005_ss-link.info的ping探测工具
用小工具ping.py测试距离您最快的节点
#!/usr/bin/env python
# coding: utf-8 """
A pure python ping implementation using raw sockets. Note that ICMP messages can only be send from processes running as root
(in Windows, you must run this script as 'Administrator'). Bugs are naturally mine. I'd be glad to hear about them. There are
certainly word - size dependencies here. :homepage: https://github.com/socketubs/Pyping/
:copyleft: 1989-2011 by the python-ping team, see AUTHORS for more details.
:license: GNU GPL v2, see LICENSE for more details.
""" import os
import select
import signal
import socket
import struct
import sys
import time if sys.platform.startswith("win32"):
# On Windows, the best timer is time.clock()
default_timer = time.clock
else:
# On most other platforms the best timer is time.time()
default_timer = time.time # ICMP parameters
ICMP_ECHOREPLY = 0 # Echo reply (per RFC792)
ICMP_ECHO = 8 # Echo request (per RFC792)
ICMP_MAX_RECV = 2048 # Max size of incoming buffer MAX_SLEEP = 1000 def calculate_checksum(source_string):
"""
A port of the functionality of in_cksum() from ping.c
Ideally this would act on the string as a series of 16-bit ints (host
packed), but this works.
Network data is big-endian, hosts are typically little-endian
"""
countTo = (int(len(source_string) / 2)) * 2
sum = 0
count = 0 # Handle bytes in pairs (decoding as short ints)
loByte = 0
hiByte = 0
while count < countTo:
if (sys.byteorder == "little"):
loByte = source_string[count]
hiByte = source_string[count + 1]
else:
loByte = source_string[count + 1]
hiByte = source_string[count]
sum = sum + (ord(hiByte) * 256 + ord(loByte))
count += 2 # Handle last byte if applicable (odd-number of bytes)
# Endianness should be irrelevant in this case
if countTo < len(source_string): # Check for odd length
loByte = source_string[len(source_string) - 1]
sum += ord(loByte) sum &= 0xffffffff # Truncate sum to 32 bits (a variance from ping.c, which
# uses signed ints, but overflow is unlikely in ping) sum = (sum >> 16) + (sum & 0xffff) # Add high 16 bits to low 16 bits
sum += (sum >> 16) # Add carry from above (if any)
answer = ~sum & 0xffff # Invert and truncate to 16 bits
answer = socket.htons(answer) return answer def is_valid_ip4_address(addr):
parts = addr.split(".")
if not len(parts) == 4:
return False
for part in parts:
try:
number = int(part)
except ValueError:
return False
if number > 255:
return False
return True def to_ip(addr):
if is_valid_ip4_address(addr):
return addr
return socket.gethostbyname(addr) class Response(object):
def __init__(self):
self.max_rtt = None
self.min_rtt = None
self.avg_rtt = None
self.packet_lost = None
self.ret_code = None
self.output = [] self.packet_size = None
self.timeout = None
self.destination = None
self.destination_ip = None class Ping(object):
def __init__(self, destination, timeout=1000, packet_size=55, own_id=None, quiet_output=True, udp=False):
self.quiet_output = quiet_output
if quiet_output:
self.response = Response()
self.response.destination = destination
self.response.timeout = timeout
self.response.packet_size = packet_size self.destination = destination
self.timeout = timeout
self.packet_size = packet_size
self.udp = udp if own_id is None:
self.own_id = os.getpid() & 0xFFFF
else:
self.own_id = own_id try:
# FIXME: Use destination only for display this line here? see: https://github.com/jedie/python-ping/issues/3
self.dest_ip = to_ip(self.destination)
if quiet_output:
self.response.destination_ip = self.dest_ip
except socket.gaierror as e:
self.print_unknown_host(e)
else:
self.print_start() self.seq_number = 0
self.send_count = 0
self.receive_count = 0
self.min_time = 999999999
self.max_time = 0.0
self.total_time = 0.0 #-------------------------------------------------------------------------- def print_start(self):
msg = "\nPYTHON-PING %s (%s): %d data bytes" % (self.destination, self.dest_ip, self.packet_size)
if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) def print_unknown_host(self, e):
msg = "\nPYTHON-PING: Unknown host: %s (%s)\n" % (self.destination, e.args[1])
if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) sys.exit(-1) def print_success(self, delay, ip, packet_size, ip_header, icmp_header):
if ip == self.destination:
from_info = ip
else:
