IP Finder CLI is the Official Command Line Client For IPFinder, singing up for a free account at https://ipfinder.io/auth/signup, for Free IPFinder API access token.
The free plan is limited to 4,000 requests a day, and doesn’t include some of the data fields To enable all the data fields and additional request volumes see https://ipfinder.io/pricing.
It include the following features;
Also Read – LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram
System Requirements
First, download the IPfinder cli using Composer:
composer global require ipfinder-io/ip-finder-cli
Make sure to place composer’s system-wide vendor bin directory in your $PATH
so the IPfinder executable can be located by your system. This directory exists in different locations based on your operating system; however, some common locations include:
$HOME/.composer/vendor/bin
$HOME/.config/composer/vendor/bin
%USERPROFILE%\AppData\Roaming\Composer\vendor\bin
download the IPfinder cli using from github using curl
##using curl
$ curl -LO https://github.com/ipfinder-io/ip-finder-cli/releases/download/v1.0.0/ipfinder.phar
##Using wget
$ wget https://github.com/ipfinder-io/ip-finder-cli/releases/download/v1.0.0/ipfinder.phar
$ chmod +x ipfinder.phar
$ sudo mv ipfinder.phar /usr/bin/ipfinder
$ ipfinder -h
Windows
C:\bin
cmd
» ENTER)C:\bin\ipfinder.cmd
):C:\Users\username> cd
C:\bin C:\bin> echo @php “%~dp0ipfinder.phar” %* > ipfinder.cmd
C:\bin> exit
C:\Users\username> ipfinder –help
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…