SHARE
TWEET

IP-Multi-Tool

DSTAT Aug 29th, 2019 (edited) 421 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  3. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  4. Rem http://ddosfilter.net/
  5. title IP Multi Tool
  6. color 0A
  7. mode con lines=18 cols=70
  8. setlocal ENABLEDELAYEDEXPANSION
  9. set webclient=webclient
  10. set action=version
  11. IF EXIST "%temp%\response.txt" (
  12. del "%temp%\%webclient%.vbs" /f /q /s >nul
  13. del "%temp%\response.txt" /f /q /s >nul
  14. )
  15. echo.
  16. echo  Checking for updates. . .
  17. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  18. goto apirequest
  19. :checkversion
  20. set localversion=1.3.0.1
  21. set /p version=<"%temp%\response.txt"
  22. cls
  23. echo.
  24. echo  An update is available for IP Multi Tool^^!
  25. echo.
  26. echo.  New version: %version%
  27. echo.
  28. echo   Your version: %localversion%
  29. echo.
  30. if %localversion% EQU %version% goto menu
  31. if %localversion% NEQ %version% set /p dlupdate= Would you like to download the update? y/n:
  32. if '%dlupdate%'=='y' start https://pastebin.com/WbgYDjGS & del "%temp%\%webclient%.vbs" /f /q /s >nul & del "%temp%\response.txt" /f /q /s >nul & exit
  33. cls
  34. :menu
  35. set ip=127.0.0.1
  36. set action=0
  37. del "%temp%\%webclient%.vbs" /f /q /s >nul
  38. del "%temp%\response.txt" /f /q /s >nul
  39. mode con lines=18 cols=70
  40. cls
  41. echo Coded by @DDoS_Filter
  42. echo                       What would you like to do?
  43. echo.
  44. echo                            View your IP: (1)
  45. echo.
  46. echo                            Lookup an IP: (2)
  47. echo.
  48. echo                             Ping an IP: (3)
  49. echo.
  50. echo                          TraceRoute an IP: (4)
  51. echo.
  52. echo                           PortScan an IP: (5)
  53. echo.
  54. echo                         Find a websites IP: (6)
  55. echo.
  56. echo                            WhoIs Lookup: (7)
  57. goto action
  58. :input
  59. echo.
  60. echo Please enter a valid input option.
  61. echo.
  62. :action
  63. echo.
  64. set /p action=Type your choice. 1,2,3,4,5,6,7:
  65. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php?key=c8acHeruFreSehlxOxObrasw1fremedA" > %temp%\%webclient%.vbs & goto apirequest
  66. if '%action%'=='2' goto iplookup
  67. if '%action%'=='3' goto ipping
  68. if '%action%'=='4' goto traceroute
  69. if '%action%'=='5' goto portscan
  70. if '%action%'=='6' goto cfresolver
  71. if '%action%'=='7' goto whois
  72. goto input
  73. :apirequest
  74. if %action% NEQ version (
  75. cls
  76. echo.
  77. echo  Waiting for API response. . .
  78. )
  79. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  80. echo oHTTP.open "POST", sUrl,false >> %temp%\%webclient%.vbs
  81. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  82. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  83. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  84. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  85. echo strDirectory = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  86. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  87. echo set objFile = objFSO.CreateTextFile(strDirectory) >> %temp%\%webclient%.vbs
  88. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  89. echo objFile.Close >> %temp%\%webclient%.vbs
  90. echo Wscript.Quit >> %temp%\%webclient%.vbs
  91. start %temp%\%webclient%.vbs
  92. set /a requests=0
  93. :checkresponseexists
  94. set /a requests=%requests% + 1
  95. if %requests% gtr 12 goto failed
  96. IF EXIST "%temp%\response.txt" (
  97. goto response_exist
  98. ) ELSE (
  99. ping 127.0.0.1 -n 2 -w 1000 >nul
  100. goto checkresponseexists
  101. )
  102. :failed
  103. taskkill /f /im wscript.exe >nul
  104. del "%temp%\%webclient%.vbs" /f /q /s >nul
  105. echo.
  106. echo Did not receive a response from the API.
  107. echo.
  108. pause
  109. goto menu
  110. :response_exist
  111. find "banned" %temp%\response.txt >nul
  112. if %errorlevel% equ 0 goto banned
  113. find "One more step" %temp%\response.txt >nul
  114. if %errorlevel% equ 0 goto cbanned
  115. find "Web server is down" %temp%\response.txt >nul
  116. if %errorlevel% equ 0 goto offline
  117. find "404 Not Found" %temp%\response.txt >nul
  118. if %errorlevel% equ 0 goto offline
  119. goto verified
  120. :banned
  121. cls
  122. echo.
  123. echo  Error: You have been banned for abuse.