from_info = "%s (%s)" % (self.destination, ip) msg = "%d bytes from %s: icmp_seq=%d ttl=%d time=%.1f ms" % (packet_size, from_info, icmp_header["seq_number"], ip_header["ttl"], delay) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg)
#print("IP header: %r" % ip_header)
#print("ICMP header: %r" % icmp_header) def print_failed(self):
msg = "Request timed out." if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) def print_exit(self):
msg = "\n----%s PYTHON PING Statistics----" % (self.destination) if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) lost_count = self.send_count - self.receive_count
#print("%i packets lost" % lost_count)
lost_rate = float(lost_count) / self.send_count * 100.0 msg = "%d packets transmitted, %d packets received, %0.1f%% packet loss" % (self.send_count, self.receive_count, lost_rate) if self.quiet_output:
self.response.output.append(msg)
self.response.packet_lost = lost_count
else:
print(msg) if self.receive_count > 0:
msg = "round-trip (ms) min/avg/max = %0.3f/%0.3f/%0.3f" % (self.min_time, self.total_time / self.receive_count, self.max_time)
if self.quiet_output:
self.response.min_rtt = '%.3f' % self.min_time
self.response.avg_rtt = '%.3f' % (self.total_time / self.receive_count)
self.response.max_rtt = '%.3f' % self.max_time
self.response.output.append(msg)
else:
print(msg) if self.quiet_output:
self.response.output.append('\n')
else:
print('') #-------------------------------------------------------------------------- def signal_handler(self, signum, frame):
"""
Handle print_exit via signals
"""
self.print_exit()
msg = "\n(Terminated with signal %d)\n" % (signum) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg) sys.exit(0) def setup_signal_handler(self):
signal.signal(signal.SIGINT, self.signal_handler) # Handle Ctrl-C
if hasattr(signal, "SIGBREAK"):
# Handle Ctrl-Break e.g. under Windows
signal.signal(signal.SIGBREAK, self.signal_handler) #-------------------------------------------------------------------------- def header2dict(self, names, struct_format, data):
""" unpack the raw received IP and ICMP header informations to a dict """
unpacked_data = struct.unpack(struct_format, data)
return dict(zip(names, unpacked_data)) #-------------------------------------------------------------------------- def run(self, count=None, deadline=None):
"""
send and receive pings in a loop. Stop if count or until deadline.
"""
if not self.quiet_output:
self.setup_signal_handler() while True:
delay = self.do() self.seq_number += 1
if count and self.seq_number >= count:
break
if deadline and self.total_time >= deadline:
break if delay == None:
delay = 0 # Pause for the remainder of the MAX_SLEEP period (if applicable)
if (MAX_SLEEP > delay):
time.sleep((MAX_SLEEP - delay) / 1000.0) self.print_exit()
if self.quiet_output:
return self.response def do(self):
"""
Send one ICMP ECHO_REQUEST and receive the response until self.timeout
"""
try: # One could use UDP here, but it's obscure
if self.udp:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.getprotobyname("udp"))
else:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.getprotobyname("icmp"))
except socket.error, (errno, msg):
if errno == 1:
# Operation not permitted - Add more information to traceback
etype, evalue, etb = sys.exc_info()
evalue = etype(
"%s - Note that ICMP messages can only be send from processes running as root." % evalue
)
raise etype, evalue, etb
raise # raise the original error send_time = self.send_one_ping(current_socket)
if send_time == None:
return
self.send_count += 1 receive_time, packet_size, ip, ip_header, icmp_header = self.receive_one_ping(current_socket)
current_socket.close() if receive_time:
self.receive_count += 1
delay = (receive_time - send_time) * 1000.0
self.total_time += delay
if self.min_time > delay:
self.min_time = delay
if self.max_time < delay:
self.max_time = delay self.print_success(delay, ip, packet_size, ip_header, icmp_header)
return delay
else:
self.print_failed() def send_one_ping(self, current_socket):
"""
Send one ICMP ECHO_REQUEST
"""
# Header is type (8), code (8), checksum (16), id (16), sequence (16)
checksum = 0 # Make a dummy header with a 0 checksum.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) padBytes = []
startVal = 0x42
for i in range(startVal, startVal + (self.packet_size)):
padBytes += [(i & 0xff)] # Keep chars in the 0-255 range
data = bytes(padBytes) # Calculate the checksum on the data and the dummy header.
