You're Invited:Meet the Socket Team at RSAC and BSidesSF 2026, March 23–26.RSVP
Socket
Book a DemoSign in
Socket

iphack

Package Overview
Dependencies
Maintainers
1
Versions
40
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

iphack - pypi Package Compare versions

Comparing version
1.4.1
to
1.4.2
+1
-1
iphack.egg-info/PKG-INFO
Metadata-Version: 2.1
Name: iphack
Version: 1.4.1
Version: 1.4.2
Summary: the most ideal tool for finding out information about IP, etc.

@@ -5,0 +5,0 @@ Home-page: https://github.com/mishakorzik/IpHack

@@ -5,1 +5,2 @@ ua-headers==0.0.3

pyproxify==0.0.1
bs4==0.0.1

@@ -32,3 +32,3 @@ import os, sys, json, random, platform, time, re, pyproxify

cyan = '\033[96m'
version = "1.4.1"
version = "1.4.2"
referer_list = ["https://www.google.com/", "https://www.youtube.com/", "https://www.twitter.com/", "https://www.discord.com/", "https://www.tiktok.com/", "https://www.instagram.com/", "https://check-host.net/", "https://github.com", "https://gitlab.com", "https://he1zen.rf.gd"]

@@ -72,7 +72,11 @@

ipdata = random.choice(ipdata_list)
data1 = requests.get("https://api.ipdata.co/"+ipaddr+ipdata, headers=headers).json()
data1 = requests.get("https://api.ipdata.co/"+ipaddr+ipdata, headers=headers, timeout=10).json()
data6 = requests.get("http://ip-api.com/json/"+ipaddr+"?fields=status,message,isp,org,as,reverse,mobile,proxy,hosting,query,district", headers=headers, timeout=10).json()
data7 = requests.get("https://api.ipregistry.co/"+ipaddr+"?key=g54hjdzjnudhhsp4", headers=headers, timeout=10).json()
he1zen = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/iphack.json", timeout=15).json()
try:
he1zen = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/iphack.json", timeout=10).json()
he1zen = he1zen[ipaddr]
except:
he1zen = "None"
try:
html = bs4.BeautifulSoup(requests.get("https://spur.us/context/"+ipaddr, headers={"User-Agent": ua.windows()}).text, features="lxml")

@@ -86,13 +90,5 @@ title = str(html.title)

except:
title = ""
try:
he1zen = he1zen[ipaddr]
except:
he1zen = " "
title = "None"
a = lgreen+bold+"["+clear+"+"+lgreen+bold+"]"+clear
r = lgreen+bold+"["+red+bold+"!"+lgreen+bold+"]"+clear
data9 = data7['location']
data5 = data9['country']
data10 = data7['security']
data11 = data9['language']
print(a, "┌──────────[Geolocation]")

@@ -108,6 +104,6 @@ print(a, "├ Status :", data6['status'])

print(a, "├ Country name :", data7['location']['country']['name'])
print(a, "├ Country capital :", data7['location']['country']['capital'])
print(a, "├ Country area :", data7['location']['country']['area'])
print(a, "├ Country capital :", data7['location']['country']['capital'])
print(a, "├ Country tld :", data7['location']['country']['tld'])
print(a, "├ Calling :", "+"+data7['location']['country']['calling_code'])
print(a, "├ Calling code :", "+"+data7['location']['country']['calling_code'])
print(a, "├ Zip code :", data7['location']['postal'])

@@ -118,49 +114,54 @@ print(a, "├ Latitude :", data7['location']['latitude'])

