, ensuring accurate, timely, and effective response during real-world incidents. Build both simple and intricate scenarios tailored to various industry needs. Improve team dynamics with instant feedback on responses.
  • 11
    Polarity

    Polarity

    Polarity

    Polarity is a free-floating overlay that automatically searches unlimited sources in parallel to speed up analysis by enriching every tool and workflow. It allows users to add and enrich any information so they and their entire team or organization can stay on the same page and avoid duplicate work. When a user makes an annotation on any data today, their teammate will see that note when they see the same data in the future. Polarity enables users to search once and know everything their enterprise knows about a piece of data, both internally and externally. What used to take 50 tabs and most of your time now takes just 1 tab and 2 seconds, so you can focus on getting the job done, not searching for context. Users can connect Polarity to over 200 different tools inside of their environment or to external open-source tools. With Polarity’s flexible integration framework, anyone can develop a custom integration quickly and get visibility to any dataset.
  • 12
    Mondoo

    Mondoo

    Mondoo

    Mondoo is a unified security and compliance platform designed to drastically reduce business-critical vulnerabilities by combining full-stack asset visibility, risk prioritization, and agentic remediation. It builds a complete inventory of every asset, cloud, on-premises, SaaS, endpoints, network devices, and developer pipelines, and continuously assesses configurations, exposures, and interdependencies. It then applies business context (such as asset criticality, exploitability, and policy deviation) to score and highlight the most urgent risks. Users can choose guided remediation (pre-tested code snippets and playbooks) or autonomous remediation via orchestration pipelines, with tracking, ticket creation, and verification built in. Mondoo supports ingestion of third-party findings, integrates with DevSecOps toolchains (CI/CD, IaC, container registries), and includes 300 + compliance frameworks and benchmark templates.
  • 13
    Qevlar AI

    Qevlar AI

    Qevlar AI

    Qevlar AI is an autonomous AI-powered Security Operations Center (SOC) platform designed to transform how cybersecurity teams investigate and respond to threats by automating the entire alert analysis process. Unlike traditional tools or AI co-pilots that require human input or predefined playbooks, it independently investigates alerts as soon as they are received, pulling and enriching data from multiple security tools and external sources to determine whether an alert is truly malicious. It correlates and analyzes signals across systems, reconstructs attack patterns, and provides a complete understanding of incidents, allowing teams to move beyond fragmented workflows and reactive alert triage. By using agentic AI, it can automate a large portion of manual investigations, significantly reducing response times, improving consistency, and expanding the operational capacity of security teams without increasing headcount.
  • 14
    Chronicle SOAR
    Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat.
  • Previous
  • You're on page 1
  • Next