This tool provides a sophisticated yet easy-to-use solution for maintaining anonymity during security testing. The timed rotation feature is particularly useful for avoiding IP-based rate limiting during fuzzing and vulnerability scanning.
IP Vortex is a powerful network utility designed for security professionals, penetration testers, and bug bounty hunters. This tool provides sophisticated IP rotation capabilities to help you maintain anonymity and bypass IP-based restrictions during security testing activities.
- π Automatic IP Rotation: Change your public IP address on demand
- β±οΈ Timed Rotations: Set rotation intervals (every 30s, 5m, etc.)
- πΆ Multi-Interface Support: Works with WiFi (wlan), Ethernet (eth), and USB tethering
- π MAC Address Randomization: Optional MAC spoofing for enhanced anonymity
- π Network Status Monitoring: Real-time interface and connection information
- π Auto-Dependency Installation: Automatically installs required packages
- π Smart Privilege Management: Automatically handles sudo requirements
- π Comprehensive Logging: Detailed rotation history and system events
# Clone the repository
git clone https://github.com/MilesPhoka/IP-Vortex.git
# Navigate to project directory
cd IP-Vortex
# Make script executable
chmod +x ip-vortex.sh
# Run the tool (will auto-install dependencies)
./ip-vortex.sh --help
# Display the current version of IP-Vortex
./ip-vortex.sh -V
- Basic IP Rotation
# Single rotation on auto-detected interface
./ip-vortex.sh
# Rotate specific interface (wlan0) with verbose output
./ip-vortex.sh -I wlan0 -v
# Rotate with MAC randomization
./ip-vortex.sh -m
# Rotate every 2 minutes with MAC randomization
./ip-vortex.sh -t 120 -m
# Rotate every 30 seconds (minimum is 10s) with verbose output
./ip-vortex.sh -t 30 -v
# Rotate Ethernet interface every 5 minutes
./ip-vortex.sh -I eth0 -t 300
# Show current network status
./ip-vortex.sh -s
# Check interface details while rotating
./ip-vortex.sh -I eth0 -t 60 -v
# Start rotation in background
./ip-vortex.sh -t 300 > rotation.log 2>&1 &
# Run security tools simultaneously
ffuf -w wordlist.txt -u https://target.com/FUZZ
nuclei -u https://target.com -t vulnerabilities/
# Monitor IP changes
tail -f rotation.log
# Stop rotation
pkill -f ip-vortex.sh
- Web Application Fuzzing with IP Rotation
# Rotate IP every 50 requests
./ip-vortex.sh -t 300 &
ffuf -w params.txt:PARAM -w values.txt:VAL \
-u 'https://target.com/page?PARAM=VAL' \
-p "0.3-1.2" -t 50 -rate 20
# Rotate IP after each API call
for endpoint in $(cat api-endpoints.txt); do
./ip-vortex.sh
curl -s "https://api.target.com/$endpoint" | jq .
sleep 1
done
# Rotate IP between port scans
./ip-vortex.sh -t 120 -m &
while read ip; do
nmap -T4 -Pn $ip
sleep $((RANDOM % 30 + 10))
done < targets.txt
# Rotate IP every 10 login attempts
./ip-vortex.sh -t 60 &
hydra -L users.txt -P passwords.txt \
target.com http-post-form "/login:username=^USER^&password=^PASS^:F=incorrect" \
-t 10 -w 5
# Reset network if script interrupted
./ip-vortex.sh --recover
# Verify internet connectivity
ping 8.8.8.8
# Full network restart (if needed)
sudo systemctl restart NetworkManager
- Release current DHCP lease
- Bring interface down
- Randomize MAC address (if enabled)
- Bring interface up
- Request new DHCP lease
- Verify new IP assignment
- Confirm internet connectivity
Component | Minimum Requirement | Recommended |
---|---|---|
OS | Linux (Kali, Ubuntu, Debian, Arch) | Kali Linux 2023+ |
Memory | 512 MB RAM | 2 GB RAM |
Storage | 100 MB available | 1 GB available |
Network | DHCP-enabled connection | High-speed internet |
Privileges | Root/sudo access | β |
Operation | Average Time | Notes |
---|---|---|
Single rotation | 2β5 seconds | Varies by network |
MAC randomization | +1β2 seconds | Depends on hardware |
Internet recovery | < 3 seconds | After successful rotation |
Continuous rotation | 1000+ cycles | Stable long-term operation |
Issue | Solution |
---|---|
Rotation fails | Run with -v for detailed output |
"No active interfaces" | Check interface status with ip a |
MAC randomization fails | Install latest macchanger: sudo apt install --reinstall macchanger |
Internet not recovering | Use ./ip-vortex.sh --recover |
Slow rotation times | Increase minimum time to 15+ seconds |
Permission errors | Ensure script is run with sudo |
# Enable verbose mode
./ip-vortex.sh -I wlan0 -t 60 -v
# Check system logs
journalctl -u NetworkManager -f
# Verify IP changes
watch -n 1 'curl -s ifconfig.me'
# Test interface directly
sudo dhclient -r wlan0
sudo dhclient -v wlan0
Scenario | Usefulness (1-5β ) |
---|---|
Web App Scanning | β β β β β |
API Testing | β β β β β |
Network Probes | β β β ββ |
Brute Force | β β βββ (risky) |
VPN Avoidance | β ββββ (use VPN) |
- Fork the repository
- Create a feature branch (
git checkout -b feature/improvement
) - Commit your changes (
git commit -am 'Add new feature'
) - Push to the branch (
git push origin feature/improvement
) - Open a pull request
β οΈ Ethical Notice
Use this tool only on networks and systems you have explicit permission to test.
Unauthorized use may violate laws and regulations.
The developers assume no liability for misuse of this software.
Author: Miles Phoka
Version: 1.2
GitHub: https://github.com/MilesPhoka