Advertisement
DSTAT

IP-Multi-Tool

Aug 29th, 2019 (edited)
32,014
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 10.56 KB | None | 0 0
  1. @echo off
  2. Rem This tool is intended for educational and research purposes only. The author of this tool does not condone illegal activities, and the tool should not be used to cause harm to any individual, service, or organization. By using this tool, you acknowledge that any misuse of the tool is entirely your responsibility, and you accept full liability for your actions.
  3. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  4. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  5. Rem http://ddosfilter.net/
  6. Rem https://pastebin.com/WbgYDjGS
  7. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  8. title IP Multi Tool
  9. color 0A
  10. setlocal ENABLEDELAYEDEXPANSION
  11. set webclient=webclient
  12. set localversion=1.8.0.5
  13. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  14. :menu
  15. mode con lines=24 cols=70
  16. set ip=127.0.0.1
  17. set action=0
  18. cls
  19. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  20. echo                                  Menu
  21. echo.
  22. echo                            View Your IP: (1)
  23. echo.
  24. echo                            Lookup An IP: (2)
  25. echo.
  26. echo                             Ping An IP: (3)
  27. echo.
  28. echo                          TraceRoute An IP: (4)
  29. echo.
  30. echo                           PortScan An IP: (5)
  31. echo.
  32. echo                         Find A Websites IP: (6)
  33. echo.
  34. echo                            WhoIs Lookup: (7)
  35. echo.
  36. echo                              NSLookup: (8)
  37. echo.
  38. echo                         View Response Text: (9)
  39. echo.
  40. echo                         Check For Updates: (10)
  41. echo.
  42. :action
  43. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9,10:
  44. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN" >> %temp%\%webclient%.vbs & goto apirequest
  45. if '%action%'=='2' goto iplookup
  46. if '%action%'=='3' goto ipping
  47. if '%action%'=='4' goto traceroute
  48. if '%action%'=='5' goto portscan
  49. if '%action%'=='6' goto cfresolver
  50. if '%action%'=='7' goto whois
  51. if '%action%'=='8' goto nslookup
  52. if '%action%'=='9' goto opentext
  53. if '%action%'=='10' goto update_ipmt
  54. echo.
  55. echo Please enter a valid choice.
  56. echo.
  57. goto action
  58. :apirequest
  59. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  60. if %action% NEQ update (
  61. set rqst_type=POST
  62. cls
  63. echo.
  64. echo  Waiting for API response. . .
  65. )
  66. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  67. echo oHTTP.open "%rqst_type%", sUrl,false >> %temp%\%webclient%.vbs
  68. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  69. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  70. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  71. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  72. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  73. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  74. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  75. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  76. echo objFile.Close >> %temp%\%webclient%.vbs
  77. echo Wscript.Quit >> %temp%\%webclient%.vbs
  78. start %temp%\%webclient%.vbs
  79. set /a requests=0
  80. :checkresponseexists
  81. set /a requests=%requests% + 1
  82. if %requests% gtr 10 goto failed
  83. IF EXIST "%temp%\response.txt" (
  84. goto response_exist
  85. ) ELSE (
  86. ping 127.0.0.1 -n 2 -w 1000 >nul
  87. goto checkresponseexists
  88. )
  89. :failed
  90. tasklist | find "wscript.exe" >nul
  91. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  92. del "%temp%\%webclient%.vbs" /f /q /s >nul
  93. echo.
  94. echo  Did not receive a response from the API.
  95. echo.
  96. pause
  97. goto menu
  98. :response_exist
  99. del "%temp%\%webclient%.vbs" /f /q /s >nul
  100. if %action% EQU update if '%dlupdate%'=='y' goto update
  101. find "error code: 1006" %temp%\response.txt >nul
  102. if %errorlevel% EQU 0 goto banned
  103. find "One more step" %temp%\response.txt >nul
  104. if %errorlevel% EQU 0 goto cbanned
  105. find "Web server is down" %temp%\response.txt >nul
  106. if %errorlevel% EQU 0 goto offline
  107. find "Connection timed out" %temp%\response.txt >nul
  108. if %errorlevel% EQU 0 goto offline
  109. find "404 Not Found" %temp%\response.txt >nul
  110. if %errorlevel% EQU 0 goto offline
  111. goto verified
  112. :banned
  113. cls
  114. echo.
