Back to App

Worldwide Network Explorer

Secure your Boundary

1.25M+ IP Network Records
250+ Countries Covered
7 Scanning Tools
6 Color Themes

Core Features

🔍 Advanced Search

Search by country, ASN, organization, domain, or network CIDR. Natural language queries like "Google in US" or "Hetzner in Germany".

🌎 Interactive World Map

Visualize network distributions globally with clickable country markers. Zoom out to see all countries at once.

💻 Scanning Tool Generator

Click any network to generate ready-to-use scan commands for Nmap, Masscan, Naabu, RustScan, ZMap, Gobuster, and Httpx. Copy with one click.

👥 Organization Discovery

When searching a country, discover all organizations operating there. Click to search by ASN for more details.

📄 Pagination

Browse through large result sets with 10 results per page. Navigate easily with Previous/Next buttons.

🔮 6 Color Themes

Choose from Dark, Light, Nord, Dracula, GitHub, or Ocean themes. Your preference is saved automatically.

Search Types

Country Search

Find all networks in a specific country by name or code.

United States, Germany, JP

ASN Search

Look up Autonomous System Numbers with optional "AS" prefix.

AS13335, 13335

Organization Search

Find networks belonging to specific companies or entities.

Google, Microsoft, Hetzner

Combined Search

Filter organizations by country for precise results.

Google in US, Netflix in JP

Domain Search

Search networks by registered domain name.

google.com, microsoft.com

Network/CIDR Search

Query specific IP ranges in CIDR notation.

8.8.8.0/24, 192.168.1.0/24

Built-in Scanning Tools

Every network search result includes ready-to-use scan commands for 7 popular network scanning tools. Click any network to generate commands:

🔌 Nmap

The industry standard for network exploration and security auditing. Port scanning, service detection, OS fingerprinting.

🚀 Masscan

Ultra-fast port scanner capable of scanning the entire internet in minutes. Best for large-scale reconnaissance.

📡 Naabu

Reliable and fast port scanner written in Go. Simple yet powerful for subdomain and port discovery.

💻 RustScan

Modern, ultra-fast port scanner written in Rust. Designed to be faster than Nmap while maintaining accuracy.

🌐 ZMap

Open-source network scanner that can scan the entire IPv4 address space in under 45 minutes. Research-grade speed.

🗃 Gobuster

Directory/file and DNS busting tool. Discover hidden paths, subdirectories, and DNS subdomains.

🌐 Httpx

Fast and reliable HTTP probe tool. Identify live web servers, running services, and HTTP responses.

How to Use

  1. Enter a search query in the search box using any of the search types above
  2. Press Enter or click the Search button
  3. Browse results - each card shows network, ASN, country, name, organization, and domain
  4. Click a network to open the scanning tool command generator with 7 network scanners
  5. Copy commands for Nmap, Masscan, Naabu, RustScan, ZMap, Gobuster, or Httpx with one click
  6. Click countries on the map to search that country directly
  7. Use example tags below the search box for quick searches
  8. Scroll down to see other organizations in the searched country

Real-World Use Cases for Boundary Security

🛡 Firewall Rule Optimization

Network administrators can identify all IP ranges belonging to specific organizations to create precise firewall rules. Instead of blocking individual IPs, block entire ASNs or organization networks.

Search "Cloudflare" to find all Cloudflare IP ranges, then configure your firewall to allow only traffic from these trusted CDN IPs.

🔒 Threat Intelligence & IOC Enrichment

When investigating security incidents, determine the geographic origin and owning organization of suspicious IP addresses. This helps in understanding attack patterns and attributing threats.

An IP 185.220.101.42 appears in logs. Search for the network to discover it belongs to a German hosting provider, helping assess if it's likely a compromised server or malicious infrastructure.

💻 Cloud Asset Discovery

Security teams can inventory all IP space used by cloud providers in their environment, ensuring all cloud assets are accounted for in security assessments.

Search "Amazon" to discover AWS IP ranges, then cross-reference with your asset inventory to identify any unauthorized cloud instances.

🌐 Geographic Access Control

Implement geo-blocking policies by identifying IP ranges associated with specific countries. Restrict access to sensitive systems from high-risk regions.

Your company only does business in the US and EU. Search "Russia" and "China" to identify networks from these regions for potential blocking.

📈 Security Monitoring & Alerting

Create baselines of expected network traffic by understanding which ASNs and organizations your systems typically communicate with.

Your payment system should only communicate with payment processors. Search for Visa, Mastercard, PayPal ASNs to validate your firewall rules.

🔍 Penetration Testing Reconnaissance

Security professionals use IP-to-ASN data during reconnaissance to map target infrastructure, identify hosting providers, and understand network scope.

During a pentest, discover that target.com uses Akamai for CDN. Search Akamai IPs to understand the full attack surface and potential edge cases.

📈 Compliance & Audit Preparation

Demonstrate due diligence by documenting all known IP ranges used by third-party services in your environment for security audits.

Prepare for SOC 2 audit by documenting all SaaS providers. Search for Salesforce, Microsoft 365, Google Workspace to list their IP ranges in your documentation.

📊 SIEM Log Enrichment

Enhance security logs by adding organization and geographic context to raw IP addresses for better threat hunting and incident response.

Ingest IP-to-ASN data into your SIEM. When analyzing logs, automatically enrich IPs with owning organization to quickly identify if traffic is from known partners or unexpected sources.

📡 DNS & Domain Intelligence

Correlate domain searches with IP allocations to understand hosting patterns and identify potentially suspicious domain registrations.

A domain example.net appears in phishing analysis. Search for the domain, then check if the IP range is associated with known bulletproof hosting providers.

🛠 VPN & Zero Trust Architecture

Validate that remote access systems are configured to allow traffic only from expected geographic regions and organizations.

Your VPN should only accept connections from corporate offices. Search for your office locations to ensure VPN rules match actual office IP ranges.

🔌 Quick Reconnaissance with Built-in Tools

Jumpstart your reconnaissance by generating ready-to-use scan commands for any discovered network range. Copy commands for Nmap, Masscan, Naabu, RustScan, ZMap, Gobuster, or Httpx instantly.

During a pentest engagement, discover that your target uses AWS. Search for "Amazon" to find their IP ranges, click a network, and copy a pre-configured Nmap or Masscan command to begin port scanning immediately.

Database Information

The application uses a comprehensive IP-to-ASN database containing over 1.25 million records covering 250+ countries. The database is compressed using 7z compression (reducing 28MB to 7MB) and decompressed in the browser using libarchive.js. Data includes:

This data is sourced from github.com/iplocate/ip-address-databases, a community project dedicated to maintaining open IP geolocation data.

💡 Tip: The database is loaded entirely in the browser using WebAssembly (SQLite) after decompressing a 7z archive. No data is sent to external servers, ensuring privacy while you search. The 7z compression reduces initial download from 28MB to 7MB.
⚠ Disclaimer: This tool is for legitimate security research and network administration purposes only. Always comply with applicable laws and terms of service when using IP range information.

Technical Stack