Tellix is a conversational recon interface powered by httpx and LLMs. Just ask.
mcp-recon (formerly Tellix) is a conversational recon interface and MCP server powered by httpx and asnmap. Just ask.
mcp-recon bridges the gap between natural language and HTTP infrastructure analysis. It exposes recon tools through the Model Context Protocol (MCP), allowing you to run reconnaissance on web domains via any compatible AI interface, like Claude Desktop.
httpx
's stdin/stdout leakage issuemcp-recon provides three main reconnaissance tools:
http_lite_recon
/ http_quick_recon
)Fast, lightweight HTTP fingerprinting that provides essential information with minimal overhead.
Example user query and expected response:
User: "Using quick http recon, what's the status code for example.com?"
AI: "I checked example.com and it's currently returning a 200 OK status code, indicating the site is up and functioning normally. It's being served from an Nginx web server on IP 93.184.216.34."
http_full_recon
)Comprehensive metadata collection including page previews, headers, certificates, and technology detection.
Example user query and expected response:
User: "Using full http recon, what certificates is www.google.com using?"
AI: "Based on my analysis, www.google.com is using a TLS 1.3 certificate issued by Google Trust Services. The certificate was issued on March 20, 2025, and is valid until June 12, 2025. It was specifically issued for 'www.google.com' and uses the TLS_AES_128_GCM_SHA256 cipher suite."
asn_lookup
)Standalone lookup of IPs, ASNs, or org names using ProjectDiscovery's asnmap
library.
Example user query and expected response:
User: "Who owns ASN 14421?"
AI: "ASN 14421 is operated by 'PPLINKNET' in the US."
User: "Use complete http recon on www.google.com to check what certificates they're using"
AI: "www.google.com is using a TLS 1.3 certificate issued by Google Trust Services (issuer: WE2). The certificate was issued on March 20, 2025, and expires on June 12, 2025. It uses the TLS_AES_128_GCM_SHA256 cipher suite."
User: "Use complete http recon on example.com to analyze security headers"
AI: "My analysis of example.com shows it's missing several key security headers: Content-Security-Policy, X-Frame-Options, and HTTP Strict Transport Security (HSTS). This could expose the site to XSS, clickjacking, and man-in-the-middle attacks."
User: "Use quick http recon on cloudflare.com to see what technologies they use"
AI: "cloudflare.com is running on Cloudflare's own infrastructure with HTTP/2 support. The site implements HSTS for secure connections and is served from Cloudflare's CDN with a 200 status code."
User: "Use complete http recon on microsoft.com, apple.com, and amazon.com to compare their TLS setups"
AI: "My analysis shows:
- microsoft.com: TLS 1.3 with certificate from Microsoft RSA TLS CA
- apple.com: TLS 1.3 with certificate from DigiCert
- amazon.com: TLS 1.2 with certificate from DigiCert
Microsoft and Apple are using the newer TLS 1.3 protocol while Amazon uses TLS 1.2."
User: "Tell me who owns 8.8.8.8 using ASN lookup"
AI: "8.8.8.8 belongs to Google LLC (AS15169) in the United States."
# Clone the repository
git clone https://github.com/nickpending/mcp-recon.git
cd mcp-recon
# Build the Docker image
docker build -t mcp-recon .
# Run the container
docker run -it --rm mcp-recon
mcp-recon is designed to run as a Docker container to be used with Claude Desktop via the MCP protocol.
mcp-recon runs as a standalone MCP server. Add it to your MCP configuration like so:
"mcp-recon": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"mcp-recon"
]
}
Or using an .env
file:
"mcp-recon": {
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"--env-file", "/Users/yourname/.config/mcp-recon.env",
"mcp/recon"
]
}
Your .env
should contain:
PDCP_API_KEY=your_projectdiscovery_api_key
No Results Returned: Check that:
Performance Issues:
httpx
library attempts to read stdin even when used as a library. mcp-recon shields os.Stdin
to prevent interference with MCP.Asn = true
, httpx
may fail to enrich IPs. mcp-recon includes a fallback using the official asnmap
Go library.mcp-recon in action via Claude Desktop, using the http_quick_recon
and http_complete_recon
tools:
This example shows a quick recon request on
www.google.com
, returning status code, title, server details, and IP address — all from a natural language query.
This example demonstrates a complete recon on
www.microsoft.com
, including TLS config, headers, CDN, and security observations.
This project was formerly known as Tellix. It has been renamed to mcp-recon to better align with the Model Context Protocol (MCP) naming convention used in security tools. All links to the previous repository name will be redirected to the new name, but you should update your references when possible.
This project is licensed under the MIT License.
[This section intentionally left as a placeholder for similar projects to be added when discovered]