loaditout.ai
SkillsPacksTrendingLeaderboardAPI DocsBlogSubmitRequestsCompareAgentsXPrivacyDisclaimer
{}loaditout.ai
Skills & MCPPacksBlog

netops-mcp

MCP Tool

lybw/netops-mcp

MCP server for network operations - LAN discovery, port scanning, OS fingerprinting, MAC vendor lookup. Built for AI agents.

Install

$ npx loaditout add lybw/netops-mcp

Platform-specific configuration:

.claude/settings.json
{
  "mcpServers": {
    "netops-mcp": {
      "command": "npx",
      "args": [
        "-y",
        "netops-mcp"
      ]
    }
  }
}

Add the config above to .claude/settings.json under the mcpServers key.

About

netops-mcp

[](https://opensource.org/licenses/MIT) [](https://goreportcard.com/report/github.com/lybw/netops-mcp)

A Model Context Protocol (MCP) server for network operations. Gives AI agents the ability to discover devices, scan ports, fingerprint operating systems, and look up MAC vendors on local networks.

Built on netkit and mcp-go.

Tools

| Tool | Description | |------|-------------| | discover_devices | ARP scan a subnet to find active devices with IP, MAC, and vendor info | | scan_ports | Concurrent TCP port scan with service detection | | fingerprint_host | OS detection (TTL analysis) + device type classification (port patterns) | | lookup_mac_vendor | MAC address to manufacturer lookup (IEEE OUI database) | | ping | ICMP ping to check host reachability and latency |

Install
go install github.com/lybw/netops-mcp@latest

Or build from source:

git clone https://github.com/lybw/netops-mcp.git
cd netops-mcp
go build -o netops-mcp .
Configuration
Claude Desktop

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "netops": {
      "command": "netops-mcp"
    }
  }
}
Claude Code

Add to settings:

{
  "mcpServers": {
    "netops": {
      "command": "netops-mcp"
    }
  }
}
Usage Examples

Once connected, the AI agent can:

"Discover all devices on my local network 192.168.1.0/24"
"Scan ports 22, 80, 443 on 10.0.0.1"
"What OS is running on 192.168.1.100?"
"Look up the vendor for MAC address 00:0C:29:AA:BB:CC"
"Ping 8.8.8.8 to check connectivity"
Tool Details
discover_devices
Parameters:
  cidr (required) - Subnet in CIDR notation, e.g., "192.168.1.0/24"

Performs an ARP sweep: pings all IPs in the subnet to populate the ARP tabl

Tags

ai-agentgogolanglan-discoverymcpmcp-servermodel-context-protocolnetworknetwork-operations

Reviews

Loading reviews...

Quality Signals

0
Installs
Last updated21 days ago
Security: AREADME

Safety

Risk Levelmedium
Data Access
read
Network Accessnone

Details

Sourcegithub-crawl
Last commit3/25/2026
View on GitHub→

Embed Badge

[![Loaditout](https://loaditout.ai/api/badge/lybw/netops-mcp)](https://loaditout.ai/skills/lybw/netops-mcp)