print(a, "├ Population density :", data7['location']['country']['population_density'])
print(a, "└ Language name :", data11['name'])
data2 = data1['asn']
data8 = data7['connection']
data3 = data1['time_zone']
print(a, "└ Language name :", data7['location']['language']['name'])
district = data6['district']
if district == "":
district = "None"
print(" ")
print(a, "┌──────────[Router/Time]")
print(a, "├ Asn name :", data8['asn'])
print(a, "├ Org name :", data2['name'])
print(a, "├ Asn name :", data7['connection']['asn'])
print(a, "├ Org name :", data1['asn']['name'])
print(a, "┼ Reverse :", data6['reverse'])
print(a, "├ Hostname :", data7['hostname'])
print(a, "├ District :", data6['district'])
print(a, "├ Abbr :", data3['abbr'])
print(a, "├ Offset :", data3['offset'])
print(a, "├ Wifi Type :", data2['type'])
print(a, "├ Time Zone :", data3['name'])
print(a, "├ District :", district)
print(a, "├ Type :", data7['connection']['type'])
print(a, "├ Abbr :", data1['time_zone']['abbr'])
print(a, "├ Offset :", data1['time_zone']['offset'])
print(a, "├ Time Zone :", data1['time_zone']['name'])
print(a, "├ Wifi Type :", data1['asn']['type'])
print(a, "├ Connection Domain :", data7['connection']['domain'])
print(a, "├ Company Domain :", data7['company']['domain'])
print(a, "├ Ip route :", data7['connection']['route'])
print(a, "└ Is dst :", data3['is_dst'])
print(a, "└ Is dst :", data1['time_zone']['is_dst'])
print(" ")
print(a, "┌──────────[Security]")
print(a, "├ Is tor :", data7['security']['is_tor'])
print(a, "├ Is vpn :", data7['security']['is_vpn'])
print(a, "┼ Is proxy :", data7['security']['is_proxy'])
print(a, "├ Is relay :", data7['security']['is_relay'])
print(a, "├ Is hosting :", data6['hosting'])
print(a, "├ Is datacenter :", data1['threat']['is_datacenter'])
print(a, "├ Is anonymous :", data7['security']['is_anonymous'])
print(a, "├ Is attacker :", data7['security']['is_attacker'])
print(a, "├ Is abuser :", data7['security']['is_abuser'])
print(a, "├ Is threat :", data7['security']['is_threat'])
print(a, "└ Is bogon :", data1['threat']['is_bogon'])
print(" ")
mb = data7['carrier']['name']
if mb == None:
mobile = "False"
else:
mobile = "True"
print(a, "┌──────────[Carrier]")
print(a, "┼ Carrier name :", data7['carrier']['name'])
print(a, "┼ Mobile internet :", mobile)
print(a, "├ Carrier name :", data7['carrier']['name'])
print(a, "├ Carrier mcc :", data7['carrier']['mcc'])
print(a, "└ Carrier mnc :", data7['carrier']['mnc'])
print(" ")
data4 = data1['threat']
print(a, "┌──────────[Security]")
print(a, "├ Using tor :", data10['is_tor'])
print(a, "├ Using vpn :", data10['is_vpn'])
print(a, "┼ Using proxy :", data10['is_proxy'])
print(a, "├ Is relay :", data10['is_relay'])
print(a, "├ Is hosting :", data6['hosting'])
print(a, "├ Is datacenter :", data4['is_datacenter'])
print(a, "├ Is anonymous :", data10['is_anonymous'])
print(a, "├ Cloud provider :", data10['is_cloud_provider'])
print(a, "├ Known attacker :", data4['is_known_attacker'])
print(a, "├ Known abuser :", data4['is_known_abuser'])
print(a, "├ Is threat :", data4['is_threat'])
print(a, "└ Is bogon :", data4['is_bogon'])
print(" ")
tor = data10['is_tor']
vpn = data10['is_vpn']
proxy = data10['is_proxy']
anon = data10['is_anonymous']
cloud = data10['is_cloud_provider']
attacker = data4['is_known_attacker']
threat = data4['is_threat']
tor = data7['security']['is_tor']
vpn = data7['security']['is_vpn']
proxy = data7['security']['is_proxy']
anon = data7['security']['is_anonymous']
cloud = data7['security']['is_cloud_provider']
attacker = data7['security']['is_attacker']
threat = data7['security']['is_threat']
if tor == True or vpn == True or proxy == True or anon == True or cloud == True or attacker == True or threat == True:

@@ -170,5 +171,5 @@ spur = "spur.us/context/"+ipaddr

spur = " "
print(a, "┌──────────[Information]")
print(a, "┌──────────[Other]")
print(a, "┼ spur.us : "+spur)
print(a, "├ other info : "+str(title))
print(a, "├ additional info : "+str(title))
print(a, "└ he1zen info : "+he1zen)

@@ -258,3 +259,4 @@ except KeyboardInterrupt:

domain = " ".join([str(m) for m in domain])
subdomains = open(file).read().splitlines()
subdomains = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/subdomains.txt").text
subdomains = subdomains.splitlines()
headers={"User-Agent": ua.windows()}

@@ -265,2 +267,4 @@ sub = True

try:
domain = domain.replace("https://", "")
domain = domain.replace("http://", "")
url = f"http://{subdomain}.{domain}"

@@ -286,3 +290,4 @@ requests.get(url, headers=headers)

domain = " ".join([str(m) for m in domain])
directories = open(file).read().splitlines()
directories = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/directories.txt").text
directories = directories.splitlines()
headers={"User-Agent": ua.windows()}

@@ -293,2 +298,4 @@ sub = True

try:
domain = domain.replace("https://", "")
domain = domain.replace("http://", "")
url = f"http://{domain}/{directory}"

@@ -295,0 +302,0 @@ code = requests.get(url, headers=headers)

Metadata-Version: 2.1
Name: iphack
Version: 1.4.1
Version: 1.4.2
Summary: the most ideal tool for finding out information about IP, etc.

@@ -5,0 +5,0 @@ Home-page: https://github.com/mishakorzik/IpHack

@@ -10,3 +10,3 @@ import setuptools

packages=['iphack'], # should match the package folder
version='1.4.1', # important for updates
version='1.4.2', # important for updates
python_requires=">=3.4",

@@ -24,3 +24,3 @@ license='Apache 2.0', # should match your chosen license

},
install_requires=['ua-headers==0.0.3', 'requests', 'torpy==1.1.6', 'pyproxify==0.0.1'], # list all packages that your package uses
install_requires=['ua-headers==0.0.3', 'requests', 'torpy==1.1.6', 'pyproxify==0.0.1', "bs4==0.0.1"], # list all packages that your package uses
keywords=["ip", "address", "iphack", "ips", "pypi", "pip", "dns", "router", "ipv4", "ipv6", "public", "ip-address", "isp", "location", "lookup", "iplookup", "inquiry", "tor", "anon"], # descriptive meta-data

@@ -27,0 +27,0 @@ classifiers=[