IP Toolkit Documentation
Introduction
IP Toolkit provides a comprehensive set of network tools designed for IT professionals, network administrators, and developers. This documentation explains how to use each tool effectively.
Ping Tool
The Ping Tool allows you to test network connectivity to any public hostname or IP address. It helps diagnose network issues by measuring response times and packet loss between your client and the target server.
Key Benefits:
- Quickly verify if a host is reachable
- Measure network latency and response times
- Identify packet loss issues
- Verify DNS resolution for hostnames
Usage
- Enter a domain name (e.g., google.com) or IP address (e.g., 8.8.8.8) in the target field
- Click "Start Ping" to initiate the ping test
- View response times, packet loss statistics, and other network metrics
Advanced Features
- Real-time Statistics: View minimum, average, and maximum response times as pings are performed
- Packet Loss Analysis: The tool displays percentage of packets lost during the test
- TTL Monitoring: Time-to-Live values help identify network hops
- IP Resolution: Automatic DNS resolution for hostnames with IP display
- Results Export: Copy formatted results to clipboard for reporting
Pro Tip
Compare ping times to different servers in the same region to identify potential routing issues or server-specific performance problems.
Understanding Results
- Response Time: Lower is better. Typical values:
- Excellent: <20ms (Local/same region)
- Good: 20-100ms (Cross-country)
- Fair: 100-200ms (International)
- Poor: >200ms (Very long distance or connectivity issues)
- Packet Loss: Should ideally be 0%. Any loss indicates network problems
- TTL (Time To Live): Typically 64, 128, or 255 depending on the target system. Lower received TTL indicates more network hops
Limitations
- Cannot ping internal network addresses (private IP ranges)
- Limited to 4 ping requests per test
- Rate limited to prevent abuse
- Some networks may block ICMP packets, making ping tests ineffective
Port Checker
The Port Checker tool allows you to verify if specific TCP ports are open and accessible on a target server or IP address. This tool is essential for diagnosing connectivity issues, verifying service availability, and testing firewall configurations.
Key Benefits:
- Verify if critical services (HTTP, SSH, SMTP, etc.) are accessible
- Diagnose connectivity issues between clients and servers
- Test firewall configurations and access control lists
- Confirm service availability before deployment
Usage
- Enter the target hostname or IP address
- Specify the port number to check
- Click "Check Port" to initiate the test
- View results showing whether the port is open or closed
Common Port Numbers
| Service | Port | Description |
|---|---|---|
| HTTP | 80 | Web server (unencrypted) |
| HTTPS | 443 | Secure web server |
| SSH | 22 | Secure Shell |
| FTP | 21 | File Transfer Protocol |
| SMTP | 25 | Email server (outgoing) |
| DNS | 53 | Domain name resolution |
Advanced Features
- Timeout Configuration: Adjust connection timeout for testing slow servers
- Service Detection: The tool attempts to identify the service running on open ports
- Connection Time: Measures how long it takes to establish a connection
- Batch Testing: Test multiple ports sequentially in a single operation
Note
Some ISPs and network configurations may block certain port scanning activities. Results may vary depending on your network environment.
Limitations
- Only tests TCP ports (not UDP)
- Limited to testing publicly accessible servers
- Connection timeouts might occur due to firewall filtering rather than closed ports
- Rate limited to prevent abuse
DNS Lookup
The DNS Lookup tool lets you query the Domain Name System for various record types of any domain. It helps troubleshoot DNS issues, verify DNS configurations, and obtain detailed information about domain names and their associated services.
Key Benefits:
- Quickly retrieve all DNS records for a domain
- Verify proper DNS configuration for websites and services
- Troubleshoot email delivery issues by checking MX records
- Analyze DNS-based security settings like SPF, DKIM, and DMARC
Usage
- Enter the domain name you want to look up (e.g., example.com)
- Select the record type from the dropdown menu
- Click "Lookup" to retrieve the records
- View the results in a formatted table
Supported Record Types
| Record Type | Description | Common Use |
|---|---|---|
| A | IPv4 address | Maps domain to server IP address |
| AAAA | IPv6 address | Maps domain to IPv6 server address |
| MX | Mail exchange | Specifies mail servers for the domain |
| TXT | Text records | SPF, DKIM, verification records |
| NS | Name servers | Authoritative DNS servers |
| SOA | Start of authority | Domain administration information |
| CNAME | Canonical name | Domain aliases |
Advanced Features
- Provider Selection: Choose between Cloudflare or Google DNS providers
- Record Validation: Automatic highlighting of potential configuration issues
- TTL Display: Shows Time-To-Live values for each record
- Bulk Lookup: Query multiple record types in a single operation
- JSON Export: Save results in structured format for further analysis
Note
DNS lookups are performed using secure DNS-over-HTTPS (DoH) providers like Cloudflare and Google for enhanced privacy and security.
