1 00:00:05,260 --> 00:00:07,950 Getting who is information. 2 00:00:08,490 --> 00:00:09,240 Hello, everyone. 3 00:00:09,360 --> 00:00:16,650 They were going to talk about how to use the hui's comment in order to get some more information about 4 00:00:16,650 --> 00:00:23,210 the two men that were analyzing information such as IP address, location and so on. 5 00:00:23,580 --> 00:00:30,510 So let's create Ngawang one file, which we're going to run, and let's see how we can actually do that. 6 00:00:31,320 --> 00:00:35,090 So you can actually do this from the terminal using the Jason. 7 00:00:35,400 --> 00:00:36,710 And it's quite simple. 8 00:00:36,710 --> 00:00:37,740 Let's write Python. 9 00:00:40,200 --> 00:00:42,240 So right here in port. 10 00:00:45,590 --> 00:00:52,940 All requests, requests, and after that, Lizardo response. 11 00:00:56,500 --> 00:00:57,280 He, of course. 12 00:00:59,330 --> 00:01:01,760 Requests not post. 13 00:01:03,910 --> 00:01:07,270 And here I will do HTP. 14 00:01:09,210 --> 00:01:23,980 Then slash h t t p bean dot org slash post and let's close off here, then go to Jason. 15 00:01:25,620 --> 00:01:26,460 Equals. 16 00:01:29,160 --> 00:01:29,670 Kee. 17 00:01:31,470 --> 00:01:34,680 OK, and then AVADO. 18 00:01:38,770 --> 00:01:40,240 Let's close the record here. 19 00:01:42,280 --> 00:01:50,850 OK, so our response is complicit with the post method and our federal response, not the status quo. 20 00:01:51,580 --> 00:01:54,490 It is 200, so it was successful. 21 00:01:54,790 --> 00:01:59,350 And if we do response dot g song. 22 00:02:01,750 --> 00:02:09,580 OK, you can see all the arguments related to the Jason from here, so you can see that our kids who 23 00:02:09,580 --> 00:02:15,220 don't have forex, the data here is key slash value. 24 00:02:15,670 --> 00:02:16,750 We don't have files. 25 00:02:16,750 --> 00:02:17,770 We don't have form. 26 00:02:19,290 --> 00:02:21,430 We have our accepted met and so on. 27 00:02:21,660 --> 00:02:28,140 So this is a way for you to use the JSON or check all the data and those you can see, as I promised 28 00:02:28,410 --> 00:02:33,660 here, you can find also the IP address of this website here. 29 00:02:34,500 --> 00:02:36,000 And so this is the origin. 30 00:02:36,120 --> 00:02:40,740 And also you can find the Eurail, the root as well and so on. 31 00:02:41,460 --> 00:02:43,060 So this was everything. 32 00:02:43,080 --> 00:02:48,700 I want to show you it was adjacent and how to find information about websites with it. 33 00:02:49,200 --> 00:02:50,680 Thank you very much for watching, guys. 34 00:02:50,730 --> 00:02:52,820 And I'll see you in our next video.