  115. echo  Error: You have been banned for abuse.
  116. ping 127.0.0.1 -n 4 -w 1000 >nul
  117. del "%temp%\response.txt" /f /q /s >nul
  118. exit
  119. :cbanned
  120. cls
  121. echo.
  122. echo  Error: Your IP has been blocked for security purposes.
  123. echo  Contact @DDoS_Filter on instagram for help.
  124. echo  Sorry for any inconvinience.
  125. echo  If you are using a VPN and have received this error message,
  126. echo  turn off the VPN, and try again.
  127. ping 127.0.0.1 -n 8 -w 1000 >nul
  128. del "%temp%\response.txt" /f /q /s >nul
  129. exit
  130. :offline
  131. cls
  132. echo.
  133. echo  Error: The API is offline.
  134. ping 127.0.0.1 -n 4 -w 1000 >nul
  135. del "%temp%\response.txt" /f /q /s >nul
  136. goto menu
  137. :verified
  138. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  139. for /f %%i in ('!data!') do set lines=%%i
  140. if %lines% LSS 10 (
  141. set /a lines=20
  142. ) else (
  143. set /a lines=%lines% + 3
  144. )
  145. if '%action%'=='update' goto checkversion
  146. if '%action%'=='1' goto parseiplookup
  147. if '%action%'=='2' goto parseiplookup
  148. if '%action%'=='5' goto parsepscan
  149. if '%action%'=='6' goto parsecfresolver
  150. if '%action%'=='7' goto parsewhois
  151. goto menu
  152. :iplookup
  153. cls
  154. echo.
  155. echo                          Type an IP to lookup
  156. echo.
  157. set /p ip=IP:
  158. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  159. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%" >> %temp%\%webclient%.vbs
  160. goto apirequest
  161. :parseiplookup
  162. mode con lines=%lines% cols=70
  163. cls
  164. echo.
  165. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  166.     set data=%%i
  167.     echo !data!
  168. )
  169. echo.
  170. pause
  171. goto menu
  172. :ipping
  173. rem Inteli-Ping by @DDoS_Filter
  174. set /a replies=0
  175. set /a timeouts=0
  176. set /a packets_sent=0
  177. set responsetime=N/A
  178. set avgtime=N/A
  179. set min=N/A
  180. set max=N/A
  181. cls
  182. echo.
  183. echo                       Type an IP or URL to ping
  184. echo.
  185. set /p ip=Host:
  186. echo.
  187. set /p ipv6= IPv6? y/n:
  188. if '%ipv6%'=='y' (
  189.     set tokens=5
  190.     set searchstring=: time
  191. ) else (
  192.     set tokens=7
  193.     set searchstring=time
  194. )
  195. mode con lines=16 cols=30
  196. :ping
  197. set success=false
  198. for /F "tokens=%tokens% delims=<>= " %%i in ('ping -n 1 %ip% ^| find "%searchstring%"') do (
  199.     set responsetime=%%i
  200.     set responsetime=!responsetime:~0,-2!
  201.     set success=true
  202. )
  203. set /a packets_sent=packets_sent + 1
  204. if %replies% EQU 0 if %success% EQU true if %replies% NEQ N/A set min=99999 & set max=0
  205. if %success% EQU false (
  206.     set status=Host is offline
  207.     set /a timeouts=timeouts + 1
  208.     color 0C
  209. ) else (
  210.     set status=Host is online
  211.     set /a replies=replies + 1
  212.     set /a totaltime=%totaltime% + %responsetime%
  213.     set /a avgtime=totaltime / replies
  214.     color 0A
  215.     if %responsetime% LSS %min% (
  216.         set min=%responsetime%
  217.     )
  218.     if %responsetime% GTR %max% (
  219.         set max=%responsetime%
  220.     )
  221. )
  222. set /a packet_loss=((packets_sent-timeouts)*100)/packets_sent
  223. cls
  224. echo Pinging %ip%
  225. echo.
  226. echo  %status%^^!
  227. echo.
  228. echo  Successful Replies: %replies%
  229. echo.
