DEV Community

Henning
Henning

Posted on

NetSight - free network tool for developers and sysadmins

There are many IP lookup sites, but few offer exactly the features I’m looking for. They only show the location (usually very inaccurately) and nothing else.

I built NetSight to be the opposite. One toolbox, twelve tools, no accounts, no ads, no tracking of what you look up. Runs on a single Cloudflare Worker.

Try it: netsight.mutebefehl.de

NetSight home

What it does

Type any IP, hostname or URL into the search bar. The result aggregates eight intel sources in parallel:

  • Geolocation (city, country, ASN, ISP)
  • Reverse DNS and FCrDNS
  • AbuseIPDB confidence and report count
  • Scamalytics fraud score
  • VirusTotal scanner verdicts
  • URLhaus malware listings
  • about 30 DNSBLs
  • Shodan (open ports, known CVEs)

Each result paints into its own card the moment it arrives, so the page is interactive in under a second even when one upstream is slow.

IP lookup for 8.8.8.8

What makes it different

1. Anycast-aware. Most IP tools tell you Quad9 (9.9.9.9) is in California. It is not. The operator is a Swiss foundation in Zurich; the geolocated country is just the nearest POP. NetSight shows the operator HQ separately and labels the row with an anycast chip. Same handling for Cloudflare 1.1.1.1, OpenDNS, AdGuard, Yandex.

2. Server-side rendered for every IP route. Type netsight.mutebefehl.de/8.8.8.8 and you get a full HTML report immediately, not a skeleton-loading page. SEO-clean: only IPs with real ownership get indexed, private and bogon IPs are auto-tagged noindex.

3. Our own honeypot data feeds the reputation signal. This is the part nobody talks about in the free-IP-tool space. We run a dedicated honeypot infrastructure (SSH, VNC, HTTP, Modbus, S7) that records unsolicited connection attempts. The resulting database of attacker IPs is one of the inputs to our reputation scoring. When you see a suspicious badge on an IP report, there is a non-zero chance that IP just spent a week brute-forcing our fake water-treatment plant.

A curated subset is also published as a public blocklist on GitHub. Bring your own SIEM.

The full toolbox

All tools

Tool What it does
IP Lookup Geolocation, ISP, ASN, abuse, ports, CVEs - all sources in one report
DNS Lookup A, AAAA, MX, NS, TXT, SOA, CNAME, CAA, SRV plus propagation
WHOIS / RDAP Registrar, dates, nameservers, status
Subdomain Finder Certificate Transparency and AlienVault OTX
CVE Search CVSS, EPSS exploit-likelihood, CISA KEV flagging
Safe Browser URL preview with shortener / IP-logger / typosquat detection
Mail Check MX, SPF, DKIM, DMARC, Null-MX detection
Common Ports Quick reference
Password Strength Entropy and crack-time, fully client-side
Speed Test Throughput against globally distributed edges
API Public REST API, free tier without signup

Please feel free to email me directly at hey@mutebefehl.de with any questions or feedback.

Try it for free. I'd love to hear your feedback!

Top comments (0)