IP Toolkit Documentation

Introduction

IP Toolkit provides a comprehensive set of network tools designed for IT professionals, network administrators, and developers. This documentation explains how to use each tool effectively.

Ping Tool

The Ping Tool allows you to test network connectivity to any public hostname or IP address. It helps diagnose network issues by measuring response times and packet loss between your client and the target server.

Key Benefits:

  • Quickly verify if a host is reachable
  • Measure network latency and response times
  • Identify packet loss issues
  • Verify DNS resolution for hostnames

Usage

  1. Enter a domain name (e.g., google.com) or IP address (e.g., 8.8.8.8) in the target field
  2. Click "Start Ping" to initiate the ping test
  3. View response times, packet loss statistics, and other network metrics

Advanced Features

  • Real-time Statistics: View minimum, average, and maximum response times as pings are performed
  • Packet Loss Analysis: The tool displays percentage of packets lost during the test
  • TTL Monitoring: Time-to-Live values help identify network hops
  • IP Resolution: Automatic DNS resolution for hostnames with IP display
  • Results Export: Copy formatted results to clipboard for reporting

Pro Tip

Compare ping times to different servers in the same region to identify potential routing issues or server-specific performance problems.

Understanding Results

  • Response Time: Lower is better. Typical values:
    • Excellent: <20ms (Local/same region)
    • Good: 20-100ms (Cross-country)
    • Fair: 100-200ms (International)
    • Poor: >200ms (Very long distance or connectivity issues)
  • Packet Loss: Should ideally be 0%. Any loss indicates network problems
  • TTL (Time To Live): Typically 64, 128, or 255 depending on the target system. Lower received TTL indicates more network hops

Limitations

  • Cannot ping internal network addresses (private IP ranges)
  • Limited to 4 ping requests per test
  • Rate limited to prevent abuse
  • Some networks may block ICMP packets, making ping tests ineffective

Port Checker

The Port Checker tool allows you to verify if specific TCP ports are open and accessible on a target server or IP address. This tool is essential for diagnosing connectivity issues, verifying service availability, and testing firewall configurations.

Key Benefits:

  • Verify if critical services (HTTP, SSH, SMTP, etc.) are accessible
  • Diagnose connectivity issues between clients and servers
  • Test firewall configurations and access control lists
  • Confirm service availability before deployment

Usage

  1. Enter the target hostname or IP address
  2. Specify the port number to check
  3. Click "Check Port" to initiate the test
  4. View results showing whether the port is open or closed

Common Port Numbers

Service Port Description
HTTP 80 Web server (unencrypted)
HTTPS 443 Secure web server
SSH 22 Secure Shell
FTP 21 File Transfer Protocol
SMTP 25 Email server (outgoing)
DNS 53 Domain name resolution

Advanced Features

  • Timeout Configuration: Adjust connection timeout for testing slow servers
  • Service Detection: The tool attempts to identify the service running on open ports
  • Connection Time: Measures how long it takes to establish a connection
  • Batch Testing: Test multiple ports sequentially in a single operation

Note

Some ISPs and network configurations may block certain port scanning activities. Results may vary depending on your network environment.

Limitations

  • Only tests TCP ports (not UDP)
  • Limited to testing publicly accessible servers
  • Connection timeouts might occur due to firewall filtering rather than closed ports
  • Rate limited to prevent abuse

DNS Lookup

The DNS Lookup tool lets you query the Domain Name System for various record types of any domain. It helps troubleshoot DNS issues, verify DNS configurations, and obtain detailed information about domain names and their associated services.

Key Benefits:

  • Quickly retrieve all DNS records for a domain
  • Verify proper DNS configuration for websites and services
  • Troubleshoot email delivery issues by checking MX records
  • Analyze DNS-based security settings like SPF, DKIM, and DMARC

Usage

  1. Enter the domain name you want to look up (e.g., example.com)
  2. Select the record type from the dropdown menu
  3. Click "Lookup" to retrieve the records
  4. View the results in a formatted table

Supported Record Types

Record Type Description Common Use
A IPv4 address Maps domain to server IP address
AAAA IPv6 address Maps domain to IPv6 server address
MX Mail exchange Specifies mail servers for the domain
TXT Text records SPF, DKIM, verification records
NS Name servers Authoritative DNS servers
SOA Start of authority Domain administration information
CNAME Canonical name Domain aliases

Advanced Features

  • Provider Selection: Choose between Cloudflare or Google DNS providers
  • Record Validation: Automatic highlighting of potential configuration issues
  • TTL Display: Shows Time-To-Live values for each record
  • Bulk Lookup: Query multiple record types in a single operation
  • JSON Export: Save results in structured format for further analysis

Note

DNS lookups are performed using secure DNS-over-HTTPS (DoH) providers like Cloudflare and Google for enhanced privacy and security.

