Te-k / harpoon

CLI tool for open source and threat intelligence
https://www.randhome.io/blog/2018/02/23/harpoon-an-osint-/-threat-intelligence-tool/
GNU General Public License v3.0
1.16k stars 181 forks source link

PT look up errors #114

Closed RevThreat closed 4 years ago

RevThreat commented 5 years ago
Traceback (most recent call last):
  File "/usr/local/bin/harpoon", line 11, in <module>
    load_entry_point('harpoon==0.1.3', 'console_scripts', 'harpoon')()
  File "/usr/local/lib/python3.5/dist-packages/harpoon-0.1.3-py3.5.egg/harpoon/main.py", line 61, in main
    plugins[args.command].run(config, args, plugins)
  File "/usr/local/lib/python3.5/dist-packages/harpoon-0.1.3-py3.5.egg/harpoon/commands/domain.py", line 169, in run
    'first': d['time_first_o'].astimezone(pytz.utc),
ValueError: astimezone() cannot be applied to a naive datetime
Te-k commented 5 years ago

Thanks for reporting this bug, which version are you currently using ? I think I have fixed that bug with the current development version, could you try to test this with the version in the github repo ? Thanks

RevThreat commented 4 years ago

Yo, sorry i forgot that i had put this one in. And made a new one the other day :/ You can ignore that recent one, so this is happening even with the latest updates. (if you go look at the new issue i made, you'll see that some IP's work, and some dont) again I'm sorry for making another issue. Totally forgot I made this one..

Edit: looking at this error though, compared to the new one. its not breaking at the same point, actually now that im looking at this, it seem that a lot of different errors are thrown, depending on the IP being searched (some go through fine) while others cause various parts to break

Te-k commented 4 years ago

Thanks, let's continue in the other issue #117