  230. echo  Requests Timed Out: %timeouts%
  231. echo.
  232. echo  Success Percentage: %packet_loss%
  233. echo.
  234. echo  Avrg Response Time: %avgtime%ms
  235. echo.
  236. echo  Last Response Time: %responsetime%ms
  237. echo.
  238. echo  Min: %min%ms  Max: %max%ms
  239. ping 127.0.0.1 -n 2 -w 1000 >nul
  240. goto ping
  241. :traceroute
  242. mode con lines=30 cols=100
  243. cls
  244. echo.
  245. echo                                   Type an IP or URL to trace route
  246. echo.
  247. set /p ip=Host:
  248. tracert %ip%
  249. echo.
  250. pause
  251. goto menu
  252. :portscan
  253. cls
  254. echo.
  255. echo                        Type a host to port scan
  256. echo.
  257. set /p ip=Host:
  258. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  259. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%" >> %temp%\%webclient%.vbs
  260. goto apirequest
  261. :parsepscan
  262. mode con lines=%lines% cols=70
  263. cls
  264. echo.
  265. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  266.     set data=%%i
  267.     echo !data!
  268. )
  269. echo.
  270. pause
  271. goto menu
  272. :cfresolver
  273. cls
  274. echo.
  275. echo                         Type a domain to resolve
  276. echo.
  277. set /p ip=Domain:
  278. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  279. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%" >> %temp%\%webclient%.vbs
  280. goto apirequest
  281. :parsecfresolver
  282. mode con lines=%lines% cols=70
  283. cls
  284. echo.
  285. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  286.     set data=%%i
  287.     echo !data!
  288. )
  289. echo.
  290. pause
  291. goto menu
  292. :whois
  293. cls
  294. echo.
  295. echo                       Type a host to WhoIs lookup
  296. echo.
  297. set /p ip=Host:
  298. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  299. echo sRequest = "key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%" >> %temp%\%webclient%.vbs
  300. goto apirequest
  301. :parsewhois
  302. mode con lines=%lines% cols=100
  303. cls
  304. echo.
  305. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  306.     set data=%%i
  307.     echo !data!
  308. )
  309. echo.
  310. pause
  311. goto menu
  312. :nslookup
  313. cls
  314. echo.
  315. echo                    Type an IP or Domain to NSLookup
  316. echo.
  317. set /p ip=Host:
  318. cls
  319. echo.
  320. echo Name Server Look up using Cloudflare DNS. . .
  321. echo.
  322. nslookup %ip% 1.1.1.1
  323. echo.
  324. pause
  325. goto menu
  326. :opentext
  327. if exist "%temp%\response.txt" start %temp%/response.txt
  328. goto menu
  329. :update_ipmt
  330. cls
  331. set action=update
  332. set rqst_type=GET
  333. echo.
  334. echo  Checking for updates. . .
  335. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  336. goto apirequest
  337. :checkversion
  338. set /p version=<"%temp%\response.txt"
  339. if %localversion% EQU %version% (
  340. del "%temp%\response.txt" /f /q /s >nul
  341. echo.
  342. echo  You are on the latest version^^!
  343. echo.
  344. echo  Version: %version%
  345. echo.
  346. pause
  347. goto menu
  348. )
  349. cls
  350. echo.
  351. echo  An update is available for IP Multi Tool^^!
  352. echo.
  353. echo.  New version: %version%
  354. echo.
  355. echo   Your version: %localversion%
  356. echo.
  357. set /p dlupdate= Would you like to download the update? y/n:
  358. if '%dlupdate%'=='y' (
  359. cls
  360. echo.
  361. echo  Downloading to Downloads folder. . .
  362. echo.
  363. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  364. goto apirequest
  365. :update
  366. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  367. if %errorlevel% NEQ 0 (
  368. echo  Error downloading update^^!
  369. echo.
  370. pause
  371. goto menu
  372. )
  373. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  374. set dlupdate=0
  375. echo  Starting updated version. . .
  376. ping 127.0.0.1 -n 2 -w 1000 >nul
  377. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  378. exit
  379. ) else (
  380. goto menu
  381. )
  382. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  383. Rem http://ddosfilter.net/
  384. Rem https://pastebin.com/WbgYDjGS
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement