Advertisement
DSTAT

IP-Multi-Tool

Aug 29th, 2019 (edited)
35,048
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 10.62 KB | None | 0 0
  1. @echo off
  2. Rem This tool is intended for educational and research purposes only. The author of this tool does not condone illegal activities, and the tool should not be used to cause harm to any individual, service, or organization. By using this tool, you acknowledge that any misuse of the tool is entirely your responsibility, and you accept full liability for your actions.
  3. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  4. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  5. Rem Copyright © [2019] [@DDoS_Filter] https://www.copyright.gov/dmca/
  6. Rem http://ddosfilter.net/
  7. Rem https://pastebin.com/WbgYDjGS
  8. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  9. title IP Multi Tool
  10. color 0A
  11. setlocal ENABLEDELAYEDEXPANSION
  12. set webclient=webclient
  13. set localversion=1.8.0.6
  14. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  15. :menu
  16. mode con lines=24 cols=70
  17. set ip=127.0.0.1
  18. set action=0
  19. cls
  20. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  21. echo                                  Menu
  22. echo.
  23. echo                            View Your IP: (1)
  24. echo.
  25. echo                            Lookup An IP: (2)
  26. echo.
  27. echo                             Ping An IP: (3)
  28. echo.
  29. echo                          TraceRoute An IP: (4)
  30. echo.
  31. echo                           PortScan An IP: (5)
  32. echo.
  33. echo                         Domain To IP Lookup: (6)
  34. echo.
  35. echo                            WhoIs Lookup: (7)
  36. echo.
  37. echo                              NSLookup: (8)
  38. echo.
  39. echo                         View Response Text: (9)
  40. echo.
  41. echo                         Check For Updates: (10)
  42. echo.
  43. :action
  44. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9,10:
  45. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN" >> %temp%\%webclient%.vbs & goto apirequest
  46. if '%action%'=='2' goto iplookup
  47. if '%action%'=='3' goto ipping
  48. if '%action%'=='4' goto traceroute
  49. if '%action%'=='5' goto portscan
  50. if '%action%'=='6' goto domain2ip
  51. if '%action%'=='7' goto whois
  52. if '%action%'=='8' goto nslookup
  53. if '%action%'=='9' goto opentext
  54. if '%action%'=='10' goto update_ipmt
  55. echo.
  56. echo Please enter a valid choice.
  57. echo.
  58. goto action
  59. :apirequest
  60. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  61. if %action% NEQ update (
  62. set rqst_type=POST
  63. cls
  64. echo.
  65. echo  Waiting for API response. . .
  66. )
  67. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  68. echo oHTTP.open "%rqst_type%", sUrl,false >> %temp%\%webclient%.vbs
  69. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  70. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  71. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  72. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  73. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  74. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  75. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  76. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  77. echo objFile.Close >> %temp%\%webclient%.vbs
  78. echo Wscript.Quit >> %temp%\%webclient%.vbs
  79. start %temp%\%webclient%.vbs
  80. set /a requests=0
  81. :checkresponseexists
  82. set /a requests=%requests% + 1
  83. if %requests% gtr 10 goto failed
  84. IF EXIST "%temp%\response.txt" (
  85. goto response_exist
  86. ) ELSE (
  87. ping 127.0.0.1 -n 2 -w 1000 >nul
  88. goto checkresponseexists
  89. )
  90. :failed
  91. tasklist | find "wscript.exe" >nul
  92. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  93. del "%temp%\%webclient%.vbs" /f /q /s >nul
  94. echo.
  95. echo  Did not receive a response from the API.
  96. echo.
  97. pause
  98. goto menu
  99. :response_exist
  100. del "%temp%\%webclient%.vbs" /f /q /s >nul
  101. if %action% EQU update if '%dlupdate%'=='y' goto update
  102. find "error code: 1006" %temp%\response.txt >nul
  103. if %errorlevel% EQU 0 goto banned
  104. find "One more step" %temp%\response.txt >nul
  105. if %errorlevel% EQU 0 goto cbanned
  106. find "Web server is down" %temp%\response.txt >nul
  107. if %errorlevel% EQU 0 goto offline
  108. find "Connection timed out" %temp%\response.txt >nul
  109. if %errorlevel% EQU 0 goto offline
  110. find "404 Not Found" %temp%\response.txt >nul
  111. if %errorlevel% EQU 0 goto offline
  112. goto verified
  113. :banned
  114. cls
  115. echo.
