IP Address Extractor
Extract all IPv4 and IPv6 addresses from unstructured text.
About IP Address Extractor
The IP Address Extractor uses precise regex patterns to identify and extract all IPv4 addresses (including CIDR notation like 192.168.1.0/24) and IPv6 addresses from unstructured text of any length, filtering out false positives like version numbers or dates that match the x.x.x.x pattern. Network administrators, security analysts, and DevOps engineers constantly need to pull IP addresses from firewall logs, threat reports, configuration files, and incident data — this tool does it in a single paste without any command-line grep invocations.
How to Use
Paste any text containing IP addresses — firewall logs, Nginx or Apache access logs, threat intelligence reports, netstat output, email headers, or configuration files — into the input field. The tool extracts all unique IPv4 and IPv6 addresses, separates them by protocol version, and deduplicates the list. Use the filter toggle to include or exclude private RFC 1918 ranges, loopback addresses, and link-local addresses from the results before copying or exporting.
Common Use Cases
- SOC analysts extracting attacker IPv4 and IPv6 addresses from firewall deny logs, Nginx access logs, or IDS alerts to feed into threat intelligence lookup and blocklist creation workflows
- Network administrators pulling all IP addresses from router configuration exports, ACL files, or Ansible inventory templates to audit allowed ranges and detect unauthorized entries
- Incident responders collecting all IP addresses from email headers, phishing URLs, and malware traffic logs to build a comprehensive IOC list for firewall blocking rules
- Cloud infrastructure engineers extracting endpoint IPs from Terraform state files, CloudFormation templates, or Kubernetes manifests to audit public exposure and security group rules
- Red teamers pulling IP addresses from OSINT sources, certificate transparency logs, or public scan results to enumerate the attack surface of a target organization