Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

iphack

Package Overview
Dependencies
Maintainers
1
Versions
40
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

iphack - npm Package Compare versions

Comparing version
1.4.3
to
1.4.7
+1
-1
iphack.egg-info/PKG-INFO
Metadata-Version: 2.1
Name: iphack
Version: 1.4.3
Version: 1.4.7
Summary: the most ideal tool for finding out information about IP, etc.

@@ -5,0 +5,0 @@ Home-page: https://github.com/mishakorzik/IpHack

@@ -5,2 +5,1 @@ ua-headers==0.0.3

pyproxify==0.0.1
bs4==0.0.1

@@ -5,6 +5,2 @@ import os, sys, json, random, platform, time, re, pyproxify

import threading
try:
import bs4
except:
print(f"/033[01;32mModule bs4 could not be found")
from ua_headers import ua

@@ -33,3 +29,3 @@

cyan = '\033[96m'
version = "1.4.3"
version = "1.4.7"
referer_list = ["https://www.google.com/", "https://www.youtube.com/", "https://www.twitter.com/", "https://www.discord.com/", "https://www.tiktok.com/", "https://www.instagram.com/", "https://check-host.net/", "https://github.com", "https://gitlab.com", "https://he1zen.rf.gd"]

@@ -82,11 +78,9 @@

try:
html = bs4.BeautifulSoup(requests.get("https://spur.us/context/"+ipaddr, headers={"User-Agent": ua.windows()}).text, features="lxml")
title = str(html.title)
title = title.replace("IP Context - Spur</title>", "")
title = title.replace("<title>", "")
title = title.replace("(", "")
title = title.replace(")", "")
title = title.replace(ipaddr, "")
myip_ms = requests.get("https://blacklist.myip.ms/"+ipaddr, headers={"User-Agent": ua.windows()}).text
if "Not Listed in Blacklist" in myip_ms:
myip_ms = f"\033[01;32mNot Blacklisted\033[0m"
else:
myip_ms = f"\033[01;31mBlacklisted\033[0m"
except:
title = "None"
myip_ms = "Unknown"
a = lgreen+bold+"["+clear+"+"+lgreen+bold+"]"+clear

@@ -171,9 +165,4 @@ r = lgreen+bold+"["+red+bold+"!"+lgreen+bold+"]"+clear

threat = data7['security']['is_threat']
if tor == True or vpn == True or proxy == True or anon == True or cloud == True or attacker == True or threat == True:
spur = "spur.us/context/"+ipaddr
else:
spur = " "
print(a, "┌──────────[Other]")
print(a, "┼ spur.us : "+spur)
print(a, "├ additional info : "+str(title))
print(a, "┼ myip.ms : "+myip_ms)
print(a, "└ he1zen info : "+he1zen)

@@ -180,0 +169,0 @@ except KeyboardInterrupt:

Metadata-Version: 2.1
Name: iphack
Version: 1.4.3
Version: 1.4.7
Summary: the most ideal tool for finding out information about IP, etc.

@@ -5,0 +5,0 @@ Home-page: https://github.com/mishakorzik/IpHack

@@ -10,3 +10,3 @@ import setuptools

packages=['iphack'], # should match the package folder
version='1.4.3', # important for updates
version='1.4.7', # important for updates
python_requires=">=3.4",

@@ -24,3 +24,3 @@ license='Apache 2.0', # should match your chosen license

},
install_requires=['ua-headers==0.0.3', 'requests', 'torpy==1.1.6', 'pyproxify==0.0.1', "bs4==0.0.1"], # list all packages that your package uses
install_requires=['ua-headers==0.0.3', 'requests', 'torpy==1.1.6', 'pyproxify==0.0.1'], # list all packages that your package uses
keywords=["ip", "address", "iphack", "ips", "pypi", "pip", "dns", "router", "ipv4", "ipv6", "public", "ip-address", "isp", "location", "lookup", "iplookup", "inquiry", "tor", "anon"], # descriptive meta-data

@@ -27,0 +27,0 @@ classifiers=[