  116. echo  Error: You have been banned for abuse.
  117. ping 127.0.0.1 -n 4 -w 1000 >nul
  118. del "%temp%\response.txt" /f /q /s >nul
  119. exit
  120. :cbanned
  121. cls
  122. echo.
  123. echo  Error: Your IP has been blocked for security purposes.
  124. echo  Contact @DDoS_Filter on instagram for help.
  125. echo  Sorry for any inconvinience.
  126. echo  If you are using a VPN and have received this error message,
  127. echo  turn off the VPN, and try again.
  128. ping 127.0.0.1 -n 8 -w 1000 >nul
  129. del "%temp%\response.txt" /f /q /s >nul
  130. exit
  131. :offline
  132. cls
  133. echo.
  134. echo  Error: The API is offline.
  135. ping 127.0.0.1 -n 4 -w 1000 >nul
  136. del "%temp%\response.txt" /f /q /s >nul
  137. goto menu
  138. :verified
  139. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  140. for /f %%i in ('!data!') do set lines=%%i
  141. if %lines% LSS 10 (
  142. set /a lines=20
  143. ) else (
  144. set /a lines=%lines% + 3
  145. )
  146. if '%action%'=='update' goto checkversion
  147. if '%action%'=='1' goto parseiplookup
  148. if '%action%'=='2' goto parseiplookup
  149. if '%action%'=='5' goto parsepscan
  150. if '%action%'=='6' goto parsedomain2ip
  151. if '%action%'=='7' goto parsewhois
  152. goto menu
  153. :iplookup
  154. cls
  155. echo.
  156. echo                          Type an IP to lookup
  157. echo.
  158. set /p ip=IP:
  159. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  160. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%" >> %temp%\%webclient%.vbs
  161. goto apirequest
  162. :parseiplookup
  163. mode con lines=%lines% cols=70
  164. cls
  165. echo.
  166. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  167.     set data=%%i
  168.     echo !data!
  169. )
  170. echo.
  171. pause
  172. goto menu
  173. :ipping
  174. rem Inteli-Ping by @DDoS_Filter
  175. set /a replies=0
  176. set /a timeouts=0
  177. set /a packets_sent=0
  178. set responsetime=N/A
  179. set avgtime=N/A
  180. set min=N/A
  181. set max=N/A
  182. cls
  183. echo.
  184. echo                       Type an IP or URL to ping
  185. echo.
  186. set /p ip=Host:
  187. echo.
  188. set /p ipv6= IPv6? y/n:
  189. if '%ipv6%'=='y' (
  190.     set tokens=5
  191.     set searchstring=: time
  192. ) else (
  193.     set tokens=7
  194.     set searchstring=time
  195. )
  196. mode con lines=16 cols=30
  197. :ping
  198. set success=false
  199. for /F "tokens=%tokens% delims=<>= " %%i in ('ping -n 1 %ip% ^| find "%searchstring%"') do (
  200.     set responsetime=%%i
  201.     set responsetime=!responsetime:~0,-2!
  202.     set success=true
  203. )
  204. set /a packets_sent=packets_sent + 1
  205. if %replies% EQU 0 if %success% EQU true if %replies% NEQ N/A set min=99999 & set max=0
  206. if %success% EQU false (
  207.     set status=Host is offline
  208.     set /a timeouts=timeouts + 1
  209.     color 0C
  210. ) else (
  211.     set status=Host is online
  212.     set /a replies=replies + 1
  213.     set /a totaltime=%totaltime% + %responsetime%
  214.     set /a avgtime=totaltime / replies
  215.     color 0A
  216.     if %responsetime% LSS %min% (
  217.         set min=%responsetime%
  218.     )
  219.     if %responsetime% GTR %max% (
  220.         set max=%responsetime%
  221.     )
  222. )
  223. set /a packet_loss=((packets_sent-timeouts)*100)/packets_sent
  224. cls
  225. echo Pinging %ip%
  226. echo.
  227. echo  %status%^^!
  228. echo.
  229. echo  Successful Replies: %replies%
  230. echo.
  231. echo  Requests Timed Out: %timeouts%
  232. echo.
