CYRUSX

Tools

Security, networking, and analysis tools for IT professionals.

Network Engineering

Subnetting, routing, and network diagnostics for engineers and admins.

Subnet Calculator

Calculate network range, broadcast address, and usable hosts.

IP to Binary Converter

Convert IPv4 addresses into binary format for subnetting analysis.

DNS Lookup

Query A, AAAA, MX, TXT, NS, CNAME records for any domain.

MAC Address Lookup

Identify the manufacturer of any network device from its MAC OUI.

BGP / ASN Lookup

Routing prefixes, ASN details, RIR allocation, and abuse contacts.

Ping / Connectivity

Check if a host is reachable and measure response time.

Advanced Subnet Breakdown

Pro

Full subnet breakdown with wildcard masks and usable IP ranges.

VLSM Calculator

Pro

Plan and allocate variable length subnets across a base network.

RF Link Budget Tool

Pro

Calculate path loss, received power, and link margin for RF links.

Network Dashboard

Pro

Live network info and downloadable terminal dashboard with system stats.

Network Scanner

Pro

Scan your LAN for devices — IP, hostname, MAC, vendor, and type.

Threat Intelligence & OSINT

Passive recon, infrastructure mapping, and threat data for analysts and researchers.

IP Reputation Lookup

Geolocation, ISP, ASN, abuse score, and threat flags for any IP.

WHOIS Lookup

Domain registration, registrar, expiry, nameservers, and DNSSEC.

CVE Lookup

Search the NIST NVD for vulnerabilities by CVE ID or keyword.

Subdomain Finder

Enumerate subdomains via certificate transparency logs. Passive OSINT.

Domain Intelligence

Pro

Full-stack domain scan — WHOIS, DNS, SSL, IP reputation, subdomains, lookalike detection, and threat signals in one report.

Vulnerability Intelligence

Pro

Deep CVE analysis — CVSS breakdown, EPSS exploitation probability, CISA KEV status, patch priority score, and remediation plan.

Bulk IP Lookup

Pro

Geolocate and threat-check up to 100 IPs at once. Export to CSV.

Pen Testing & Recon

Active recon tools for authorized security testing and vulnerability assessment.

Forensics & Analysis

Inspect, decode, and analyze artifacts from emails, web traffic, and cryptographic operations.

Artificial Intelligence

Explore how AI is reshaping the workforce and the tools built to analyze it.