Advertisement
DSTAT

IP-Multi-Tool Win10+

May 23rd, 2024 (edited)
593
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 9.28 KB | Software | 0 0
  1. @echo off
  2. Rem This tool is intended for educational and research purposes only. The author of this tool does not condone illegal activities, and the tool should not be used to cause harm to any individual, service, or organization. By using this tool, you acknowledge that any misuse of the tool is entirely your responsibility, and you accept full liability for your actions.
  3. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  4. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  5. Rem Copyright Β© [2019] [@DDoS_Filter] https://www.copyright.gov/dmca/
  6. Rem http://ddosfilter.net/
  7. Rem https://pastebin.com/WbgYDjGS | Original
  8. Rem https://pastebin.com/XX5paCMh | Win10+
  9. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  10. title IP Multi Tool
  11. color 0A
  12. setlocal ENABLEDELAYEDEXPANSION
  13. set webclient=webclient
  14. set localversion=1.9.0.0
  15. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  16. :menu
  17. mode con lines=24 cols=70
  18. set ip=127.0.0.1
  19. set action=0
  20. cls
  21. echo  IP-Multi-Tool v%localversion%                         Coded by @DDoS_Filter
  22. echo                                  Menu
  23. echo.
  24. echo                            View Your IP: (1)
  25. echo.
  26. echo                            Lookup An IP: (2)
  27. echo.
  28. echo                             Ping An IP: (3)
  29. echo.
  30. echo                          TraceRoute An IP: (4)
  31. echo.
  32. echo                           PortScan An IP: (5)
  33. echo.
  34. echo                         Domain To IP Lookup: (6)
  35. echo.
  36. echo                            WhoIs Lookup: (7)
  37. echo.
  38. echo                              NSLookup: (8)
  39. echo.
  40. echo                         View Response Text: (9)
  41. echo.
  42. echo                         Check For Updates: (10)
  43. echo.
  44. :action
  45. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9,10:
  46. if '%action%'=='1' set "sUrl=https://api.ddosfilter.net/IPLookupAPI.php" & set "sRequest=key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN" & goto apirequest
  47. if '%action%'=='2' goto iplookup
  48. if '%action%'=='3' goto ipping
  49. if '%action%'=='4' goto traceroute
  50. if '%action%'=='5' goto portscan
  51. if '%action%'=='6' goto domain2ip
  52. if '%action%'=='7' goto whois
  53. if '%action%'=='8' goto nslookup
  54. if '%action%'=='9' goto opentext
  55. if '%action%'=='10' goto update_ipmt
  56. echo.
  57. echo Please enter a valid choice.
  58. echo.
  59. goto action
  60. :apirequest
  61. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  62. if %action% NEQ update (
  63. set rqst_type=POST
  64. cls
  65. echo.
  66. echo  Waiting for API response. . .
  67. )
  68. curl --connect-timeout 5 --max-time 10 -s -H "User-Agent: IP-Multi-Tool-By-DDoS_Filter" -X %rqst_type% -d "%sRequest%" -o "%temp%\response.txt" "%sUrl%"
  69. if %errorlevel% NEQ 0 (
  70. echo.
  71. echo  Did not receive a response from the API.
  72. echo.
  73. pause
  74. goto menu
  75. )
  76. if %action% EQU update if '%dlupdate%'=='y' goto update
  77. find "error code: 1006" %temp%\response.txt >nul
  78. if %errorlevel% EQU 0 goto banned
  79. find "One more step" %temp%\response.txt >nul
  80. if %errorlevel% EQU 0 goto cbanned
  81. find "Web server is down" %temp%\response.txt >nul
  82. if %errorlevel% EQU 0 goto offline
  83. find "Connection timed out" %temp%\response.txt >nul
  84. if %errorlevel% EQU 0 goto offline
  85. find "404 Not Found" %temp%\response.txt >nul
  86. if %errorlevel% EQU 0 goto offline
  87. goto verified
  88. :banned
  89. cls
  90. echo.
  91. echo  Error: You have been banned for abuse.
  92. ping 127.0.0.1 -n 4 -w 1000 >nul
  93. del "%temp%\response.txt" /f /q /s >nul
  94. exit
  95. :cbanned
  96. cls
  97. echo.
  98. echo  Error: Your IP has been blocked for security purposes.