  233. echo  Success Percentage: %packet_loss%
  234. echo.
  235. echo  Avrg Response Time: %avgtime%ms
  236. echo.
  237. echo  Last Response Time: %responsetime%ms
  238. echo.
  239. echo  Min: %min%ms  Max: %max%ms
  240. ping 127.0.0.1 -n 2 -w 1000 >nul
  241. goto ping
  242. :traceroute
  243. mode con lines=30 cols=100
  244. cls
  245. echo.
  246. echo                                   Type an IP or URL to trace route
  247. echo.
  248. set /p ip=Host:
  249. tracert %ip%
  250. echo.
  251. pause
  252. goto menu
  253. :portscan
  254. cls
  255. echo.
  256. echo                        Type a host to port scan
  257. echo.
  258. set /p ip=Host:
  259. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  260. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%" >> %temp%\%webclient%.vbs
  261. goto apirequest
  262. :parsepscan
  263. mode con lines=%lines% cols=70
  264. cls
  265. echo.
  266. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  267.     set data=%%i
  268.     echo !data!
  269. )
  270. echo.
  271. pause
  272. goto menu
  273. :domain2ip
  274. cls
  275. echo.
  276. echo                         Type a domain to lookup
  277. echo.
  278. set /p ip=Domain:
  279. echo sUrl = "https://api.ddosfilter.net/DomainToIP.php" > %temp%\%webclient%.vbs
  280. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%" >> %temp%\%webclient%.vbs
  281. goto apirequest
  282. :parsedomain2ip
  283. mode con lines=%lines% cols=70
  284. cls
  285. echo.
  286. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  287.     set data=%%i
  288.     echo !data!
  289. )
  290. echo.
  291. pause
  292. goto menu
  293. :whois
  294. cls
  295. echo.
  296. echo                       Type a host to WhoIs lookup
  297. echo.
  298. set /p ip=Host:
  299. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  300. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%" >> %temp%\%webclient%.vbs
  301. goto apirequest
  302. :parsewhois
  303. mode con lines=%lines% cols=100
  304. cls
  305. echo.
  306. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  307.     set data=%%i
  308.     echo !data!
  309. )
  310. echo.
  311. pause
  312. goto menu
  313. :nslookup
  314. cls
  315. echo.
  316. echo                    Type an IP or Domain to NSLookup
  317. echo.
  318. set /p ip=Host:
  319. cls
  320. echo.
  321. echo Name Server Look up using Cloudflare DNS. . .
  322. echo.
  323. nslookup %ip% 1.1.1.1
  324. echo.
  325. pause
  326. goto menu
  327. :opentext
  328. if exist "%temp%\response.txt" start %temp%/response.txt
  329. goto menu
  330. :update_ipmt
  331. cls
  332. set action=update
  333. set rqst_type=GET
  334. echo.
  335. echo  Checking for updates. . .
  336. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  337. goto apirequest
  338. :checkversion
  339. set /p version=<"%temp%\response.txt"
  340. if %localversion% EQU %version% (
  341. del "%temp%\response.txt" /f /q /s >nul
  342. echo.
  343. echo  You are on the latest version^^!
  344. echo.
  345. echo  Version: %version%
  346. echo.
  347. pause
  348. goto menu
  349. )
  350. cls
  351. echo.
  352. echo  An update is available for IP Multi Tool^^!
  353. echo.
  354. echo.  New version: %version%
  355. echo.
  356. echo   Your version: %localversion%
  357. echo.
  358. set /p dlupdate= Would you like to download the update? y/n:
  359. if '%dlupdate%'=='y' (
  360. cls
  361. echo.
  362. echo  Downloading to Downloads folder. . .
  363. echo.
  364. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  365. goto apirequest
  366. :update
  367. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  368. if %errorlevel% NEQ 0 (
  369. echo  Error downloading update^^!
  370. echo.
  371. pause
  372. goto menu
  373. )
  374. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  375. set dlupdate=0
  376. echo  Starting updated version. . .
  377. ping 127.0.0.1 -n 2 -w 1000 >nul
  378. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  379. exit
  380. ) else (
  381. goto menu
  382. )
  383. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  384. Rem http://ddosfilter.net/
  385. Rem https://pastebin.com/WbgYDjGS
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement