Skip to content

Commit

Permalink
remove extra slash
Browse files Browse the repository at this point in the history
it fixes #487
  • Loading branch information
garanews authored May 30, 2019
1 parent 8dae6a8 commit 072ae90
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions analyzers/IBMXForce/ibmxforce_lookup.py
Original file line number Diff line number Diff line change
Expand Up @@ -116,10 +116,10 @@ def ip_query(self, data):
_session = requests.Session()
_session.auth = (self.key, self.pwd)

_query_ip = _session.get('%s/ipr/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_ip = _session.get('%sipr/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_malware = _session.get(
'%s/ipr/malware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_info = _session.get('%s/resolve/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
'%sipr/malware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_info = _session.get('%sresolve/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)

ip_data = _query_ip.json() if _query_ip.status_code == 200 else {}
malware_data = _query_malware.json() if _query_malware.status_code == 200 else {}
Expand All @@ -141,10 +141,10 @@ def domain_query(self, data):
_session = requests.Session()
_session.auth = (self.key, self.pwd)

_query_url = _session.get('%s/url/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_url = _session.get('%surl/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_malware = _session.get(
'%s/url/malware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_info = _session.get('%s/resolve/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
'%surl/malware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
_query_info = _session.get('%sresolve/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)

url_data = _query_url.json() if _query_url.status_code == 200 else {}
malware_data = _query_malware.json() if _query_malware.status_code == 200 else {}
Expand All @@ -167,7 +167,7 @@ def malware_query(self, data):
_session.auth = (self.key, self.pwd)

_query_malware = _session.get(
'%s/malware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)
'%smalware/%s' % (self.url, data), proxies=self.proxies, verify=self.verify)

if _query_malware.status_code == 200:
return self.cleanup(malware_data=_query_malware.json())
Expand Down Expand Up @@ -220,4 +220,4 @@ def run(self):


if __name__ == '__main__':
IBMXForceAnalyzer().run()
IBMXForceAnalyzer().run()

0 comments on commit 072ae90

Please sign in to comment.