G2A Many GEOs
SHARE
TWEET

IP-Multi-Tool

DSTAT Aug 29th, 2019 (edited) 9,268 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  3. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  4. Rem http://ddosfilter.net/
  5. Rem https://pastebin.com/WbgYDjGS
  6. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  7. title IP Multi Tool
  8. color 0A
  9. mode con lines=22 cols=70
  10. setlocal ENABLEDELAYEDEXPANSION
  11. set webclient=webclient
  12. set action=version
  13. set localversion=1.7.0.3
  14. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  15. echo.
  16. echo  Checking for updates. . .
  17. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  18. goto apirequest
  19. :checkversion
  20. set /p version=<"%temp%\response.txt"
  21. if %localversion% EQU %version% del "%temp%\response.txt" /f /q /s >nul & goto menu
  22. cls
  23. echo.
  24. echo  An update is available for IP Multi Tool^^!
  25. echo.
  26. echo.  New version: %version%
  27. echo.
  28. echo   Your version: %localversion%
  29. echo.
  30. set /p dlupdate= Would you like to download the update? y/n:
  31. if '%dlupdate%'=='y' (
  32. cls
  33. echo.
  34. echo  Downloading to Downloads folder. . .
  35. echo.
  36. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  37. goto apirequest
  38. :update
  39. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  40. if %errorlevel% NEQ 0 (
  41. echo  Error downloading update^^!
  42. echo.
  43. pause
  44. goto menu
  45. )
  46. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  47. set dlupdate=0
  48. echo  Starting updated version. . .
  49. ping 127.0.0.1 -n 2 -w 1000 >nul
  50. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  51. exit
  52. )
  53. :menu
  54. set ip=127.0.0.1
  55. set action=0
  56. mode con lines=22 cols=70
  57. cls
  58. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  59. echo                                  Menu
  60. echo.
  61. echo                            View your IP: (1)
  62. echo.
  63. echo                            Lookup an IP: (2)
  64. echo.
  65. echo                             Ping an IP: (3)
  66. echo.
  67. echo                          TraceRoute an IP: (4)
  68. echo.
  69. echo                           PortScan an IP: (5)
  70. echo.
  71. echo                         Find a websites IP: (6)
  72. echo.
  73. echo                            WhoIs Lookup: (7)
  74. echo.
  75. echo                              NSLookup: (8)
  76. echo.
  77. echo                         View response text: (9)
  78. echo.
  79. :action
  80. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9:
  81. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=d3lj8rumafLplPhodosplvaCoruchEga" >> %temp%\%webclient%.vbs & goto apirequest
  82. if '%action%'=='2' goto iplookup
  83. if '%action%'=='3' goto ipping
  84. if '%action%'=='4' goto traceroute
  85. if '%action%'=='5' goto portscan
  86. if '%action%'=='6' goto cfresolver
  87. if '%action%'=='7' goto whois
  88. if '%action%'=='8' goto nslookup
  89. if '%action%'=='9' goto opentext
  90. echo.
  91. echo Please enter a valid choice.
  92. echo.
  93. goto action
  94. :apirequest
  95. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  96. if %action% NEQ version (
  97. cls
  98. echo.
  99. echo  Waiting for API response. . .
  100. )
  101. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  102. echo oHTTP.open "POST", sUrl,false >> %temp%\%webclient%.vbs
  103. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  104. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  105. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  106. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  107. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  108. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  109. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  110. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  111. echo objFile.Close >> %temp%\%webclient%.vbs
  112. echo Wscript.Quit >> %temp%\%webclient%.vbs
  113. start %temp%\%webclient%.vbs
  114. set /a requests=0
  115. :checkresponseexists
  116. set /a requests=%requests% + 1
  117. if %requests% gtr 10 goto failed
  118. IF EXIST "%temp%\response.txt" (
  119. goto response_exist
  120. ) ELSE (
  121. ping 127.0.0.1 -n 2 -w 1000 >nul
  122. goto checkresponseexists
  123. )
  124. :failed
  125. tasklist | find "wscript.exe" >nul
  126. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  127. del "%temp%\%webclient%.vbs" /f /q /s >nul
  128. echo.