Common Use Cases

  • Website Migration: Verify DNS propagation after changing hosting providers
  • Email Setup: Confirm proper MX, SPF, DKIM and DMARC records
  • Domain Verification: Check TXT records needed for various service verifications
  • CDN Configuration: Verify CNAME records for content delivery networks
  • DNS Debugging: Identify misconfigured or missing DNS records

Subnet Calculator

The Subnet Calculator is a powerful tool for network planning and analysis. It calculates comprehensive subnet information including network address, broadcast address, usable IP range, and more based on CIDR notation or subnet mask.

Key Benefits:

  • Easily plan and document network addressing schemes
  • Calculate IP address ranges for network segments
  • Determine optimal subnet sizes for different requirements
  • Support both IPv4 and IPv6 subnetting

Usage

  1. Select IPv4 or IPv6 mode
  2. For IPv4: Enter an IP address (e.g., 192.168.1.0) and CIDR prefix (e.g., /24) or subnet mask
  3. For IPv6: Enter an IPv6 address and prefix length
  4. View comprehensive subnet details and visualizations

IPv4 Calculation Features

  • Network Address: First address in the subnet (not usable for hosts)
  • Broadcast Address: Last address in the subnet (reserved for broadcast)
  • Usable Range: First and last IP addresses that can be assigned to devices
  • Total Hosts: Number of usable IP addresses in the subnet
  • Subnet Mask: Traditional dotted-decimal format (e.g., 255.255.255.0)
  • Wildcard Mask: Inverse of subnet mask, useful for ACL configuration
  • IP Class: Traditional IP class designation (A, B, C, etc.)
  • IP Type: Classification as private, public, reserved, etc.
  • Binary Visualization: See the binary breakdown of addresses and masks
  • Reverse DNS Zone: in-addr.arpa format for reverse DNS configuration

IPv6 Calculation Features

  • Full Expanded Address: Complete unabbreviated IPv6 address
  • Network Prefix: The network portion of the address
  • Network Range: First and last addresses in the subnet
  • Total Addresses: Number of IPv6 addresses in the subnet (usually extremely large)
  • Interface ID: Host portion of the address

Pro Tip

When planning a network, use the subnet calculator to plan hierarchical subnets. For example, start with a /16 network and divide into multiple /24 subnets for different departments.

Common CIDR Reference

CIDR Subnet Mask Hosts Common Use
/32 255.255.255.255 1 Single host
/30 255.255.255.252 2 Point-to-point links
/29 255.255.255.248 6 Tiny networks
/24 255.255.255.0 254 Small network/standard LAN
/16 255.255.0.0 65,534 Large organization

Example: Enter 192.168.1.0/24 to see detailed subnet information for a standard home or small office network.

IPv6 Expander

The IPv6 Expander tool converts abbreviated IPv6 addresses into their fully expanded format, and vice versa. This is essential for properly understanding, comparing, and documenting IPv6 addresses in network configurations.

Key Benefits:

  • Convert shortened IPv6 addresses to their full 128-bit representation
  • Abbreviate full IPv6 addresses according to standard conventions
  • Easily copy expanded addresses for documentation or configuration
  • Learn and understand IPv6 address conventions

Usage

  1. Enter an IPv6 address in any valid format
  2. Choose to expand or abbreviate the address
  3. View the result in the chosen format
  4. Copy the result to your clipboard for use in configurations

Advanced Features

  • Format Validation: Ensures the input is a valid IPv6 address
  • Format Variations: Handles all valid IPv6 abbreviation rules
  • Binary Representation: View the 128-bit binary format of the address
  • Address Breakdown: See the address divided into its 8 segments
  • Prefix Extraction: Identify network and host portions based on prefix length

