DRIL – Domain Reverse IP Lookup Tool

Keep on Guard!

DRIL (Domain Reverse IP Lookup) Tool is a Reverse Domain Tool that will really be useful for penetration testers to find out the domain names which are listed in the the target host, DRIL is a GUI, JAVA based application which uses a Bing API key.

DRIL has a simple user friendly interface which will be helpful for penetration tester to do their work fast without a mess, this is only tested on Linux but as it is JAVA it should work on Windows too.

There are various other tools which carry out similar tasks, especially utilizing the Bing API.

You can download DRIL here:


Or read more here.

Posted in: Hacking Tools, Network Hacking

, , , , , , , ,

Recent in Hacking Tools:
- Kadimus – LFI Scanner & Exploitation Tool
- SessionGopher – Session Extraction Tool
- Powerfuzzer – Automated Customizable Web Fuzzer

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,015,206 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,569,728 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 700,542 views

5 Responses to DRIL – Domain Reverse IP Lookup Tool

  1. Rob April 7, 2011 at 1:08 pm #

    Pretty vague, anyone have any idea what this does that dig doesn’t?

    • Darknet April 7, 2011 at 4:49 pm #

      Dig will only give a result if that IP address has a reverse DNS record (which not all do) and even then it’ll only give one result. This tool will show all domains which Bing has indexed which use that IP address (think shared hosting). You can do the same thing on Bing directly using the IP: search operand.

  2. Peter April 7, 2011 at 11:48 pm #

    Nice tool , good for penetration testing on servers .

  3. Imran April 12, 2011 at 9:04 am #

    awesome :)

  4. Morgan Storey April 19, 2011 at 7:25 am #

    I tend to use http://www.yougetsignal.com/tools/web-sites-on-web-server/
    http://www.sitedossier.com/ip/x.x.x.x and http://www.domaintools.com/research/reverse-ip/
    as well as bing’s operand, and just a good old google search.