  129. echo  Did not receive a response from the API.
  130. echo.
  131. pause
  132. goto menu
  133. :response_exist
  134. del "%temp%\%webclient%.vbs" /f /q /s >nul
  135. if %action% EQU version if '%dlupdate%'=='y' goto update
  136. find "error code: 1006" %temp%\response.txt >nul
  137. if %errorlevel% EQU 0 goto banned
  138. find "One more step" %temp%\response.txt >nul
  139. if %errorlevel% EQU 0 goto cbanned
  140. find "Web server is down" %temp%\response.txt >nul
  141. if %errorlevel% EQU 0 goto offline
  142. find "Connection timed out" %temp%\response.txt >nul
  143. if %errorlevel% EQU 0 goto offline
  144. find "404 Not Found" %temp%\response.txt >nul
  145. if %errorlevel% EQU 0 goto offline
  146. goto verified
  147. :banned
  148. cls
  149. echo.
  150. echo  Error: You have been banned for abuse.
  151. ping 127.0.0.1 -n 4 -w 1000 >nul
  152. del "%temp%\response.txt" /f /q /s >nul
  153. exit
  154. :cbanned
  155. cls
  156. echo.
  157. echo  Error: Your IP has been blocked for security purposes.
  158. echo  Contact @DDoS_Filter on instagram for help.
  159. echo  Sorry for any inconvinience.
  160. echo  If you are using a VPN and have received this error message,
  161. echo  turn off the VPN, and try again.
  162. ping 127.0.0.1 -n 8 -w 1000 >nul
  163. del "%temp%\response.txt" /f /q /s >nul
  164. exit
  165. :offline
  166. cls
  167. echo.
  168. echo  Error: The API is offline.
  169. ping 127.0.0.1 -n 4 -w 1000 >nul
  170. del "%temp%\response.txt" /f /q /s >nul
  171. goto menu
  172. :verified
  173. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  174. for /f %%i in ('!data!') do set lines=%%i
  175. if %lines% LSS 10 (
  176. set /a lines=20
  177. ) else (
  178. set /a lines=%lines% + 3
  179. )
  180. if '%action%'=='version' goto checkversion
  181. if '%action%'=='1' goto parseiplookup
  182. if '%action%'=='2' goto parseiplookup
  183. if '%action%'=='5' goto parsepscan
  184. if '%action%'=='6' goto parsecfresolver
  185. if '%action%'=='7' goto parsewhois
  186. goto menu
  187. :iplookup
  188. cls
  189. echo.
  190. echo                          Type an IP to lookup
  191. echo.
  192. set /p ip=IP:
  193. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  194. echo sRequest = "key=d3lj8rumafLplPhodosplvaCoruchEga&ip=%ip%" >> %temp%\%webclient%.vbs
  195. goto apirequest
  196. :parseiplookup
  197. mode con lines=%lines% cols=70
  198. cls
  199. echo.
  200. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  201.     set data=%%i
  202.     echo !data!
  203. )
  204. echo.
  205. pause
  206. goto menu
  207. :ipping
  208. rem Inteli-Ping by @DDoS_Filter
  209. set /a replies=0
  210. set /a timeouts=0
  211. set responsetime=N/A
  212. set avgtime=N/A
  213. set min=N/A
  214. set max=N/A
  215. cls
  216. echo.
  217. echo                       Type an IP or URL to ping
  218. echo.
  219. set /p ip=Host:
  220. mode con lines=14 cols=30
  221. :ping
  222. set success=false
  223. for /F "tokens=7 delims=<>= " %%i in ('ping -n 1 %ip% ^| find "TTL="') do (
  224.     set responsetime=%%i
  225.     set responsetime=!responsetime:~0,-2!