IPv6 Format Rules

  • Full IPv6 address has 8 segments of 4 hexadecimal digits (128 bits total)
  • Double colon (::) can replace one contiguous sequence of zero segments
  • Leading zeros in each segment can be omitted

Example Conversions

Abbreviated Expanded
2001:db8::1 2001:0db8:0000:0000:0000:0000:0000:0001
::1 0000:0000:0000:0000:0000:0000:0000:0001
fe80::a432:f123 fe80:0000:0000:0000:0000:0000:a432:f123

IP Location Finder

The IP Location Finder tool provides geographical and network information about any IPv4 or IPv6 address. It helps identify the physical location, hosting provider, and network details associated with an IP address.

Key Benefits:

  • Determine the geographical location of website visitors or server hosts
  • Identify the origin of network traffic for security analysis
  • Verify CDN and global service distribution
  • Troubleshoot region-specific content restrictions

Usage

  1. Enter an IP address (IPv4 or IPv6) or hostname
  2. Click "Locate" to retrieve information
  3. View detailed location and network information

Information Provided

  • Geographical Data:
    • Country and country code
    • City and region/state
    • ZIP/Postal code
    • Latitude and longitude coordinates
  • Network Information:
    • Internet Service Provider (ISP)
    • Organization
    • Autonomous System Number (ASN)
    • IP address type (residential, business, hosting, etc.)
    • Connection type (broadband, mobile, data center)
  • Time Zone:
    • Local time
    • UTC offset
    • Timezone identifier

Privacy Note

IP geolocation data provides approximate locations and may not be 100% accurate, especially for mobile or VPN connections. The tool uses aggregate databases and does not track or store user queries.

Advanced Features

  • Interactive Map: Visual representation of the IP's geographical location
  • Hostname Resolution: Automatically resolves domain names to IP addresses
  • Export Options: Download location data in JSON or CSV format
  • Multiple Database Sources: Cross-references multiple geolocation databases for accuracy

Common Use Cases

  • Security Analysis: Verify the origin of login attempts or API requests
  • Compliance: Ensure users are accessing content from permitted regions
  • Performance Optimization: Identify where to deploy edge servers for better user experience
  • Network Troubleshooting: Diagnose routing or latency issues based on geographic distance

Firewall Rule Generator

The Firewall Rule Generator creates properly formatted firewall rules for various platforms based on your network security requirements. It simplifies the process of creating consistent and correct syntax for different firewall systems.

Key Benefits:

  • Generate properly formatted rules for multiple firewall platforms
  • Ensure consistent security policy implementation
  • Save time by avoiding manual syntax writing
  • Reduce configuration errors in firewall implementations
  • Support for advanced features like port forwarding and masquerading

Supported Platforms

  • iptables (Linux)
  • ufw (Uncomplicated Firewall for Ubuntu)
  • firewalld (CentOS/RHEL/Fedora)
  • nftables (Modern Linux firewall)

Usage

  1. Select the target firewall platform
  2. Choose a rule action:
    • Allow - Permit the specified traffic
    • Deny - Drop packets silently
    • Reject - Drop packets with notification
    • Masquerade/Forwarding - Enable NAT/port forwarding
  3. Select from Common Services presets or specify custom parameters:
    • Protocol (TCP/UDP/ICMP)
    • Source and destination addresses/networks
    • Port numbers, ranges, or comma-separated lists
    • Interface (optional)
  4. Generate and copy the formatted rule

Rule Actions

The tool supports multiple rule actions for comprehensive firewall management:

Action Description Use Case
Allow Permits traffic matching the rule Allowing legitimate service access
Deny Silently drops traffic (no response) Blocking unauthorized access without notification
Reject Drops traffic and sends rejection notice More user-friendly blocking when notification is desired
Masquerade/Forwarding Configures NAT and port forwarding Router/gateway configurations, exposing internal services

Common Services Presets

The tool provides built-in presets for both common and professional services, automatically configuring the correct ports and protocols:

Common Services

Service Ports Protocol
HTTP 80 TCP
HTTPS 443 TCP
SSH 22 TCP
FTP 21 TCP
DNS 53 TCP, UDP