  99. echo  Contact @DDoS_Filter on instagram for help.
  100. echo  Sorry for any inconvinience.
  101. echo  If you are using a VPN and have received this error message,
  102. echo  turn off the VPN, and try again.
  103. ping 127.0.0.1 -n 8 -w 1000 >nul
  104. del "%temp%\response.txt" /f /q /s >nul
  105. exit
  106. :offline
  107. cls
  108. echo.
  109. echo  Error: The API is offline.
  110. ping 127.0.0.1 -n 4 -w 1000 >nul
  111. del "%temp%\response.txt" /f /q /s >nul
  112. goto menu
  113. :verified
  114. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  115. for /f %%i in ('!data!') do set lines=%%i
  116. if %lines% LSS 10 (
  117. set /a lines=20
  118. ) else (
  119. set /a lines=%lines% + 3
  120. )
  121. if '%action%'=='update' goto checkversion
  122. if '%action%'=='1' goto parseiplookup
  123. if '%action%'=='2' goto parseiplookup
  124. if '%action%'=='5' goto parsepscan
  125. if '%action%'=='6' goto parsedomain2ip
  126. if '%action%'=='7' goto parsewhois
  127. goto menu
  128. :iplookup
  129. cls
  130. echo.
  131. echo                          Type an IP to lookup
  132. echo.
  133. set /p ip=IP:
  134. set "sUrl=https://api.ddosfilter.net/IPLookupAPI.php"
  135. set "sRequest=key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%"
  136. goto apirequest
  137. :parseiplookup
  138. mode con lines=%lines% cols=70
  139. cls
  140. echo.
  141. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  142.     set data=%%i
  143.     echo !data!
  144. )
  145. echo.
  146. pause
  147. goto menu
  148. :ipping
  149. rem Inteli-Ping by @DDoS_Filter
  150. set /a replies=0
  151. set /a timeouts=0
  152. set /a packets_sent=0
  153. set responsetime=N/A
  154. set avgtime=N/A
  155. set min=N/A
  156. set max=N/A
  157. cls
  158. echo.
  159. echo                       Type an IP or URL to ping
  160. echo.
  161. set /p ip=Host:
  162. echo.
  163. set /p ipv6= IPv6? y/n:
  164. if '%ipv6%'=='y' (
  165.     set tokens=5
  166.     set searchstring=: time
  167. ) else (
  168.     set tokens=7
  169.     set searchstring=time
  170. )
  171. mode con lines=16 cols=30
  172. :ping
  173. set success=false
  174. for /F "tokens=%tokens% delims=<>= " %%i in ('ping -n 1 %ip% ^| find "%searchstring%"') do (
  175.     set responsetime=%%i
  176.     set responsetime=!responsetime:~0,-2!
  177.     set success=true
  178. )
  179. set /a packets_sent=packets_sent + 1
  180. if %replies% EQU 0 if %success% EQU true if %replies% NEQ N/A set min=99999 & set max=0
  181. if %success% EQU false (
  182.     set status=Host is offline
  183.     set /a timeouts=timeouts + 1
  184.     color 0C
  185. ) else (
  186.     set status=Host is online
  187.     set /a replies=replies + 1
  188.     set /a totaltime=%totaltime% + %responsetime%
  189.     set /a avgtime=totaltime / replies
  190.     color 0A
  191.     if %responsetime% LSS %min% (
  192.         set min=%responsetime%
  193.     )
  194.     if %responsetime% GTR %max% (
  195.         set max=%responsetime%
  196.     )
  197. )
  198. set /a packet_loss=((packets_sent-timeouts)*100)/packets_sent
  199. cls
  200. echo Pinging %ip%
  201. echo.
  202. echo  %status%^^!
  203. echo.
  204. echo  Successful Replies: %replies%
  205. echo.
  206. echo  Requests Timed Out: %timeouts%
  207. echo.
  208. echo  Success Percentage: %packet_loss%
  209. echo.
  210. echo  Avrg Response Time: %avgtime%ms
  211. echo.
  212. echo  Last Response Time: %responsetime%ms
  213. echo.
  214. echo  Min: %min%ms  Max: %max%ms
  215. ping 127.0.0.1 -n 2 -w 1000 >nul
  216. goto ping
  217. :traceroute
  218. mode con lines=30 cols=100
  219. cls
  220. echo.