  124. ping 127.0.0.1 -n 4 -w 1000 >nul
  125. del "%temp%\%webclient%.vbs" /f /q /s >nul
  126. del "%temp%\response.txt" /f /q /s >nul
  127. exit
  128. :cbanned
  129. cls
  130. echo.
  131. echo  Error: Your country has been blocked for security purposes.
  132. echo  Contact @DDoS_Filter on instagram for help.
  133. echo  Sorry for any inconvinience.
  134. echo  If you are using a VPN and have received this error message,
  135. echo  turn off the VPN, and try again.
  136. ping 127.0.0.1 -n 8 -w 1000 >nul
  137. del "%temp%\%webclient%.vbs" /f /q /s >nul
  138. del "%temp%\response.txt" /f /q /s >nul
  139. exit
  140. :offline
  141. cls
  142. echo.
  143. echo  Error: The API is offline.
  144. ping 127.0.0.1 -n 4 -w 1000 >nul
  145. goto menu
  146. :verified
  147. if '%action%'=='version' goto checkversion
  148. if '%action%'=='5' goto parsepscan
  149. if '%action%'=='6' goto parsecfresolver
  150. if '%action%'=='7' goto parsewhois
  151. cls
  152. mode con lines=18 cols=70
  153. echo.
  154. for /f "delims=     " %%i in ('findstr /i "IP Decimal Organization ASN Hostname country State City Postal Latitude Longitude Currency Timezone Calling Error" %temp%\response.txt') do (
  155.     set data=%%i
  156.     echo !data!
  157. )
  158. echo.
  159. pause
  160. goto menu
  161. :iplookup
  162. cls
  163. echo.
  164. echo                          Type an IP to lookup
  165. echo.
  166. set /p ip=IP:
  167. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php?key=c8acHeruFreSehlxOxObrasw1fremedA&ip=%ip%" > %temp%\%webclient%.vbs
  168. goto apirequest
  169. :ipping
  170. rem Inteli-Ping by @DDoS_Filter
  171. set /a replies=0
  172. set /a timeouts=0
  173. cls
  174. echo.
  175. echo                       Type an IP or URL to ping
  176. set /p ip=Host:
  177. mode con lines=8 cols=30
  178. :ping
  179. ping %ip% -n 1 | find "Reply" >nul
  180. cls
  181. if errorlevel == 1 (
  182. set /a timeouts=%timeouts% + 1
  183. set status=Host is offline
  184. ) else (
  185. set /a replies=%replies% + 1
  186. set status=Host is online
  187. )
  188. cls
  189. echo Pinging %ip%
  190. echo.
  191. echo  %status%^^!
  192. echo.
  193. echo  Successful Replies: %replies%
  194. echo.
  195. echo  Requests Timed Out: %timeouts%
  196. ping 127.0.0.1 -n 2 -w 1000 >nul
  197. goto ping
  198. :traceroute
  199. cls
  200. echo.
  201. echo                    Type an IP or URL to trace route
  202. set /p ip=Host:
  203. mode con lines=20 cols=70
  204. tracert %ip%
  205. echo.
  206. pause
  207. goto menu
  208. :portscan
  209. cls
  210. echo.
  211. echo                         Type an IP to port scan
  212. set /p ip=IP:
  213. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php?key=zlSOgLsWequm8mUyagld7ibrOgOflniq&ip=%ip%" > %temp%\%webclient%.vbs
  214. goto apirequest
  215. :parsepscan
  216. mode con lines=21 cols=70
  217. cls
  218. echo.
  219. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  220.     set data=%%i
  221.     echo !data!
  222. )
  223. echo.
  224. pause
  225. goto menu
  226. :cfresolver
  227. cls
  228. echo.
  229. echo                         Type a domain to resolve
  230. set /p ip=Domain:
  231. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php?key=c8acHeruFreSehlxOxObrasw1fremedA&host=%ip%" > %temp%\%webclient%.vbs
  232. goto apirequest
  233. :parsecfresolver
  234. mode con lines=23 cols=70
  235. cls
  236. echo.
  237. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  238.     set data=%%i
  239.     echo !data!
  240. )
  241. echo.
  242. pause
  243. goto menu
  244. :whois
  245. cls
  246. echo.
  247. echo                        Type a host to WhoIs lookup
  248. set /p ip=Host:
  249. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php?key=spuqlc74preve03aPHudRek8sPu9r8Co&host=%ip%" > %temp%\%webclient%.vbs
  250. goto apirequest
  251. :parsewhois
  252. mode con lines=86 cols=100
  253. cls
  254. echo.
  255. for /f "delims=     " %%i in ('findstr /i ": Error" %temp%\response.txt') do (
  256.     set data=%%i
  257.     echo !data!
  258. )
  259. echo.
  260. pause
  261. goto menu
  262. exit
  263. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  264. Rem http://ddosfilter.net/
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top