  226.     set success=true
  227. )
  228. if %replies% EQU 0 if %success% EQU true if %replies% NEQ N/A set min=99999 & set max=0
  229. if %success% EQU false (
  230.     set status=Host is offline
  231.     set /a timeouts=timeouts + 1
  232.     color 0C
  233. ) else (
  234.     set status=Host is online
  235.     set /a replies=replies + 1
  236.     set /a totaltime=%totaltime% + %responsetime%
  237.     set /a avgtime=totaltime / replies
  238.     color 0A
  239.     if %responsetime% LSS %min% (
  240.         set min=%responsetime%
  241.     )
  242.     if %responsetime% GTR %max% (
  243.         set max=%responsetime%
  244.     )
  245. )
  246. cls
  247. echo Pinging %ip%
  248. echo.
  249. echo  %status%^^!
  250. echo.
  251. echo  Successful Replies: %replies%
  252. echo.
  253. echo  Requests Timed Out: %timeouts%
  254. echo.
  255. echo  Avrg Response Time: %avgtime%ms
  256. echo.
  257. echo  Last Response Time: %responsetime%ms
  258. echo.
  259. echo  Min: %min%ms  Max: %max%ms
  260. ping 127.0.0.1 -n 2 -w 1000 >nul
  261. goto ping
  262. :traceroute
  263. cls
  264. echo.
  265. echo                    Type an IP or URL to trace route
  266. echo.
  267. set /p ip=Host:
  268. tracert %ip%
  269. echo.
  270. pause
  271. goto menu
  272. :portscan
  273. cls
  274. echo.
  275. echo                        Type a host to port scan
  276. echo.
  277. set /p ip=Host:
  278. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  279. echo sRequest = "key=cHlnovU5tltHecrlfosTOSwlwlPr8nuw&ip=%ip%" >> %temp%\%webclient%.vbs
  280. goto apirequest
  281. :parsepscan
  282. mode con lines=%lines% cols=70
  283. cls
  284. echo.
  285. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  286.     set data=%%i
  287.     echo !data!
  288. )
  289. echo.
  290. pause
  291. goto menu
  292. :cfresolver
  293. cls
  294. echo.
  295. echo                         Type a domain to resolve
  296. echo.
  297. set /p ip=Domain:
  298. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  299. echo sRequest = "key=sE5axl24jiklREcr6bLvltutrlb1us7A&host=%ip%" >> %temp%\%webclient%.vbs
  300. goto apirequest
  301. :parsecfresolver
  302. mode con lines=%lines% cols=70
  303. cls
  304. echo.
  305. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  306.     set data=%%i
  307.     echo !data!
  308. )
  309. echo.
  310. pause
  311. goto menu
  312. :whois
  313. cls
  314. echo.
  315. echo                       Type a host to WhoIs lookup
  316. echo.
  317. set /p ip=Host:
  318. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  319. echo sRequest = "key=cl8AW6lPASo35os64PlZuyawRlbifU7u&host=%ip%" >> %temp%\%webclient%.vbs
  320. goto apirequest
  321. :parsewhois
  322. mode con lines=%lines% cols=100
  323. cls
  324. echo.
  325. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  326.     set data=%%i
  327.     echo !data!
  328. )
  329. echo.
  330. pause
  331. goto menu
  332. :nslookup
  333. cls
  334. echo.
  335. echo                    Type an IP or Domain to NSLookup
  336. echo.
  337. set /p ip=Host:
  338. cls
  339. echo.
  340. echo Name Server Look up using Cloudflare DNS. . .
  341. echo.
  342. nslookup %ip% 1.1.1.1
  343. echo.
  344. pause
  345. goto menu
  346. :opentext
  347. if exist "%temp%\response.txt" start %temp%/response.txt
  348. goto menu
  349. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  350. Rem http://ddosfilter.net/
  351. Rem https://pastebin.com/WbgYDjGS
RAW Paste Data
Ledger Nano X - The secure hardware wallet
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top