-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
URLs pulling in IPs #34
Comments
bump |
Hi, @punkrokk! This issue is now resolved and available in the develop branch. I will send another comment here once a new version is available for download from PyPI. Here's an example with the new code: import iocextract
def extract_no_scheme_urls():
url = "1[.]1[.]1[.]1:443"
print(list(iocextract.extract_urls(url, refang=True, no_scheme=True)))
extract_no_scheme_urls() |
New version is now available on PyPI: https://pypi.org/project/iocextract/1.14.0/ |
@azazelm3dj3d while it seems like the bug originally referenced in this issue is fixed in the new version, the one I commented above still exists. Defanged IPs still get extracted by |
If I have a URL with a port - e.g. 1.1.1.1:449 I'm seeing a URL getting extracted in the format of:
http://1.1.1.1:449.
Is that desired behavior?
The text was updated successfully, but these errors were encountered: