SYSTEM ONLINE
INFRAISLAND SOC COMMAND CENTER
Blue Team & Incident Response — One-Click Tools
⚠ For authorized use only. All actions are logged. Ensure you have written permission before scanning external targets.
🔍
WHOIS
Domain/IP registration
🌐
DNS Lookup
A, MX, TXT, CNAME records
📡
Port Scan
Nmap-powered scanner
☣️
IOC Extract
IPs, URLs, hashes, CVEs
🔐
Hash Tools
MD5, SHA1, SHA256, SHA512
🔒
SSL Inspector
Cert chain & cipher
📋
Log Analyzer
Parse & triage logs
📅
IR Timeline
Build incident chronology
🔄
Encode/Decode
Base64, URL, Hex, ROT13
⚠️
CVE Lookup
MITRE vulnerability details
💻
Sys Snapshot
Processes, conns, logins
🔑
Pwd Strength
Password policy checker
TOOL CATEGORIES
OSINT / Reconnaissance5 tools
Network Analysis3 tools
Forensics / Analysis4 tools
Incident Response3 tools
QUICK REFERENCE
No data sent to external services (except GeoIP, CVE, SSL)
All tools run locally on this VM
File hashing stays in-memory only
Port scans may trigger IDS alerts
Obtain written authorization first
🔍
WHOIS LOOKUP
Domain registration, registrar, abuse contact, NS records
Output
Awaiting input...
🌐
DNS LOOKUP
Query A, AAAA, MX, NS, TXT, CNAME, SOA records
Output
Awaiting input...
📍
GEOIP & REVERSE DNS
Geolocation, ASN, reverse hostname resolution
GEO IP LOOKUP
Awaiting input...
REVERSE DNS
Awaiting input...
🔒
SSL / TLS INSPECTOR
Certificate details, cipher suite, expiry, SANs
Certificate Details
Awaiting input...
⚠️
CVE LOOKUP
MITRE CVE database query — description, severity, references
CVE Details
Awaiting input...
📡
PORT SCANNER
Nmap-powered: quick scan, full TCP, UDP, vuln scripts, stealth
⚠ Port scanning without authorization may be illegal. Only scan targets you own or have written permission to test.
Nmap Output
Awaiting input...
📶
PING & TRACEROUTE
ICMP reachability test and hop-by-hop path tracing
PING
Awaiting input...
TRACEROUTE
Awaiting input...
🖧
NETWORK INFO
Local interfaces, routing table, ARP cache, active connections
Network Snapshot
Awaiting input...
🔐
HASH TOOLS
MD5, SHA1, SHA256, SHA512 — text input or file upload
HASH TEXT
Awaiting input...
HASH FILE
Awaiting file...
🔄
ENCODE / DECODE
Base64, URL, Hex, Binary, ROT13
Result
Awaiting input...
☣️
IOC EXTRACTOR
Extract IPs, domains, URLs, emails, hashes, CVEs, registry keys
Extracted Indicators
Awaiting input...
📋
LOG ANALYZER
Triage log files — top IPs, error patterns, suspicious activity
Analysis Report
Awaiting input...
📅
INCIDENT RESPONSE TIMELINE
Build a chronological event log for your incident report
Timeline Report
Add events above and click Build Timeline...
💻
SYSTEM SNAPSHOT
Processes, memory, disk, logged-in users, recent logins
Captures: uname, uptime, df, free, ps, who, last
System Snapshot
Awaiting input...
🔑
PASSWORD STRENGTH
Policy compliance check — no passwords are transmitted externally
ℹ Password analysis is performed locally in this server only. No data leaves this VM.
Analysis
Awaiting input...