DSTAT

IP-Multi-Tool

Aug 29th, 2019 (edited)
20,216
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  3. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  4. Rem http://ddosfilter.net/
  5. Rem https://pastebin.com/WbgYDjGS
  6. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  7. title IP Multi Tool
  8. color 0A
  9. mode con lines=22 cols=70
  10. setlocal ENABLEDELAYEDEXPANSION
  11. set webclient=webclient
  12. set action=update
  13. set rqst_type=GET
  14. set localversion=1.7.0.5
  15. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  16. echo.
  17. echo  Checking for updates. . .
  18. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  19. goto apirequest
  20. :checkversion
  21. set /p version=<"%temp%\response.txt"
  22. if %localversion% EQU %version% del "%temp%\response.txt" /f /q /s >nul & goto menu
  23. cls
  24. echo.
  25. echo  An update is available for IP Multi Tool^^!
  26. echo.
  27. echo.  New version: %version%
  28. echo.
  29. echo   Your version: %localversion%
  30. echo.
  31. set /p dlupdate= Would you like to download the update? y/n:
  32. if '%dlupdate%'=='y' (
  33. cls
  34. echo.
  35. echo  Downloading to Downloads folder. . .
  36. echo.
  37. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  38. goto apirequest
  39. :update
  40. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  41. if %errorlevel% NEQ 0 (
  42. echo  Error downloading update^^!
  43. echo.
  44. pause
  45. goto menu
  46. )
  47. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  48. set dlupdate=0
  49. echo  Starting updated version. . .
  50. ping 127.0.0.1 -n 2 -w 1000 >nul
  51. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  52. exit
  53. )
  54. :menu
  55. set ip=127.0.0.1
  56. set action=0
  57. mode con lines=22 cols=70
  58. cls
  59. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  60. echo                                  Menu
  61. echo.
  62. echo                            View your IP: (1)
  63. echo.
  64. echo                            Lookup an IP: (2)
  65. echo.
  66. echo                             Ping an IP: (3)
  67. echo.
  68. echo                          TraceRoute an IP: (4)
  69. echo.
  70. echo                           PortScan an IP: (5)
  71. echo.
  72. echo                         Find a websites IP: (6)
  73. echo.
  74. echo                            WhoIs Lookup: (7)
  75. echo.
  76. echo                              NSLookup: (8)
  77. echo.
  78. echo                         View response text: (9)
  79. echo.
  80. :action
  81. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9:
  82. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5" >> %temp%\%webclient%.vbs & goto apirequest
  83. if '%action%'=='2' goto iplookup
  84. if '%action%'=='3' goto ipping
  85. if '%action%'=='4' goto traceroute
  86. if '%action%'=='5' goto portscan
  87. if '%action%'=='6' goto cfresolver
  88. if '%action%'=='7' goto whois
  89. if '%action%'=='8' goto nslookup
  90. if '%action%'=='9' goto opentext
  91. echo.
  92. echo Please enter a valid choice.
  93. echo.
  94. goto action
  95. :apirequest
  96. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  97. if %action% NEQ update (
  98. set rqst_type=POST
  99. cls
  100. echo.
  101. echo  Waiting for API response. . .
  102. )
  103. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  104. echo oHTTP.open "%rqst_type%", sUrl,false >> %temp%\%webclient%.vbs
  105. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  106. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  107. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  108. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  109. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  110. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  111. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  112. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  113. echo objFile.Close >> %temp%\%webclient%.vbs
  114. echo Wscript.Quit >> %temp%\%webclient%.vbs
  115. start %temp%\%webclient%.vbs
  116. set /a requests=0
  117. :checkresponseexists
  118. set /a requests=%requests% + 1
  119. if %requests% gtr 10 goto failed
  120. IF EXIST "%temp%\response.txt" (
  121. goto response_exist
  122. ) ELSE (
  123. ping 127.0.0.1 -n 2 -w 1000 >nul
  124. goto checkresponseexists
  125. )
  126. :failed
  127. tasklist | find "wscript.exe" >nul
  128. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  129. del "%temp%\%webclient%.vbs" /f /q /s >nul
  130. echo.
  131. echo  Did not receive a response from the API.
  132. echo.
  133. pause
  134. goto menu
  135. :response_exist
  136. del "%temp%\%webclient%.vbs" /f /q /s >nul
  137. if %action% EQU update if '%dlupdate%'=='y' goto update
  138. find "error code: 1006" %temp%\response.txt >nul
  139. if %errorlevel% EQU 0 goto banned
  140. find "One more step" %temp%\response.txt >nul
  141. if %errorlevel% EQU 0 goto cbanned
  142. find "Web server is down" %temp%\response.txt >nul
  143. if %errorlevel% EQU 0 goto offline
  144. find "Connection timed out" %temp%\response.txt >nul
  145. if %errorlevel% EQU 0 goto offline
  146. find "404 Not Found" %temp%\response.txt >nul
  147. if %errorlevel% EQU 0 goto offline
  148. goto verified
  149. :banned
  150. cls
  151. echo.
  152. echo  Error: You have been banned for abuse.
  153. ping 127.0.0.1 -n 4 -w 1000 >nul
  154. del "%temp%\response.txt" /f /q /s >nul
  155. exit
  156. :cbanned
  157. cls
  158. echo.
  159. echo  Error: Your IP has been blocked for security purposes.
  160. echo  Contact @DDoS_Filter on instagram for help.
  161. echo  Sorry for any inconvinience.
  162. echo  If you are using a VPN and have received this error message,
  163. echo  turn off the VPN, and try again.