Common Use Cases
- Website Migration: Verify DNS propagation after changing hosting providers
- Email Setup: Confirm proper MX, SPF, DKIM and DMARC records
- Domain Verification: Check TXT records needed for various service verifications
- CDN Configuration: Verify CNAME records for content delivery networks
- DNS Debugging: Identify misconfigured or missing DNS records
Subnet Calculator
The Subnet Calculator is a powerful tool for network planning and analysis. It calculates comprehensive subnet information including network address, broadcast address, usable IP range, and more based on CIDR notation or subnet mask.
Key Benefits:
- Easily plan and document network addressing schemes
- Calculate IP address ranges for network segments
- Determine optimal subnet sizes for different requirements
- Support both IPv4 and IPv6 subnetting
Usage
- Select IPv4 or IPv6 mode
- For IPv4: Enter an IP address (e.g., 192.168.1.0) and CIDR prefix (e.g., /24) or subnet mask
- For IPv6: Enter an IPv6 address and prefix length
- View comprehensive subnet details and visualizations
IPv4 Calculation Features
- Network Address: First address in the subnet (not usable for hosts)
- Broadcast Address: Last address in the subnet (reserved for broadcast)
- Usable Range: First and last IP addresses that can be assigned to devices
- Total Hosts: Number of usable IP addresses in the subnet
- Subnet Mask: Traditional dotted-decimal format (e.g., 255.255.255.0)
- Wildcard Mask: Inverse of subnet mask, useful for ACL configuration
- IP Class: Traditional IP class designation (A, B, C, etc.)
- IP Type: Classification as private, public, reserved, etc.
- Binary Visualization: See the binary breakdown of addresses and masks
- Reverse DNS Zone: in-addr.arpa format for reverse DNS configuration
IPv6 Calculation Features
- Full Expanded Address: Complete unabbreviated IPv6 address
- Network Prefix: The network portion of the address
- Network Range: First and last addresses in the subnet
- Total Addresses: Number of IPv6 addresses in the subnet (usually extremely large)
- Interface ID: Host portion of the address
Pro Tip
When planning a network, use the subnet calculator to plan hierarchical subnets. For example, start with a /16 network and divide into multiple /24 subnets for different departments.
Common CIDR Reference
| CIDR | Subnet Mask | Hosts | Common Use |
|---|---|---|---|
| /32 | 255.255.255.255 | 1 | Single host |
| /30 | 255.255.255.252 | 2 | Point-to-point links |
| /29 | 255.255.255.248 | 6 | Tiny networks |
| /24 | 255.255.255.0 | 254 | Small network/standard LAN |
| /16 | 255.255.0.0 | 65,534 | Large organization |
Example: Enter 192.168.1.0/24 to see detailed subnet information for a standard home or small office network.
IPv6 Expander
The IPv6 Expander tool converts abbreviated IPv6 addresses into their fully expanded format, and vice versa. This is essential for properly understanding, comparing, and documenting IPv6 addresses in network configurations.
