SHARE
TWEET

IP-Multi-Tool

DSTAT Aug 29th, 2019 (edited) 4,520 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  3. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  4. Rem http://ddosfilter.net/
  5. Rem https://pastebin.com/WbgYDjGS
  6. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  7. title IP Multi Tool
  8. color 0A
  9. mode con lines=22 cols=70
  10. setlocal ENABLEDELAYEDEXPANSION
  11. set webclient=webclient
  12. set action=version
  13. set localversion=1.6.0.1
  14. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  15. echo.
  16. echo  Checking for updates. . .
  17. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  18. goto apirequest
  19. :checkversion
  20. set /p version=<"%temp%\response.txt"
  21. if %localversion% EQU %version% del "%temp%\response.txt" /f /q /s >nul & goto menu
  22. cls
  23. echo.
  24. echo  An update is available for IP Multi Tool^^!
  25. echo.
  26. echo.  New version: %version%
  27. echo.
  28. echo   Your version: %localversion%
  29. echo.
  30. set /p dlupdate= Would you like to download the update? y/n:
  31. if '%dlupdate%'=='y' (
  32. cls
  33. echo.
  34. echo  Downloading to Downloads folder. . .
  35. echo.
  36. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  37. goto apirequest
  38. :update
  39. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  40. if %errorlevel% NEQ 0 (
  41. echo  Error downloading update^^!
  42. echo.
  43. pause
  44. goto menu
  45. )
  46. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  47. set dlupdate=0
  48. echo  Starting updated version. . .
  49. ping 127.0.0.1 -n 2 -w 1000 >nul
  50. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  51. exit
  52. )
  53. :menu
  54. set ip=127.0.0.1
  55. set action=0
  56. mode con lines=22 cols=70
  57. cls
  58. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  59. echo                                  Menu
  60. echo.
  61. echo                            View your IP: (1)
  62. echo.
  63. echo                            Lookup an IP: (2)
  64. echo.
  65. echo                             Ping an IP: (3)
  66. echo.
  67. echo                          TraceRoute an IP: (4)
  68. echo.
  69. echo                           PortScan an IP: (5)
  70. echo.
  71. echo                         Find a websites IP: (6)
  72. echo.
  73. echo                            WhoIs Lookup: (7)
  74. echo.
  75. echo                              NSLookup: (8)
  76. echo.
  77. echo                         View response text: (9)
  78. echo.
  79. :action
  80. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9:
  81. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=d3lj8rumafLplPhodosplvaCoruchEga" >> %temp%\%webclient%.vbs & goto apirequest
  82. if '%action%'=='2' goto iplookup
  83. if '%action%'=='3' goto ipping
  84. if '%action%'=='4' goto traceroute
  85. if '%action%'=='5' goto portscan
  86. if '%action%'=='6' goto cfresolver
  87. if '%action%'=='7' goto whois
  88. if '%action%'=='8' goto nslookup
  89. if '%action%'=='9' goto opentext
  90. echo.
  91. echo Please enter a valid choice.
  92. echo.
  93. goto action
  94. :apirequest
  95. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  96. if %action% NEQ version (
  97. cls
  98. echo.
  99. echo  Waiting for API response. . .
  100. )
  101. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  102. echo oHTTP.open "POST", sUrl,false >> %temp%\%webclient%.vbs
  103. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  104. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  105. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  106. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  107. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  108. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  109. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  110. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  111. echo objFile.Close >> %temp%\%webclient%.vbs
  112. echo Wscript.Quit >> %temp%\%webclient%.vbs
  113. start %temp%\%webclient%.vbs
  114. set /a requests=0
  115. :checkresponseexists
  116. set /a requests=%requests% + 1
  117. if %requests% gtr 12 goto failed
  118. IF EXIST "%temp%\response.txt" (
  119. goto response_exist
  120. ) ELSE (
  121. ping 127.0.0.1 -n 2 -w 1000 >nul
  122. goto checkresponseexists
  123. )
  124. :failed
  125. tasklist | find "wscript.exe" >nul
  126. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  127. del "%temp%\%webclient%.vbs" /f /q /s >nul
  128. echo.
  129. echo  Did not receive a response from the API.
  130. echo.
  131. pause
  132. goto menu
  133. :response_exist
  134. del "%temp%\%webclient%.vbs" /f /q /s >nul
  135. if %action% EQU version if '%dlupdate%'=='y' goto update
  136. find "banned" %temp%\response.txt >nul
  137. if %errorlevel% EQU 0 goto banned
  138. find "One more step" %temp%\response.txt >nul
  139. if %errorlevel% EQU 0 goto cbanned
  140. find "Web server is down" %temp%\response.txt >nul
  141. if %errorlevel% EQU 0 goto offline
  142. find "Connection timed out" %temp%\response.txt >nul
  143. if %errorlevel% EQU 0 goto offline
  144. find "404 Not Found" %temp%\response.txt >nul
  145. if %errorlevel% EQU 0 goto offline
  146. goto verified
  147. :banned
  148. cls
  149. echo.
  150. echo  Error: You have been banned for abuse.
  151. ping 127.0.0.1 -n 4 -w 1000 >nul
  152. del "%temp%\response.txt" /f /q /s >nul
  153. exit
  154. :cbanned
  155. cls
  156. echo.
  157. echo  Error: Your IP has been blocked for security purposes.