  164. ping 127.0.0.1 -n 8 -w 1000 >nul
  165. del "%temp%\response.txt" /f /q /s >nul
  166. exit
  167. :offline
  168. cls
  169. echo.
  170. echo  Error: The API is offline.
  171. ping 127.0.0.1 -n 4 -w 1000 >nul
  172. del "%temp%\response.txt" /f /q /s >nul
  173. goto menu
  174. :verified
  175. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  176. for /f %%i in ('!data!') do set lines=%%i
  177. if %lines% LSS 10 (
  178. set /a lines=20
  179. ) else (
  180. set /a lines=%lines% + 3
  181. )
  182. if '%action%'=='update' goto checkversion
  183. if '%action%'=='1' goto parseiplookup
  184. if '%action%'=='2' goto parseiplookup
  185. if '%action%'=='5' goto parsepscan
  186. if '%action%'=='6' goto parsecfresolver
  187. if '%action%'=='7' goto parsewhois
  188. goto menu
  189. :iplookup
  190. cls
  191. echo.
  192. echo                          Type an IP to lookup
  193. echo.
  194. set /p ip=IP:
  195. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  196. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
  197. goto apirequest
  198. :parseiplookup
  199. mode con lines=%lines% cols=70
  200. cls
  201. echo.
  202. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  203.     set data=%%i
  204.     echo !data!
  205. )
  206. echo.
  207. pause
  208. goto menu
  209. :ipping
  210. rem Inteli-Ping by @DDoS_Filter
  211. set /a replies=0
  212. set /a timeouts=0
  213. set responsetime=N/A
  214. set avgtime=N/A
  215. set min=N/A
  216. set max=N/A
  217. cls
  218. echo.
  219. echo                       Type an IP or URL to ping
  220. echo.
  221. set /p ip=Host:
  222. mode con lines=14 cols=30
  223. :ping
  224. set success=false
  225. for /F "tokens=7 delims=<>= " %%i in ('ping -n 1 %ip% ^| find "TTL="') do (
  226.     set responsetime=%%i
  227.     set responsetime=!responsetime:~0,-2!
  228.     set success=true
  229. )
  230. if %replies% EQU 0 if %success% EQU true if %replies% NEQ N/A set min=99999 & set max=0
  231. if %success% EQU false (
  232.     set status=Host is offline
  233.     set /a timeouts=timeouts + 1
  234.     color 0C
  235. ) else (
  236.     set status=Host is online
  237.     set /a replies=replies + 1
  238.     set /a totaltime=%totaltime% + %responsetime%
  239.     set /a avgtime=totaltime / replies
  240.     color 0A
  241.     if %responsetime% LSS %min% (
  242.         set min=%responsetime%
  243.     )
  244.     if %responsetime% GTR %max% (
  245.         set max=%responsetime%
  246.     )
  247. )
  248. cls
  249. echo Pinging %ip%
  250. echo.
  251. echo  %status%^^!
  252. echo.
  253. echo  Successful Replies: %replies%
  254. echo.
  255. echo  Requests Timed Out: %timeouts%
  256. echo.
  257. echo  Avrg Response Time: %avgtime%ms
  258. echo.
  259. echo  Last Response Time: %responsetime%ms
  260. echo.
  261. echo  Min: %min%ms  Max: %max%ms
  262. ping 127.0.0.1 -n 2 -w 1000 >nul
  263. goto ping
  264. :traceroute
  265. cls
  266. echo.
  267. echo                    Type an IP or URL to trace route
  268. echo.
  269. set /p ip=Host:
  270. tracert %ip%
  271. echo.
  272. pause
  273. goto menu
  274. :portscan
  275. cls
  276. echo.
  277. echo                        Type a host to port scan
  278. echo.
  279. set /p ip=Host:
  280. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  281. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&ip=%ip%" >> %temp%\%webclient%.vbs
  282. goto apirequest
  283. :parsepscan
  284. mode con lines=%lines% cols=70
  285. cls
  286. echo.
  287. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  288.     set data=%%i
  289.     echo !data!
  290. )
  291. echo.
  292. pause
  293. goto menu
  294. :cfresolver
  295. cls
  296. echo.
  297. echo                         Type a domain to resolve
  298. echo.
  299. set /p ip=Domain:
  300. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  301. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
  302. goto apirequest
  303. :parsecfresolver
  304. mode con lines=%lines% cols=70
  305. cls
  306. echo.
  307. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  308.     set data=%%i
  309.     echo !data!
  310. )
  311. echo.
  312. pause
  313. goto menu
  314. :whois
  315. cls
  316. echo.
  317. echo                       Type a host to WhoIs lookup
  318. echo.
  319. set /p ip=Host:
  320. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  321. echo sRequest = "key=j6preqIcucHathBgluhlthuq9frlqop5&host=%ip%" >> %temp%\%webclient%.vbs
  322. goto apirequest
  323. :parsewhois
  324. mode con lines=%lines% cols=100
  325. cls
  326. echo.
  327. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  328.     set data=%%i
  329.     echo !data!
  330. )
  331. echo.
  332. pause
  333. goto menu
  334. :nslookup
  335. cls
  336. echo.
  337. echo                    Type an IP or Domain to NSLookup
  338. echo.
  339. set /p ip=Host:
  340. cls
  341. echo.
  342. echo Name Server Look up using Cloudflare DNS. . .
  343. echo.
  344. nslookup %ip% 1.1.1.1
  345. echo.
  346. pause
  347. goto menu
  348. :opentext
  349. if exist "%temp%\response.txt" start %temp%/response.txt
  350. goto menu
  351. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  352. Rem http://ddosfilter.net/
  353. Rem https://pastebin.com/WbgYDjGS
RAW Paste Data