Advertisement
Guest User

xaxpon ip tool

a guest
Jan 6th, 2020
6,225
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.94 KB | None | 0 0
  1. @echo off
  2. Rem Paste this code into notepad and save it as IP-Multi-Tool.bat
  3. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  4. Rem http://ddosfilter.net/
  5. Rem https://pastebin.com/WbgYDjGS
  6. Rem Option 9 opens the last API response in a text document. (Works with options 1,2,5,6,7)
  7. title IP Multi Tool
  8. color 0A
  9. mode con lines=22 cols=70
  10. setlocal ENABLEDELAYEDEXPANSION
  11. set webclient=webclient
  12. set action=version
  13. set localversion=1.6.0.0
  14. if exist "%temp%\%webclient%.vbs" del "%temp%\%webclient%.vbs" /f /q /s >nul
  15. echo.
  16. echo Checking for updates. . .
  17. echo sUrl = "https://api.ddosfilter.net/ipmultitoolversion.txt" > %temp%\%webclient%.vbs
  18. goto apirequest
  19. :checkversion
  20. set /p version=<"%temp%\response.txt"
  21. if %localversion% EQU %version% del "%temp%\response.txt" /f /q /s >nul & goto menu
  22. cls
  23. echo.
  24. echo An update is available for IP Multi Tool^^!
  25. echo.
  26. echo. New version: %version%
  27. echo.
  28. echo Your version: %localversion%
  29. echo.
  30. set /p dlupdate= Would you like to download the update? y/n:
  31. if '%dlupdate%'=='y' (
  32. cls
  33. echo.
  34. echo Downloading to Downloads folder. . .
  35. echo.
  36. echo sUrl = "https://pastebin.com/raw/WbgYDjGS" > %temp%\%webclient%.vbs
  37. goto apirequest
  38. :update
  39. find "6Ip5ithetropU1lSpiwRlcrLN5ro6er7" %temp%\response.txt >nul
  40. if %errorlevel% NEQ 0 (
  41. echo Error downloading update^^!
  42. echo.
  43. pause
  44. goto menu
  45. )
  46. move %temp%\response.txt C:\Users\%username%\Downloads\IP-Multi-Tool.bat >nul
  47. set dlupdate=0
  48. echo Starting updated version. . .
  49. ping 127.0.0.1 -n 2 -w 1000 >nul
  50. start C:\Users\%username%\Downloads\IP-Multi-Tool.bat
  51. exit
  52. )
  53. :menu
  54. set ip=127.0.0.1
  55. set action=0
  56. mode con lines=22 cols=70
  57. cls
  58. echo IP-Multi-Tool v%localversion% Coded by @DDoS_Filter
  59. echo Menu
  60. echo.
  61. echo View your IP: (1)
  62. echo.
  63. echo Lookup an IP: (2)
  64. echo.
  65. echo Ping an IP: (3)
  66. echo.
  67. echo TraceRoute an IP: (4)
  68. echo.
  69. echo PortScan an IP: (5)
  70. echo.
  71. echo Find a websites IP: (6)
  72. echo.
  73. echo WhoIs Lookup: (7)
  74. echo.
  75. echo NSLookup: (8)
  76. echo.
  77. echo View response text: (9)
  78. echo.
  79. :action
  80. set /p action=Type your choice. 1,2,3,4,5,6,7,8,9:
  81. if '%action%'=='1' echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs & echo sRequest = "key=c8acHeruFreSehlxOxObrasw1fremedA" >> %temp%\%webclient%.vbs & goto apirequest
  82. if '%action%'=='2' goto iplookup
  83. if '%action%'=='3' goto ipping
  84. if '%action%'=='4' goto traceroute
  85. if '%action%'=='5' goto portscan
  86. if '%action%'=='6' goto cfresolver
  87. if '%action%'=='7' goto whois
  88. if '%action%'=='8' goto nslookup
  89. if '%action%'=='9' goto opentext
  90. echo.
  91. echo Please enter a valid choice.
  92. echo.
  93. goto action
  94. :apirequest
  95. if exist "%temp%\response.txt" del "%temp%\response.txt" /f /q /s >nul
  96. if %action% NEQ version (
  97. cls
  98. echo.
  99. echo Waiting for API response. . .