Key Benefits:
- Convert shortened IPv6 addresses to their full 128-bit representation
- Abbreviate full IPv6 addresses according to standard conventions
- Easily copy expanded addresses for documentation or configuration
- Learn and understand IPv6 address conventions
Usage
- Enter an IPv6 address in any valid format
- Choose to expand or abbreviate the address
- View the result in the chosen format
- Copy the result to your clipboard for use in configurations
Advanced Features
- Format Validation: Ensures the input is a valid IPv6 address
- Format Variations: Handles all valid IPv6 abbreviation rules
- Binary Representation: View the 128-bit binary format of the address
- Address Breakdown: See the address divided into its 8 segments
- Prefix Extraction: Identify network and host portions based on prefix length
IPv6 Format Rules
- Full IPv6 address has 8 segments of 4 hexadecimal digits (128 bits total)
- Double colon (::) can replace one contiguous sequence of zero segments
- Leading zeros in each segment can be omitted
Example Conversions
| Abbreviated | Expanded |
|---|---|
| 2001:db8::1 | 2001:0db8:0000:0000:0000:0000:0000:0001 |
| ::1 | 0000:0000:0000:0000:0000:0000:0000:0001 |
| fe80::a432:f123 | fe80:0000:0000:0000:0000:0000:a432:f123 |
IP Location Finder
The IP Location Finder tool provides geographical and network information about any IPv4 or IPv6 address. It helps identify the physical location, hosting provider, and network details associated with an IP address.
Key Benefits:
- Determine the geographical location of website visitors or server hosts
- Identify the origin of network traffic for security analysis
- Verify CDN and global service distribution
- Troubleshoot region-specific content restrictions
Usage
- Enter an IP address (IPv4 or IPv6) or hostname
- Click "Locate" to retrieve information
- View detailed location and network information
Information Provided
- Geographical Data:
- Country and country code
- City and region/state
- ZIP/Postal code
- Latitude and longitude coordinates
- Network Information:
- Internet Service Provider (ISP)
- Organization
- Autonomous System Number (ASN)
- IP address type (residential, business, hosting, etc.)
- Connection type (broadband, mobile, data center)
- Time Zone:
- Local time
- UTC offset
- Timezone identifier
Privacy Note
IP geolocation data provides approximate locations and may not be 100% accurate, especially for mobile or VPN connections. The tool uses aggregate databases and does not track or store user queries.
Advanced Features
- Interactive Map: Visual representation of the IP's geographical location
- Hostname Resolution: Automatically resolves domain names to IP addresses
- Export Options: Download location data in JSON or CSV format
- Multiple Database Sources: Cross-references multiple geolocation databases for accuracy
Common Use Cases
- Security Analysis: Verify the origin of login attempts or API requests
- Compliance: Ensure users are accessing content from permitted regions
- Performance Optimization: Identify where to deploy edge servers for better user experience
- Network Troubleshooting: Diagnose routing or latency issues based on geographic distance
Firewall Rule Generator
The Firewall Rule Generator creates properly formatted firewall rules for various platforms based on your network security requirements. It simplifies the process of creating consistent and correct syntax for different firewall systems.
Key Benefits:
- Generate properly formatted rules for multiple firewall platforms
- Ensure consistent security policy implementation
- Save time by avoiding manual syntax writing
- Reduce configuration errors in firewall implementations
- Support for advanced features like port forwarding and masquerading
Supported Platforms
- iptables (Linux)
- ufw (Uncomplicated Firewall for Ubuntu)
- firewalld (CentOS/RHEL/Fedora)
- nftables (Modern Linux firewall)
Usage
- Select the target firewall platform
- Choose a rule action:
- Allow - Permit the specified traffic
- Deny - Drop packets silently
- Reject - Drop packets with notification
- Masquerade/Forwarding - Enable NAT/port forwarding
- Select from Common Services presets or specify custom parameters:
- Protocol (TCP/UDP/ICMP)
- Source and destination addresses/networks
- Port numbers, ranges, or comma-separated lists
- Interface (optional)
- Generate and copy the formatted rule
Rule Actions
The tool supports multiple rule actions for comprehensive firewall management:
| Action | Description | Use Case |
|---|---|---|
| Allow | Permits traffic matching the rule | Allowing legitimate service access |
| Deny | Silently drops traffic (no response) | Blocking unauthorized access without notification |
| Reject | Drops traffic and sends rejection notice | More user-friendly blocking when notification is desired |
| Masquerade/Forwarding | Configures NAT and port forwarding | Router/gateway configurations, exposing internal services |
Common Services Presets
The tool provides built-in presets for both common and professional services, automatically configuring the correct ports and protocols:
Common Services
| Service | Ports | Protocol |
|---|---|---|
| HTTP | 80 | TCP |
| HTTPS | 443 | TCP |
| SSH | 22 | TCP |
| FTP | 21 | TCP |
| DNS | 53 | TCP, UDP |
Professional Services
| Service | Ports | Protocol |
|---|---|---|
| SMTP | 25, 465, 587 | TCP |
| SQL Server | 1433 | TCP |
| PostgreSQL | 5432 | TCP |
| RDP | 3389 | TCP |
| MongoDB | 27017 | TCP |
Advanced Features
- Port Forwarding and Masquerading: Configure NAT rules to expose internal services or enable internet connection sharing
- Multiple Port Formats: Support for individual ports, port ranges (e.g., 8000-9000), and comma-separated lists (e.g., 80,443,8080)
- IP Forwarding Instructions: Automatically includes commands to enable and persist IP forwarding when needed
- Firewall-Specific Adaptations: Handles syntax differences between firewall systems intelligently:
- Automatically splits comma-separated ports into multiple commands for FirewallD (which doesn't support comma-separated syntax)
- Uses correct masquerading and DNAT syntax for each firewall platform
- Command Comments: Generated rules include clear, concise comments explaining their purpose
- Syntax Highlighting: Clearly formatted output for better readability
Pro Tips
- When implementing generated firewall rules in production environments, always test in a controlled setting first.
