Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
<?xml version="1.0" encoding="UTF-8"?>
<contextMenu>
<menuEntry name="Domain Crawler Query" url="http://www.domaincrawler.com/ip/view/%IP%" />
<menuEntry name="DomainTools Query" url="https://whois.domaintools.com/%IP%" />
<menuEntry name="Exposure Lookup" url="http://exposure.iseclab.org/detection/ip?ip=%IP%" />
<menuEntry name="Fortiguard Threat Research" url="http://www.fortiguard.com/ip_rep/index.php?data=%IP%&amp;lookup=Lookup" />
<menuEntry name="Google SafeBrowsing Report" url="http://www.google.com/safebrowsing/diagnostic?site=%IP%" />
<menuEntry name="HoneyNet Project Lookup" url="http://www.projecthoneypot.org/ip_%IP%" />
<menuEntry name="IPVoid Query" url="http://www.ipvoid.com/scan/%IP%" />
<menuEntry name="IsitAPT" url="http://isitapt.com/%IP%" />
<menuEntry name="IpIntel" url="https://ipintel.io/%IP%" />
<menuEntry name="Malc0de Search" url="http://malc0de.com/database/index.php?search=%IP%" />
<menuEntry name="Malekals Forum" url="http://malwaredb.malekal.com/url.php?domaine=&amp;ip=%IP%" />
<menuEntry name="NetBIOS Lookup" exec="/usr/bin/nmblookup -A %IP%" />
<menuEntry name="Nmap NO PING" exec="/usr/bin/nmap -Pn -A %IP%" />
<menuEntry name="ORBL Blacklist Query" url="http://www.mxtoolbox.com/SuperTool.aspx?action=blacklist%3a%IP%" />
<menuEntry name="PassiveTotal Query" url="https://www.passivetotal.org/passive/%IP%" />
<menuEntry name="Ping" exec="/bin/ping -c 5 %IP%" />
<menuEntry name="RobTex Query" url="http://www.robtex.com/ip/%IP%.html" />
<menuEntry name="SANS IP Query" url="http://isc.sans.org/ipinfo.html?ip=%IP%" />
<menuEntry name="ShodanHQ Query" url="http://www.shodanhq.com/search?q=%IP%" />
<menuEntry name="Spamhaus Query" url="http://www.spamhaus.org/query/bl?ip=%IP%" />
<menuEntry name="TCP/IP Neighbors" url="http://www.tcpiputils.com/browse/ip-address/%IP%" />
<menuEntry name="Threat Miner" url="https://www.threatminer.org/host.php?q=%IP%" />
<menuEntry name="Totalhash Query" url="http://totalhash.cymru.com/network/?ip:%IP%" />
<menuEntry name="Traceroute" exec="/bin/traceroute %IP%" />
<menuEntry name="VirusTotal Query" url="https://www.virustotal.com/en/ip-address/%IP%/information" />
<menuEntry name="X-Force Exchange Lookup" url="https://exchange.xforce.ibmcloud.com/#/ip/%IP%" />
</contextMenu>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.