Professional Services

Service Ports Protocol
SMTP 25, 465, 587 TCP
SQL Server 1433 TCP
PostgreSQL 5432 TCP
RDP 3389 TCP
MongoDB 27017 TCP

Advanced Features

  • Port Forwarding and Masquerading: Configure NAT rules to expose internal services or enable internet connection sharing
  • Multiple Port Formats: Support for individual ports, port ranges (e.g., 8000-9000), and comma-separated lists (e.g., 80,443,8080)
  • IP Forwarding Instructions: Automatically includes commands to enable and persist IP forwarding when needed
  • Firewall-Specific Adaptations: Handles syntax differences between firewall systems intelligently:
    • Automatically splits comma-separated ports into multiple commands for FirewallD (which doesn't support comma-separated syntax)
    • Uses correct masquerading and DNAT syntax for each firewall platform
  • Command Comments: Generated rules include clear, concise comments explaining their purpose
  • Syntax Highlighting: Clearly formatted output for better readability

Pro Tips

  • When implementing generated firewall rules in production environments, always test in a controlled setting first.
  • When using the masquerade/forwarding option, ensure IP forwarding is enabled as instructed in the generated commands.
  • For FirewallD, avoid using comma-separated port lists as it requires separate rules for each port.
  • SMTP mail ports 25, 465, and 587 use TCP protocol (not UDP).

Port Forwarding and Masquerading

The tool provides comprehensive support for NAT configurations:

  • DNAT (Port Forwarding): Redirects incoming traffic to internal servers
  • SNAT/Masquerade: Allows internal clients to access the internet through a shared public IP
  • IP Forwarding: Includes proper kernel parameter settings for packet forwarding

For port forwarding, the tool generates both the necessary firewall rules and system configurations to enable packet forwarding for all supported platforms.

Bridge Configuration Generator

The Bridge Configuration Generator creates network bridge configuration files for various Linux distributions and other systems. It helps system administrators properly set up network bridges for virtualization, container networking, and other scenarios requiring interface bridging.

Key Benefits:

  • Generate correct bridge configurations for different systems
  • Avoid common networking mistakes in bridge setup
  • Save time with proper syntax for different distribution formats
  • Support virtualization and container environments

Supported Configuration Formats

  • Netplan (Ubuntu 18.04+)
  • NetworkManager (nmcli)
  • systemd-networkd
  • Traditional interface files (/etc/network/interfaces)
  • ifcfg-* files (RHEL/CentOS)

Usage

  1. Select the target system or configuration format
  2. Specify bridge parameters:
    • Bridge interface name
    • Physical interfaces to add to the bridge
    • IP addressing (DHCP or static)
    • Optional: MTU, MAC address
    • Optional: STP settings
  3. Generate the configuration
  4. Copy the configuration to implement on your system

Advanced Features

  • VLAN Support: Configure VLANs on bridge interfaces
  • Bonding Integration: Bridge bonded interfaces for high availability
  • IPv6 Support: Configure dual-stack addressing on bridges
  • Validation: Check for configuration errors before generating files
  • Custom Routes: Add static routes through the bridge

Important Note

Configuring network bridges incorrectly can cause connectivity issues. Always have console or out-of-band access when implementing bridge configurations on remote systems.

Common Use Cases

  • Virtualization Host: Bridge physical NICs to provide direct network access to VMs
  • Container Networking: Bridge configuration for Docker, LXC, or Kubernetes
  • Network Segmentation: Create software-based bridge+VLAN configurations
  • Network Function Virtualization: Setup for virtual routers and firewalls

Example Configurations

The tool provides examples for common scenarios including:

  • Basic bridge with DHCP
  • Static IP bridge with multiple interfaces
  • VLAN-aware bridge for virtualization
  • Bonded interfaces with bridging for high availability

API Reference

IP Toolkit does not currently offer a public API. All tools are designed for web interface usage.

If you're interested in API access to these networking tools, please contact us at contact@iptoolkit.xyz with your use case.

Coming Soon

We're currently developing a comprehensive API that will provide programmatic access to all IP Toolkit features. Sign up for our newsletter to be notified when the API becomes available.