  100. )
  101. echo set oHTTP = CreateObject("MSXML2.ServerXMLHTTP.6.0") >> %temp%\%webclient%.vbs
  102. echo oHTTP.open "POST", sUrl,false >> %temp%\%webclient%.vbs
  103. echo oHTTP.setRequestHeader "Content-Type", "application/x-www-form-urlencoded" >> %temp%\%webclient%.vbs
  104. echo oHTTP.setRequestHeader "Content-Length", Len(sRequest) >> %temp%\%webclient%.vbs
  105. echo oHTTP.send sRequest >> %temp%\%webclient%.vbs
  106. echo HTTPGET = oHTTP.responseText >> %temp%\%webclient%.vbs
  107. echo strDir = "%temp%\response.txt" >> %temp%\%webclient%.vbs
  108. echo set objFSO = CreateObject("Scripting.FileSystemObject") >> %temp%\%webclient%.vbs
  109. echo set objFile = objFSO.CreateTextFile(strDir) >> %temp%\%webclient%.vbs
  110. echo objFile.Write(HTTPGET) >> %temp%\%webclient%.vbs
  111. echo objFile.Close >> %temp%\%webclient%.vbs
  112. echo Wscript.Quit >> %temp%\%webclient%.vbs
  113. start %temp%\%webclient%.vbs
  114. set /a requests=0
  115. :checkresponseexists
  116. set /a requests=%requests% + 1
  117. if %requests% gtr 12 goto failed
  118. IF EXIST "%temp%\response.txt" (
  119. goto response_exist
  120. ) ELSE (
  121. ping 127.0.0.1 -n 2 -w 1000 >nul
  122. goto checkresponseexists
  123. )
  124. :failed
  125. tasklist | find "wscript.exe" >nul
  126. if %errorlevel% EQU 0 taskkill /f /im wscript.exe >nul
  127. del "%temp%\%webclient%.vbs" /f /q /s >nul
  128. echo.
  129. echo Did not receive a response from the API.
  130. echo.
  131. pause
  132. goto menu
  133. :response_exist
  134. del "%temp%\%webclient%.vbs" /f /q /s >nul
  135. if %action% EQU version if '%dlupdate%'=='y' goto update
  136. find "banned" %temp%\response.txt >nul
  137. if %errorlevel% EQU 0 goto banned
  138. find "One more step" %temp%\response.txt >nul
  139. if %errorlevel% EQU 0 goto cbanned
  140. find "Web server is down" %temp%\response.txt >nul
  141. if %errorlevel% EQU 0 goto offline
  142. find "Connection timed out" %temp%\response.txt >nul
  143. if %errorlevel% EQU 0 goto offline
  144. find "404 Not Found" %temp%\response.txt >nul
  145. if %errorlevel% EQU 0 goto offline
  146. goto verified
  147. :banned
  148. cls
  149. echo.
  150. echo Error: You have been banned for abuse.
  151. ping 127.0.0.1 -n 4 -w 1000 >nul
  152. del "%temp%\response.txt" /f /q /s >nul
  153. exit
  154. :cbanned
  155. cls
  156. echo.
  157. echo Error: Your IP has been blocked for security purposes.
  158. echo Contact @DDoS_Filter on instagram for help.
  159. echo Sorry for any inconvinience.
  160. echo If you are using a VPN and have received this error message,
  161. echo turn off the VPN, and try again.
  162. ping 127.0.0.1 -n 8 -w 1000 >nul
  163. del "%temp%\response.txt" /f /q /s >nul
  164. exit
  165. :offline
  166. cls
  167. echo.
  168. echo Error: The API is offline.
  169. ping 127.0.0.1 -n 4 -w 1000 >nul
  170. del "%temp%\response.txt" /f /q /s >nul
  171. goto menu
  172. :verified
  173. set "data=findstr /R /N "^^" %temp%\response.txt | find /C ":"",
  174. for /f %%i in ('!data!') do set lines=%%i
  175. if %lines% LSS 10 (
  176. set /a lines=20
  177. ) else (
  178. set /a lines=%lines% + 3
  179. )
  180. if '%action%'=='version' goto checkversion
  181. if '%action%'=='1' goto parseiplookup
  182. if '%action%'=='2' goto parseiplookup
  183. if '%action%'=='5' goto parsepscan
  184. if '%action%'=='6' goto parsecfresolver
  185. if '%action%'=='7' goto parsewhois
  186. goto menu
  187. :iplookup
  188. cls
  189. echo.
  190. echo Type an IP to lookup
  191. echo.
  192. set /p ip=IP:
  193. echo sUrl = "https://api.ddosfilter.net/IPLookupAPI.php" > %temp%\%webclient%.vbs
  194. echo sRequest = "key=c8acHeruFreSehlxOxObrasw1fremedA&ip=%ip%" >> %temp%\%webclient%.vbs
  195. goto apirequest
  196. :parseiplookup
  197. mode con lines=%lines% cols=70
  198. cls
  199. echo.