  221. echo                                   Type an IP or URL to trace route
  222. echo.
  223. set /p ip=Host:
  224. tracert %ip%
  225. echo.
  226. pause
  227. goto menu
  228. :portscan
  229. cls
  230. echo.
  231. echo                        Type a host to port scan
  232. echo.
  233. set /p ip=Host:
  234. set "sUrl=https://api.ddosfilter.net/PortScanAPI.php"
  235. set "sRequest=key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&ip=%ip%"
  236. goto apirequest
  237. :parsepscan
  238. mode con lines=%lines% cols=70
  239. cls
  240. echo.
  241. for /f "delims=     " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  242.     set data=%%i
  243.     echo !data!
  244. )
  245. echo.
  246. pause
  247. goto menu
  248. :domain2ip
  249. cls
  250. echo.
  251. echo                         Type a domain to lookup
  252. echo.
  253. set /p ip=Domain:
  254. set "sUrl=https://api.ddosfilter.net/DomainToIP.php"
  255. set "sRequest=key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%"
  256. goto apirequest
  257. :parsedomain2ip
  258. mode con lines=%lines% cols=70
  259. cls
  260. echo.
  261. for /f "delims=     " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  262.     set data=%%i
  263.     echo !data!
  264. )
  265. echo.
  266. pause
  267. goto menu
  268. :whois
  269. cls
  270. echo.
  271. echo                       Type a host to WhoIs lookup
  272. echo.
  273. set /p ip=Host:
  274. set "sUrl=https://api.ddosfilter.net/WhoIsAPI.php"
  275. set "sRequest=key=riB7e0h8BROyidr8KIdEJOfRAfrOsweN&host=%ip%"
  276. goto apirequest
  277. :parsewhois
  278. mode con lines=%lines% cols=100
  279. cls
  280. echo.
  281. for /f "delims=     " %%i in ('findstr /i ":" %temp%\response.txt') do (
  282.     set data=%%i
  283.     echo !data!
  284. )
  285. echo.
  286. pause
  287. goto menu
  288. :nslookup
  289. cls
  290. echo.
  291. echo                    Type an IP or Domain to NSLookup
  292. echo.
  293. set /p ip=Host:
  294. cls
  295. echo.
  296. echo Name Server Look up using Cloudflare DNS. . .
  297. echo.
  298. nslookup %ip% 1.1.1.1
  299. echo.
  300. pause
  301. goto menu
  302. :opentext
  303. if exist "%temp%\response.txt" start %temp%/response.txt
  304. goto menu
  305. :update_ipmt
  306. cls
  307. set action=update
  308. set rqst_type=GET
  309. echo.
  310. echo  Checking for updates. . .
  311. set "sUrl=https://api.ddosfilter.net/ipmultitoolversion.txt"
  312. goto apirequest
  313. :checkversion
  314. set /p version=<"%temp%\response.txt"
  315. if %localversion% EQU %version% (
  316. del "%temp%\response.txt" /f /q /s >nul
  317. echo.
  318. echo  You are on the latest version^^!
  319. echo.
  320. echo  Version: %version%
  321. echo.
  322. pause
  323. goto menu
  324. )
  325. cls
  326. echo.
  327. echo  An update is available for IP Multi Tool^^!
  328. echo.
  329. echo.  New version: %version%
  330. echo.
  331. echo   Your version: %localversion%
  332. echo.
  333. set /p dlupdate= Would you like to download the update? y/n:
  334. if '%dlupdate%'=='y' (
  335. cls
  336. echo.
  337. echo  Downloading to Downloads folder. . .
  338. echo.
  339. set "sUrl=https://pastebin.com/raw/XX5paCMh"
  340. goto apirequest
  341. :update
  342. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  343. if %errorlevel% NEQ 0 (
  344. echo  Error downloading update^^!
  345. echo.
  346. pause
  347. goto menu
  348. )
  349. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  350. set dlupdate=0
  351. echo  Starting updated version. . .
  352. ping 127.0.0.1 -n 2 -w 1000 >nul
  353. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  354. exit
  355. ) else (
  356. goto menu
  357. )
  358. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  359. Rem http://ddosfilter.net/
  360. Rem https://pastebin.com/WbgYDjGS
  361. Rem https://pastebin.com/XX5paCMh
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement