Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoSign in
Socket

iphack

Package Overview
Dependencies
Maintainers
1
Versions
40
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

iphack - pypi Package Compare versions

Comparing version
1.3.9
to
1.4.1
+1
-8
iphack.egg-info/PKG-INFO
Metadata-Version: 2.1
Name: iphack
Version: 1.3.9
Version: 1.4.1
Summary: the most ideal tool for finding out information about IP, etc.

@@ -117,9 +117,2 @@ Home-page: https://github.com/mishakorzik/IpHack

>>>
# search IP
>>> from iphack import *
>>> iphack.search.ip("google.com")
1.0.126.229 / 1.0.158.92 / 1.0.160.34 / 1.0.161.31 / 1.0.164.79 / 1.0.167.84 / 1.0.167.205 / 1.0.168.165 / 1.0.169.41 / 1.0.247.243
>>>
```

@@ -126,0 +119,0 @@

+1
-1
ua-headers==0.0.3
requests==2.27.0
requests
torpy==1.1.6
pyproxify==0.0.1
import os, sys, json, random, platform, time, re, pyproxify
#from scapy.all import *
import itertools
import threading, bs4
import threading
try:
import bs4
except:
print(f"/033[01;32mModule bs4 could not be found")
from ua_headers import ua

@@ -28,3 +32,3 @@

cyan = '\033[96m'
version = "1.3.9"
version = "1.4.1"
referer_list = ["https://www.google.com/", "https://www.youtube.com/", "https://www.twitter.com/", "https://www.discord.com/", "https://www.tiktok.com/", "https://www.instagram.com/", "https://check-host.net/", "https://github.com", "https://gitlab.com", "https://he1zen.rf.gd"]

@@ -68,15 +72,17 @@

ipdata = random.choice(ipdata_list)
paste = "https://api.ipdata.co/"+ipaddr+ipdata
data1 = requests.get(paste, headers=headers).json()
data1 = requests.get("https://api.ipdata.co/"+ipaddr+ipdata, headers=headers).json()
data6 = requests.get("http://ip-api.com/json/"+ipaddr+"?fields=status,message,isp,org,as,reverse,mobile,proxy,hosting,query,district", headers=headers, timeout=10).json()
data7 = requests.get("https://api.ipregistry.co/"+ipaddr+"?key=g54hjdzjnudhhsp4", headers=headers, timeout=10).json()
he1zen = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/iphack.json", timeout=15).json()
html = bs4.BeautifulSoup(requests.get("https://spur.us/context/"+ipaddr, headers={"User-Agent": ua.windows()}).text, features="lxml")
title = str(html.title)
title = title.replace("IP Context - Spur</title>", "")
title = title.replace("<title>", "")
title = title.replace("(", "")
title = title.replace(")", "")
title = title.replace(ipaddr, "")
try:
html = bs4.BeautifulSoup(requests.get("https://spur.us/context/"+ipaddr, headers={"User-Agent": ua.windows()}).text, features="lxml")
title = str(html.title)
title = title.replace("IP Context - Spur</title>", "")
title = title.replace("<title>", "")
title = title.replace("(", "")
title = title.replace(")", "")
title = title.replace(ipaddr, "")
except:
title = ""
try:
he1zen = he1zen[ipaddr]

@@ -94,18 +100,18 @@ except:

print(a, "├ Victim :", data1['ip'])
print(a, "┼ Is eu :", data1['is_eu'])
print(a, "┼ Is eu :", data7['location']['in_eu'])
print(a, "├ Type :", data7['type'])
print(a, "├ City :", data1['city'])
print(a, "├ Region :", data1['region'])
print(a, "├ Region code :", data1['region_code'])
print(a, "├ Region type :", data1['region_type'])
print(a, "├ Country name :", data1['country_name'])
print(a, "├ Country code :", data1['country_code'])
print(a, "├ Latitude :", data1['latitude'])
print(a, "├ Longitude :", data1['longitude'])
print(a, "├ Zip code :", data1['postal'])
print(a, "├ Calling code :", data1['calling_code'])
print(a, "├ Country area :", data5['area'])
print(a, "├ Country population :", data5['population'])
print(a, "├ Country capital :", data5['capital'])
print(a, "├ Country tld :", data5['tld'])
print(a, "├ City :", data7['location']['city'])
print(a, "├ Region :", data7['location']['region']['name'])
print(a, "├ Region code :", data7['location']['region']['code'])
print(a, "├ Country code :", data7['location']['country']['code'])
print(a, "├ Country name :", data7['location']['country']['name'])
print(a, "├ Country area :", data7['location']['country']['area'])
print(a, "├ Country capital :", data7['location']['country']['capital'])
print(a, "├ Country tld :", data7['location']['country']['tld'])
print(a, "├ Calling :", "+"+data7['location']['country']['calling_code'])
print(a, "├ Zip code :", data7['location']['postal'])
print(a, "├ Latitude :", data7['location']['latitude'])
print(a, "├ Longitude :", data7['location']['longitude'])
print(a, "├ Population :", data7['location']['country']['population'])
print(a, "├ Population density :", data7['location']['country']['population_density'])
print(a, "└ Language name :", data11['name'])

@@ -116,16 +122,22 @@ data2 = data1['asn']

print(" ")
print(a, "┌──────────[Router/Time zone]")
print(a, "┌──────────[Router/Time]")
print(a, "├ Asn name :", data8['asn'])
print(a, "├ Org name :", data2['name'])
print(a, "┼ Reverse :", data6['reverse'])
print(a, "├ Hostname :", data7['hostname'])
print(a, "├ District :", data6['district'])
print(a, "├ Hostname :", data7['hostname'])
print(a, "├ Domain :", data8['domain'])
print(a, "├ Route :", data2['route'])
print(a, "├ Abbr :", data3['abbr'])
print(a, "├ Offset :", data3['offset'])
print(a, "├ Wifi Type :", data2['type'])
print(a, "├ Time Zone :", data3['name'])
print(a, "├ Abbr :", data3['abbr'])
print(a, "├ Offset :", data3['offset'])
print(a, "├ Connection Domain :", data7['connection']['domain'])
print(a, "├ Company Domain :", data7['company']['domain'])
print(a, "├ Ip route :", data7['connection']['route'])
print(a, "└ Is dst :", data3['is_dst'])
print(" ")
print(a, "┌──────────[Carrier]")
print(a, "┼ Carrier name :", data7['carrier']['name'])
print(a, "├ Carrier mcc :", data7['carrier']['mcc'])
print(a, "└ Carrier mnc :", data7['carrier']['mnc'])
print(" ")
data4 = data1['threat']

@@ -165,7 +177,3 @@ print(a, "┌──────────[Security]")

except requests.exceptions.ConnectionError as e:
print (red+"[-]"+" Please check your internet connection!"+clear)
print (red+"[-]"+" Error code: 106 DNS server refused to connect!"+clear)
#except:
# b = red+bold+"["+clear+"-"+red+bold+"]"+clear
# print(b, " Unknown Error")
print(red+"[-]"+" Please check your internet connection!"+clear)
def my():

@@ -172,0 +180,0 @@ import requests

Metadata-Version: 2.1
Name: iphack
Version: 1.3.9
Version: 1.4.1
Summary: the most ideal tool for finding out information about IP, etc.

@@ -117,9 +117,2 @@ Home-page: https://github.com/mishakorzik/IpHack

>>>
# search IP
>>> from iphack import *
>>> iphack.search.ip("google.com")
1.0.126.229 / 1.0.158.92 / 1.0.160.34 / 1.0.161.31 / 1.0.164.79 / 1.0.167.84 / 1.0.167.205 / 1.0.168.165 / 1.0.169.41 / 1.0.247.243
>>>
```