  158. echo  Contact @DDoS_Filter on instagram for help.
  159. echo  Sorry for any inconvinience.
  160. echo  If you are using a VPN and have received this error message,
  161. echo  turn off the VPN, and try again.
  162. ping 127.0.0.1 -n 8 -w 1000 >nul
  163. del "%temp%\response.txt" /f /q /s >nul
  164. exit
  165. :offline
  166. cls
  167. echo.
  168. echo  Error: The API is offline.
  169. ping 127.0.0.1 -n 4 -w 1000 >nul
  170. del "%temp%\response.txt" /f /q /s >nul
  171. goto menu
  172. :verified
  173. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  174. for /f %%i in ('!data!') do set lines=%%i
  175. if %lines% LSS 10 (
  176. set /a lines=20
  177. ) else (
  178. set /a lines=%lines% + 3
  179. )
  180. if '%action%'=='version' goto checkversion
  181. if '%action%'=='1' goto parseiplookup
  182. if '%action%'=='2' goto parseiplookup
  183. if '%action%'=='5' goto parsepscan
  184. if '%action%'=='6' goto parsecfresolver
  185. if '%action%'=='7' goto parsewhois
  186. goto menu
  187. :iplookup
  188. cls
  189. echo.
  190. echo                          Type an IP to lookup
  191. echo.
  192. set /p ip=IP:
  193. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  194. echo sRequest = "key=d3lj8rumafLplPhodosplvaCoruchEga&ip=%ip%" >> %temp%\%webclient%.vbs
  195. goto apirequest
  196. :parseiplookup
  197. mode con lines=%lines% cols=70
  198. cls
  199. echo.
  200. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  201.     set data=%%i
  202.     echo !data!
  203. )
  204. echo.
  205. pause
  206. goto menu
  207. :ipping
  208. rem Inteli-Ping by @DDoS_Filter
  209. set /a replies=0
  210. set /a timeouts=0
  211. cls
  212. echo.
  213. echo                       Type an IP or URL to ping
  214. echo.
  215. set /p ip=Host:
  216. mode con lines=8 cols=30
  217. :ping
  218. ping %ip% -n 1 | find "Reply" >nul
  219. if %errorlevel% EQU 1 (
  220. set /a timeouts=%timeouts% + 1
  221. set status=Host is offline
  222. ) else (
  223. set /a replies=%replies% + 1
  224. set status=Host is online
  225. )
  226. cls
  227. echo Pinging %ip%
  228. echo.
  229. echo  %status%^^!
  230. echo.
  231. echo  Successful Replies: %replies%
  232. echo.
  233. echo  Requests Timed Out: %timeouts%
  234. ping 127.0.0.1 -n 2 -w 1000 >nul
  235. goto ping
  236. :traceroute
  237. cls
  238. echo.
  239. echo                    Type an IP or URL to trace route
  240. echo.
  241. set /p ip=Host:
  242. tracert %ip%
  243. echo.
  244. pause
  245. goto menu
  246. :portscan
  247. cls
  248. echo.
  249. echo                        Type a host to port scan
  250. echo.
  251. set /p ip=Host:
  252. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  253. echo sRequest = "key=cHlnovU5tltHecrlfosTOSwlwlPr8nuw&ip=%ip%" >> %temp%\%webclient%.vbs
  254. goto apirequest
  255. :parsepscan
  256. mode con lines=%lines% cols=70
  257. cls
  258. echo.
  259. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  260.     set data=%%i
  261.     echo !data!
  262. )
  263. echo.
  264. pause
  265. goto menu
  266. :cfresolver
  267. cls
  268. echo.
  269. echo                         Type a domain to resolve
  270. echo.
  271. set /p ip=Domain:
  272. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  273. echo sRequest = "key=sE5axl24jiklREcr6bLvltutrlb1us7A&host=%ip%" >> %temp%\%webclient%.vbs
  274. goto apirequest
  275. :parsecfresolver
  276. mode con lines=%lines% cols=70
  277. cls
  278. echo.
  279. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  280.     set data=%%i
  281.     echo !data!
  282. )
  283. echo.
  284. pause
  285. goto menu
  286. :whois
  287. cls
  288. echo.
  289. echo                       Type a host to WhoIs lookup
  290. echo.
  291. set /p ip=Host:
  292. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  293. echo sRequest = "key=cl8AW6lPASo35os64PlZuyawRlbifU7u&host=%ip%" >> %temp%\%webclient%.vbs
  294. goto apirequest
  295. :parsewhois
  296. mode con lines=%lines% cols=100
  297. cls
  298. echo.
  299. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  300.     set data=%%i
  301.     echo !data!
  302. )
  303. echo.
  304. pause
  305. goto menu
  306. :nslookup
  307. cls
  308. echo.
  309. echo                    Type an IP or Domain to NSLookup
  310. echo.
  311. set /p ip=Host:
  312. cls
  313. echo.
  314. echo Name Server Look up using Cloudflare DNS. . .
  315. echo.
  316. nslookup %ip% 1.1.1.1
  317. echo.
  318. pause
  319. goto menu
  320. :opentext
  321. if exist "%temp%\response.txt" start %temp%/response.txt
  322. goto menu
  323. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  324. Rem http://ddosfilter.net/
  325. Rem https://pastebin.com/WbgYDjGS
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top