checksum = calculate_checksum(header + data) # Checksum is in network order # Now that we have the right checksum, we put that in. It's just easier
# to make up a new header than to stuff it into the dummy.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) packet = header + data send_time = default_timer() try:
current_socket.sendto(packet, (self.destination, 1)) # Port number is irrelevant for ICMP
except socket.error as e:
self.response.output.append("General failure (%s)" % (e.args[1]))
current_socket.close()
return return send_time def receive_one_ping(self, current_socket):
"""
Receive the ping from the socket. timeout = in ms
"""
timeout = self.timeout / 1000.0 while True: # Loop while waiting for packet or timeout
select_start = default_timer()
inputready, outputready, exceptready = select.select([current_socket], [], [], timeout)
select_duration = (default_timer() - select_start)
if inputready == []: # timeout
return None, 0, 0, 0, 0 receive_time = default_timer() packet_data, address = current_socket.recvfrom(ICMP_MAX_RECV) icmp_header = self.header2dict(
names=[
"type", "code", "checksum",
"packet_id", "seq_number"
],
struct_format="!BBHHH",
data=packet_data[20:28]
) if icmp_header["packet_id"] == self.own_id: # Our packet
ip_header = self.header2dict(
names=[
"version", "type", "length",
"id", "flags", "ttl", "protocol",
"checksum", "src_ip", "dest_ip"
],
struct_format="!BBHHHBBHII",
data=packet_data[:20]
)
packet_size = len(packet_data) - 28
ip = socket.inet_ntoa(struct.pack("!I", ip_header["src_ip"]))
# XXX: Why not ip = address[0] ???
return receive_time, packet_size, ip, ip_header, icmp_header timeout = timeout - select_duration
if timeout <= 0:
return None, 0, 0, 0, 0 def ping(hostname, timeout=1000, count=3, packet_size=55, udp=False,*args, **kwargs):
p = Ping(hostname, timeout, packet_size, *args, **kwargs)
return p.run(count) def allIP():
#return ["8.8.8.8","a8.8.4.4"]
r=[]
try:
import urllib2
hdr = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.64 Safari/537.11',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.3',
'Accept-Encoding': 'none',
'Accept-Language': 'en-US,en;q=0.8',
'Connection': 'keep-alive'}
req=urllib2.Request("https://www.ss-link.info/all",headers=hdr) s=urllib2.urlopen(req).read()
r=s.split()
except Exception,e:
print "Network Error",e
return r totalCount=5
def mycompare(x,y):
x1 = float(x.avg_rtt)+x.packet_lost*1000.0/totalCount
y1 = float(y.avg_rtt)+y.packet_lost*1000.0/totalCount
return int( 1000*(x1-y1) )
if __name__ == "__main__":
ips=allIP()
print "Start ..."
results=[]
for ip in ips:
r=None
try:
r=ping(ip,count=totalCount)
except Exception,e:
print e
if r:
print r.destination_ip,"..."
if r.avg_rtt == None: r.avg_rtt = 2000
results.append(r)
print ""
print "The most fast IP:"
results = sorted( results, cmp=mycompare )
for r in results:
print r.destination_ip,"AVG",r.avg_rtt,"LOST",r.packet_lost*1.0/totalCount
小工具ping.py是用Python语言开发的,可以运行在Windows, Linux, Mac OS等平台。下载请点击这里。ping.py自动从www.ss-link.com网站获取所有可用的节点,然后对每个节点发送5个ICMP ping,按平均响应时间和丢包率排序,给出结果。ping.py需要管理员权限运行,因为发送ICMP是需要管理员权限的。
在Linux和Mac OS下使用这个工具的方法是运行命令:sudo python ping.py
在Windows下需要先下载安装Python 2.7,下载Python请点击这里,64位的Windows选择Windows x86-64 MSI installer,32位的选择Windows x86 MSI installer。安装Python建议默认安装即可,默认是安装在C:\Python27 目录下。小工具ping.py建议也放到C:\Python27 目录下。按照下面的步骤运行。
用管理员模式运行cmd。在Windows的菜单的搜索框中输入cmd,会搜索出“命令提示符”,旁边是一个黑色小窗口的图标,类似
。在这个小图标上点击鼠标右键,选择“以管理员身份运行”,如图
然后出现cmd黑色窗口,请注意窗口的左上角应该有“管理员”字样,这样表示是用的管理员身份运行的。在这个窗口执行如下两个命令“cd C:\Python27” 和“python ping.py”,注意不要带双引号,如果ping.py保存到了别的地方比如D:\tools 那么需要修改第二个命令为“python D:\tools\ping.py”
这个命令需要几分钟才能运行完成,完成后输出的“The most fast IP:”后面的部分,越靠前的IP速度越快。
005_ss-link.info的ping探测工具的更多相关文章
- 蓝牙设备探测工具blueranger
蓝牙设备探测工具blueranger blueranger是Kali Linux预安装的一款蓝牙探测工具.该工具通过向指定设备发送蓝牙L2CAP协议的ping包,创建连接.由于大部分蓝牙设备对pi ...
- linux 局域网探测工具nmap
NMap,也就是Network Mapper,是Linux下的网络扫描和嗅探工 具包,其基本功能有三个, 一是探测一组主机是否在线: 其次是扫描主机端口,嗅探所提供的网络服务: 还可以推断主机所用的操 ...
- Linux探测工具BCC(网络)
Linux探测工具BCC(网络) 承接上文,本节以ICMP和TCP为例介绍与网络相关的部分内容. 目录 Linux探测工具BCC(网络) Icmp的探测 TCP的探测 Icmp的探测 首先看下促使我学 ...