- When using the masquerade/forwarding option, ensure IP forwarding is enabled as instructed in the generated commands.
- For FirewallD, avoid using comma-separated port lists as it requires separate rules for each port.
- SMTP mail ports 25, 465, and 587 use TCP protocol (not UDP).
Port Forwarding and Masquerading
The tool provides comprehensive support for NAT configurations:
- DNAT (Port Forwarding): Redirects incoming traffic to internal servers
- SNAT/Masquerade: Allows internal clients to access the internet through a shared public IP
- IP Forwarding: Includes proper kernel parameter settings for packet forwarding
For port forwarding, the tool generates both the necessary firewall rules and system configurations to enable packet forwarding for all supported platforms.
Bridge Configuration Generator
The Bridge Configuration Generator creates network bridge configuration files for various Linux distributions and other systems. It helps system administrators properly set up network bridges for virtualization, container networking, and other scenarios requiring interface bridging.
Key Benefits:
- Generate correct bridge configurations for different systems
- Avoid common networking mistakes in bridge setup
- Save time with proper syntax for different distribution formats
- Support virtualization and container environments
Supported Configuration Formats
- Netplan (Ubuntu 18.04+)
- NetworkManager (nmcli)
- systemd-networkd
- Traditional interface files (/etc/network/interfaces)
- ifcfg-* files (RHEL/CentOS)
Usage
- Select the target system or configuration format
- Specify bridge parameters:
- Bridge interface name
- Physical interfaces to add to the bridge
- IP addressing (DHCP or static)
- Optional: MTU, MAC address
- Optional: STP settings
- Generate the configuration
- Copy the configuration to implement on your system
Advanced Features
- VLAN Support: Configure VLANs on bridge interfaces
- Bonding Integration: Bridge bonded interfaces for high availability
- IPv6 Support: Configure dual-stack addressing on bridges
- Validation: Check for configuration errors before generating files
- Custom Routes: Add static routes through the bridge
Important Note
Configuring network bridges incorrectly can cause connectivity issues. Always have console or out-of-band access when implementing bridge configurations on remote systems.
Common Use Cases
- Virtualization Host: Bridge physical NICs to provide direct network access to VMs
- Container Networking: Bridge configuration for Docker, LXC, or Kubernetes
- Network Segmentation: Create software-based bridge+VLAN configurations
- Network Function Virtualization: Setup for virtual routers and firewalls
Example Configurations
The tool provides examples for common scenarios including:
- Basic bridge with DHCP
- Static IP bridge with multiple interfaces
- VLAN-aware bridge for virtualization
- Bonded interfaces with bridging for high availability
API Reference
IP Toolkit does not currently offer a public API. All tools are designed for web interface usage.
If you're interested in API access to these networking tools, please contact us at contact@iptoolkit.xyz with your use case.
Coming Soon
We're currently developing a comprehensive API that will provide programmatic access to all IP Toolkit features. Sign up for our newsletter to be notified when the API becomes available.