@@ -126,0 +119,0 @@

@@ -85,9 +85,2 @@ <img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/IpHack/20210822_200816.png"/>

>>>
# search IP
>>> from iphack import *
>>> iphack.search.ip("google.com")
1.0.126.229 / 1.0.158.92 / 1.0.160.34 / 1.0.161.31 / 1.0.164.79 / 1.0.167.84 / 1.0.167.205 / 1.0.168.165 / 1.0.169.41 / 1.0.247.243
>>>
```

@@ -94,0 +87,0 @@

@@ -10,3 +10,3 @@ import setuptools

packages=['iphack'], # should match the package folder
version='1.3.9', # important for updates
version='1.4.1', # important for updates
python_requires=">=3.4",

@@ -24,3 +24,3 @@ license='Apache 2.0', # should match your chosen license

},
install_requires=['ua-headers==0.0.3', 'requests==2.27.0', 'torpy==1.1.6', 'pyproxify==0.0.1'], # list all packages that your package uses
install_requires=['ua-headers==0.0.3', 'requests', 'torpy==1.1.6', 'pyproxify==0.0.1'], # list all packages that your package uses
keywords=["ip", "address", "iphack", "ips", "pypi", "pip", "dns", "router", "ipv4", "ipv6", "public", "ip-address", "isp", "location", "lookup", "iplookup", "inquiry", "tor", "anon"], # descriptive meta-data

@@ -27,0 +27,0 @@ classifiers=[