- 双心ping GUI工具1.0
双心ping GUI工具1.0该软件利用WindowsAPI提供了图形界面的ping程序,同时还可以调用DOS下的ping命令.ping成功后自动加入网址列表框及同目录下的列表文件Pinglist.i ...
- SSH-Auditor:一款SSH弱密码探测工具
SSH-Auditor:一款SSH弱密码探测工具 freebuf 2018-09-16 ssh-auditor是一款可帮助你探测所在网络中ssh弱密码的工具. 特性 以下操作ssh-auditor都 ...
- 网站防火墙探测工具Wafw00f
网站防火墙探测工具Wafw00f 现在网站为了加强自身安全,通常都会安装各类防火墙.这些防火墙往往会拦截各种扫描请求,使得测试人员无法正确判断网站相关信息.Kali Linux提供了一款网站防火墙探 ...
- 网站robots.txt探测工具Parsero
网站robots.txt探测工具Parsero robots.txt文件是网站根目录下的一个文本文件.robots.txt是搜索引擎中访问网站的时候要查看的第一个文件.当搜索引擎访问一个站点时,它 ...
- 几款 ping tcping 工具总结
本文转载至:http://www.cnblogs.com/kerrycode/p/8092942.html ping 命令以前是一个很好用并且常用的网络测试工具,它是基于 ICMP 协议,但是出于网络 ...
- 10.21 nmap:网络探测工具和安全/端口扫描器
nmap命令 是一款开放源代码的网络探测和安全审核工具,是Network Mapper的缩写.其设计目标是快速地扫描大型网络.nmap可以发现网络上有哪些主机,主机提供了什么服务(应用程序名称和版本号 ...
随机推荐
- WPF使用路径(URI)引用资源文件
Uri uri = new Uri("pack://application:,,,/程序集名称;component/Resources/bj.png", UriKind.Absol ...
- Beta阶段 冲刺博客合集
一.Beta阶段敏捷冲刺前准备 二.Beta阶段敏捷冲刺① 三.Beta阶段敏捷冲刺② 四.Beta阶段敏捷冲刺③ 五.Beta阶段敏捷冲刺④ 六.Beta阶段敏捷冲刺⑤ 七.用户使用调查报告 八.码 ...
- Beta 冲刺 四
团队成员 051601135 岳冠宇 031602629 刘意晗 031602248 郑智文 031602330 苏芳锃 031602234 王淇 照片 项目进展 岳冠宇 昨天的困难 数据交换比较复杂 ...
- 二分图最大权匹配模板(pascal)
用uoj80的题面了: 从前一个和谐的班级,有 nlnl 个是男生,有 nrnr 个是女生.编号分别为 1,…,nl1,…,nl 和 1,…,nr1,…,nr. 有若干个这样的条件:第 vv 个男生和 ...
- linux下彻底卸载mysql 图解教程
linux下彻底卸载mysql 图解教程 1.查找以前是否装有mysql 命令:rpm -qa|grep -i mysql可以看到如下图的所示: 说明之前安装了:MySQL-client-5.5.25 ...
- [Swerc2014 C]Golf Bot
题意:给你N个数字,每次利用这N个数字中最多两个数字进行加法运算,来得到目标中的M个数字. Solution: 我们先来看看多项式乘法:\(A(x)=\sum_{i=0}^{n-1}a_ix^i\), ...
- 【刷题】BZOJ 3944 Sum
Description Input 一共T+1行 第1行为数据组数T(T<=10) 第2~T+1行每行一个非负整数N,代表一组询问 Output 一共T行,每行两个用空格分隔的数ans1,ans ...
- 【题解】 bzoj1191: [HNOI2006]超级英雄Hero (二分图)
bzoj1191,懒得复制,戳我戳我 Solution: 二分图最大匹配板子题 Attention: 注意题干中的一句话 只有当选手正确回答一道题后,才能进入下一题,否则就被淘汰. Code: //I ...
- 年度编程语言最佳候选人:Kotlin vs. C
转瞬之间,今年已进入为期不足一个月的倒计时模式.在编程语言界,谁将问鼎 2017 年度编程语言?诸多开发者众说纷纭,有人说是最近风头正盛且被纳入中国高考科目的 Python.有人认为还是老牌常青藤 J ...
- 【BZOJ1413】[ZJOI2009]取石子游戏(博弈论,动态规划)
[BZOJ1413][ZJOI2009]取石子游戏(博弈论,动态规划) 题面 BZOJ 洛谷 题解 神仙题.jpg.\(ZJOI\)是真的神仙. 发现\(SG\)函数等东西完全找不到规律,无奈只能翻题 ...