What's my IP?
Fetches your public IP as seen by the internet. This makes a
single request to api.ipify.org.
Tools
These little utilities are here to answer the kinds of questions I get from teammates and customers all the time: “what does this subnet mean?”, “is this port normal?”, and how everything lines up in the OSI model.
Most tools on this page run purely in your browser. No data is sent anywhere — it's just JavaScript doing math and lookups.
A few tools (public IP, MAC vendor lookup, and speed test) do make a clearly-labeled request to a third-party endpoint, because that data doesn't exist locally.
Fetches your public IP as seen by the internet. This makes a
single request to api.ipify.org.
Enter a MAC address to look up the manufacturer (OUI). This sends the MAC you
enter to api.macvendors.com.
A fast, lightweight download test using Cloudflare's public speed endpoint (speed.cloudflare.com).
Use this for a quick read; for a full test, open Cloudflare's speed page.
Pick a common port to see what it's usually used for and how I think about securing it on a firewall or edge device.
Click a layer to see how I think about it from a cybersecurity and CISO perspective.
Type an IPv4 CIDR (for example 10.0.5.0/24) to see the
network, broadcast, mask, and usable host range.
A quick copy/paste reference for the commands I reach for during networking and incident response.
Show interfaces and IP addresses.
Show the routing table.
List listening TCP/UDP ports with process names.
Find what's bound to a specific port.
Query DNS and inspect answers.
Fetch HTTP headers (quick reachability + TLS sanity check).
Basic connectivity + latency snapshot.
See hop-by-hop path to a destination.
Follow logs live (path varies by distro).
Systemd journal: service-focused log view.
Legacy DNS query tool (handy when dig isn't installed).
Quick packet capture for DNS (change port/host as needed).
Check a service status (replace <service>).
Restart a service after config changes.
Disk usage by filesystem.
Memory usage snapshot.
Show UFW firewall rules (Ubuntu/Debian).
Inspect nftables rules (modern Linux firewall).
Recent auth events (Debian/Ubuntu path).
Show full interface config (IP, gateway, DNS, MAC).
PowerShell view of IP/DNS/gateway info.
DNS query from PowerShell.
Connectivity + TCP port check (great for triage).
Show connections + listening ports with PIDs.
Map a PID back to a process (use with netstat output).
Windows traceroute equivalent.
Show your current user context (helps with permissions debugging).
View ARP cache (who your host thinks is on the LAN).
Show the routing table (Windows equivalent of ip r).
Clear DNS resolver cache (good after DNS changes).
PowerShell-friendly way to list listening ports and owning PIDs.
Pull recent security events (useful for IR triage).
Quick HTTP HEAD request (similar to curl -I).
Bulk update installed apps (if Winget is available).
System file integrity check (run as admin if needed).
Generate MD5, SHA-1, or SHA-256 for a string or IOC. This is for integrity checks and quick lookups — not for password storage.
Live threat-map view from FortiGuard Labs. This embed is intentionally full-width and large so it’s useful as a “status board” at a glance.