IPP

IP Port Extractor

Extract IPv4 and IPv6 endpoints from text

IP & Routing
πŸ”’ 100% client-side β€” your data never leaves this page
Page mode
Input

Quick CTA

Paste logs or config text and extract IP:port endpoints first; localhost and sorting rules stay in Deep.

Output
Extracted endpoints appear here
πŸ”’ 100% client-side
Page reading mode

Quick keeps the summary, direct answers, and next steps so you can validate fit and get a result faster.

About this tool

IP Port Extractor scans raw logs and text to capture IPv4 and bracketed IPv6 endpoints with ports. It validates port ranges, supports duplicate removal, and can sort output for faster review. This is useful for incident response, firewall allowlist preparation, backend connectivity checks, and traffic analysis where endpoint lists must be produced quickly from noisy logs. By extracting only valid network endpoints, it reduces manual copy errors and speeds up debugging workflows. All extraction is done in-browser without uploading operational data.

Direct Answers

Can it extract both IPv4 and IPv6 endpoints?

Yes. It supports IPv4 pairs and bracketed IPv6 host-port patterns in noisy logs.

Why are some endpoints missing from the result?

Invalid ports, unsupported host formats, or localhost filtering can remove rows from the final output.