LATEST ALERTS:
Loading live updates...

Dravincon Cybersecurity Command Center

All Systems Operational

IP Reputation

API

Tool Guidance

Queries the AbuseIPDB database to see if the target IP has been flagged for spam, DDoS, or other malicious behaviors.

Example Input: 1.1.1.1

Check if an IP has been reported for malicious activity.

URL Scanner

API

Tool Guidance

Submits a URL to VirusTotal for real-time analysis against multiple antivirus engines and website scanners.

Example Input: https://example.com

Scan a URL for malware or phishing threads.

File Hash Intelligence

API

Tool Guidance

Verifies if a known file hash has been associated with confirmed malware samples in global threat repositories.

Example Input: 44d88612fea8a8f36de82e1278abb02f

Check file hashes against threat databases.

WHOIS Lookup

Local

Tool Guidance

Retrieves administrative and technical contact details, registration dates, and nameserver information for a domain.

Example Input: google.com

Get domain registration and ownership info.

DNS Intelligence

Local

Tool Guidance

Performs a deep traversal of DNS records (A, MX, TXT, NS, etc.) to analyze the infrastructure of a target domain.

Example Input: microsoft.com

Retrieve all DNS records for a domain.

IP Geolocation

API

Tool Guidance

Resolves the ISP, city, region, and country associated with an IP address using geographical databases.

Example Input: 8.8.8.8

Find the physical location of an IP address.

Reverse DNS

Local

Tool Guidance

Performs a PTR record lookup to resolve a numeric IP address back to its human-readable domain or hostname.

Example Input: 1.1.1.1

Find the hostname associated with an IP.

ICMP/TCP Ping

Local

Tool Guidance

Measures round-trip time and connectivity by sending echo requests to a remote server and recording the latency.

Example Input: google.com

Test host availability and latency.

Port Checker

Local

Tool Guidance

Verifies if a specific TCP port is listening on the target host by attempting a socket connection.

Example Input: google.com

Check if a specific port is open.

Subnet Calculator

Local

Tool Guidance

Parses IPv4 CIDR notation to provide network address, broadcast address, netmask, and usable host range.

Example Input: 10.0.0.0/8

Calculate network ranges and masks.

Nmap Port Scanner

Local

Tool Guidance

Simulates Nmap behavior to scan common ports or user-defined ranges. Support lists (80,443) and ranges (20-30).

Example Input: 192.168.1.1

Perform quick or custom port scans.

Email Security Auditor

Local

Tool Guidance

Analyzes the DNS records of a domain to verify anti-spoofing and authentication mechanisms like SPF, DMARC, and DKIM.

Example Input: gmail.com

Check SPF, DMARC, and DKIM settings.

SSL/TLS Certificate Inspector

Core

Tool Guidance

Inspects the SSL certificate of a domain to verify expiration, issuer, and domain coverage.

Example Input: google.com

Inspect the SSL/TLS certificate for a domain.

HTTP Headers

Core

Tool Guidance

Fetches the raw HTTP response headers of a URL to inspect security policies like HSTS and CSP.

Example Input: https://google.com

Fetch and inspect the HTTP response headers for a URL.

Hash Generator

Local

Tool Guidance

Instantly generates MD5, SHA1, SHA256, and SHA512 hashes for any input text string.

Example Input: CyberSecurity2024

Generate MD5, SHA1, SHA256, and SHA512 hashes.

Base64 Tool

Local

Tool Guidance

Encodes plain text into Base64 format or decodes existing Base64 strings back to readable text.

Example Input: SGVsbG8gV29ybGQ=

Encode or decode Base64 strings.

User Agent Analyzer

Local

Tool Guidance

Breaks down a raw User Agent string into readable components like Browser version, Operating System, and Hardware model.

Example Input: Mozilla/5.0 (iPhone; CPU iPhone OS 14_7_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Mobile/15E148 Safari/604.1

Parse User Agent strings to identify device, OS, and browser.

Proxy & VPN Detector

API

Tool Guidance

Queries proxy databases to determine if an IP address is associated with anonymization services like VPNs or Tor exits.

Example Input: 1.1.1.1

Identify if an IP is a known proxy, VPN, or Tor node.

Security Header Auditor

Core

Tool Guidance

Fetches HTTP headers and checks for security policies like Content-Security-Policy, HSTS, and X-Content-Type-Options.

Example Input: https://google.com

Grade a website's security based on HTTP headers.

CVE Vulnerability Search

API

Tool Guidance

Queries the CIRCL CVE database for vulnerabilities matching the provided product name or keyword.

Example Input: log4j

Search for known vulnerabilities by product or keyword.

MAC Vendor Lookup

API

Tool Guidance

Identifies the hardware manufacturer associated with a specific MAC address or OUI (Organizationally Unique Identifier).

Example Input: BC:92:6B:A0:00:01

Identify the manufacturer of a device from its MAC address.

Password Strength

Client

Tool Guidance

Analyzes password complexity based on length, character variety, and common patterns entirely within your browser.

Example Input: P@ssw0rd123!

Test the security level of your password.

JWT Token Analysis

Client

Tool Guidance

Decodes the header and payload of a JSON Web Token (JWT) to inspect claims and algorithms.

Example Input: eyJhbGci...

Decode and inspect JSON Web Tokens.

Frequently Asked Questions

Select Toolbox Modules