  200. for /f "delims= " %%i in ('findstr /i ":" %temp%\response.txt') do (
  201. set data=%%i
  202. echo !data!
  203. )
  204. echo.
  205. pause
  206. goto menu
  207. :ipping
  208. rem Inteli-Ping by @DDoS_Filter
  209. set /a replies=0
  210. set /a timeouts=0
  211. cls
  212. echo.
  213. echo Type an IP or URL to ping
  214. echo.
  215. set /p ip=Host:
  216. mode con lines=8 cols=30
  217. :ping
  218. ping %ip% -n 1 | find "Reply" >nul
  219. if %errorlevel% EQU 1 (
  220. set /a timeouts=%timeouts% + 1
  221. set status=Host is offline
  222. ) else (
  223. set /a replies=%replies% + 1
  224. set status=Host is online
  225. )
  226. cls
  227. echo Pinging %ip%
  228. echo.
  229. echo %status%^^!
  230. echo.
  231. echo Successful Replies: %replies%
  232. echo.
  233. echo Requests Timed Out: %timeouts%
  234. ping 127.0.0.1 -n 2 -w 1000 >nul
  235. goto ping
  236. :traceroute
  237. cls
  238. echo.
  239. echo Type an IP or URL to trace route
  240. echo.
  241. set /p ip=Host:
  242. tracert %ip%
  243. echo.
  244. pause
  245. goto menu
  246. :portscan
  247. cls
  248. echo.
  249. echo Type a host to port scan
  250. echo.
  251. set /p ip=Host:
  252. echo sUrl = "https://api.ddosfilter.net/PortScanAPI.php" > %temp%\%webclient%.vbs
  253. echo sRequest = "key=zlSOgLsWequm8mUyagld7ibrOgOflniq&ip=%ip%" >> %temp%\%webclient%.vbs
  254. goto apirequest
  255. :parsepscan
  256. mode con lines=%lines% cols=70
  257. cls
  258. echo.
  259. for /f "delims= " %%i in ('findstr /i "Results Port Error" %temp%\response.txt') do (
  260. set data=%%i
  261. echo !data!
  262. )
  263. echo.
  264. pause
  265. goto menu
  266. :cfresolver
  267. cls
  268. echo.
  269. echo Type a domain to resolve
  270. echo.
  271. set /p ip=Domain:
  272. echo sUrl = "https://api.ddosfilter.net/CFResolverAPI.php" > %temp%\%webclient%.vbs
  273. echo sRequest = "key=c8acHeruFreSehlxOxObrasw1fremedA&host=%ip%" >> %temp%\%webclient%.vbs
  274. goto apirequest
  275. :parsecfresolver
  276. mode con lines=%lines% cols=70
  277. cls
  278. echo.
  279. for /f "delims= " %%i in ('findstr /i "IP Error" %temp%\response.txt') do (
  280. set data=%%i
  281. echo !data!
  282. )
  283. echo.
  284. pause
  285. goto menu
  286. :whois
  287. cls
  288. echo.
  289. echo Type a host to WhoIs lookup
  290. echo.
  291. set /p ip=Host:
  292. echo sUrl = "https://api.ddosfilter.net/WhoIsAPI.php" > %temp%\%webclient%.vbs
  293. echo sRequest = "key=spuqlc74preve03aPHudRek8sPu9r8Co&host=%ip%" >> %temp%\%webclient%.vbs
  294. goto apirequest
  295. :parsewhois
  296. mode con lines=%lines% cols=100
  297. cls
  298. echo.
  299. for /f "delims= " %%i in ('findstr /i ":" %temp%\response.txt') do (
  300. set data=%%i
  301. echo !data!
  302. )
  303. echo.
  304. pause
  305. goto menu
  306. :nslookup
  307. cls
  308. echo.
  309. echo Type an IP or Domain to NSLookup
  310. echo.
  311. set /p ip=Host:
  312. cls
  313. echo.
  314. echo Name Server Look up using Cloudflare DNS. . .
  315. echo.
  316. nslookup %ip% 1.1.1.1
  317. echo.
  318. pause
  319. goto menu
  320. :opentext
  321. if exist "%temp%\response.txt" start %temp%/response.txt
  322. goto menu
  323. Rem Coded by DSTAT. Instagram: @DDoS_Filter
  324. Rem http://ddosfilter.net/
  325. Rem https://pastebin.com/WbgYDjGS
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement