用小工具ping.py测试距离您最快的节点
#!/usr/bin/env python
# coding: utf-8 """
A pure python ping implementation using raw sockets. Note that ICMP messages can only be send from processes running as root
(in Windows, you must run this script as 'Administrator'). Bugs are naturally mine. I'd be glad to hear about them. There are
certainly word - size dependencies here. :homepage: https://github.com/socketubs/Pyping/
:copyleft: 1989-2011 by the python-ping team, see AUTHORS for more details.
:license: GNU GPL v2, see LICENSE for more details.
""" import os
import select
import signal
import socket
import struct
import sys
import time if sys.platform.startswith("win32"):
# On Windows, the best timer is time.clock()
default_timer = time.clock
else:
# On most other platforms the best timer is time.time()
default_timer = time.time # ICMP parameters
ICMP_ECHOREPLY = 0 # Echo reply (per RFC792)
ICMP_ECHO = 8 # Echo request (per RFC792)
ICMP_MAX_RECV = 2048 # Max size of incoming buffer MAX_SLEEP = 1000 def calculate_checksum(source_string):
"""
A port of the functionality of in_cksum() from ping.c
Ideally this would act on the string as a series of 16-bit ints (host
packed), but this works.
Network data is big-endian, hosts are typically little-endian
"""
countTo = (int(len(source_string) / 2)) * 2
sum = 0
count = 0 # Handle bytes in pairs (decoding as short ints)
loByte = 0
hiByte = 0
while count < countTo:
if (sys.byteorder == "little"):
loByte = source_string[count]
hiByte = source_string[count + 1]
else:
loByte = source_string[count + 1]
hiByte = source_string[count]
sum = sum + (ord(hiByte) * 256 + ord(loByte))
count += 2 # Handle last byte if applicable (odd-number of bytes)
# Endianness should be irrelevant in this case
if countTo < len(source_string): # Check for odd length
loByte = source_string[len(source_string) - 1]
sum += ord(loByte) sum &= 0xffffffff # Truncate sum to 32 bits (a variance from ping.c, which
# uses signed ints, but overflow is unlikely in ping) sum = (sum >> 16) + (sum & 0xffff) # Add high 16 bits to low 16 bits
sum += (sum >> 16) # Add carry from above (if any)
answer = ~sum & 0xffff # Invert and truncate to 16 bits
answer = socket.htons(answer) return answer def is_valid_ip4_address(addr):
parts = addr.split(".")
if not len(parts) == 4:
return False
for part in parts:
try:
number = int(part)
except ValueError:
return False
if number > 255:
return False
return True def to_ip(addr):
if is_valid_ip4_address(addr):
return addr
return socket.gethostbyname(addr) class Response(object):
def __init__(self):
self.max_rtt = None
self.min_rtt = None
self.avg_rtt = None
self.packet_lost = None
self.ret_code = None
self.output = [] self.packet_size = None
self.timeout = None
self.destination = None
self.destination_ip = None class Ping(object):
def __init__(self, destination, timeout=1000, packet_size=55, own_id=None, quiet_output=True, udp=False):
self.quiet_output = quiet_output
if quiet_output:
self.response = Response()
self.response.destination = destination
self.response.timeout = timeout
self.response.packet_size = packet_size self.destination = destination
self.timeout = timeout
self.packet_size = packet_size
self.udp = udp if own_id is None:
self.own_id = os.getpid() & 0xFFFF
else:
self.own_id = own_id try:
# FIXME: Use destination only for display this line here? see: https://github.com/jedie/python-ping/issues/3
self.dest_ip = to_ip(self.destination)
if quiet_output:
self.response.destination_ip = self.dest_ip
except socket.gaierror as e:
self.print_unknown_host(e)
else:
self.print_start() self.seq_number = 0
self.send_count = 0
self.receive_count = 0
self.min_time = 999999999
self.max_time = 0.0
self.total_time = 0.0 #-------------------------------------------------------------------------- def print_start(self):
msg = "\nPYTHON-PING %s (%s): %d data bytes" % (self.destination, self.dest_ip, self.packet_size)
if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) def print_unknown_host(self, e):
msg = "\nPYTHON-PING: Unknown host: %s (%s)\n" % (self.destination, e.args[1])
if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) sys.exit(-1) def print_success(self, delay, ip, packet_size, ip_header, icmp_header):
if ip == self.destination:
from_info = ip
else:
from_info = "%s (%s)" % (self.destination, ip) msg = "%d bytes from %s: icmp_seq=%d ttl=%d time=%.1f ms" % (packet_size, from_info, icmp_header["seq_number"], ip_header["ttl"], delay) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg)
#print("IP header: %r" % ip_header)
#print("ICMP header: %r" % icmp_header) def print_failed(self):
msg = "Request timed out." if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) def print_exit(self):
msg = "\n----%s PYTHON PING Statistics----" % (self.destination) if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) lost_count = self.send_count - self.receive_count
#print("%i packets lost" % lost_count)
lost_rate = float(lost_count) / self.send_count * 100.0 msg = "%d packets transmitted, %d packets received, %0.1f%% packet loss" % (self.send_count, self.receive_count, lost_rate) if self.quiet_output:
self.response.output.append(msg)
self.response.packet_lost = lost_count
else:
print(msg) if self.receive_count > 0:
msg = "round-trip (ms) min/avg/max = %0.3f/%0.3f/%0.3f" % (self.min_time, self.total_time / self.receive_count, self.max_time)
if self.quiet_output:
self.response.min_rtt = '%.3f' % self.min_time
self.response.avg_rtt = '%.3f' % (self.total_time / self.receive_count)
self.response.max_rtt = '%.3f' % self.max_time
self.response.output.append(msg)
else:
print(msg) if self.quiet_output:
self.response.output.append('\n')
else:
print('') #-------------------------------------------------------------------------- def signal_handler(self, signum, frame):
"""
Handle print_exit via signals
"""
self.print_exit()
msg = "\n(Terminated with signal %d)\n" % (signum) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg) sys.exit(0) def setup_signal_handler(self):
signal.signal(signal.SIGINT, self.signal_handler) # Handle Ctrl-C
if hasattr(signal, "SIGBREAK"):
# Handle Ctrl-Break e.g. under Windows
signal.signal(signal.SIGBREAK, self.signal_handler) #-------------------------------------------------------------------------- def header2dict(self, names, struct_format, data):
""" unpack the raw received IP and ICMP header informations to a dict """
unpacked_data = struct.unpack(struct_format, data)
return dict(zip(names, unpacked_data)) #-------------------------------------------------------------------------- def run(self, count=None, deadline=None):
"""
send and receive pings in a loop. Stop if count or until deadline.
"""
if not self.quiet_output:
self.setup_signal_handler() while True:
delay = self.do() self.seq_number += 1
if count and self.seq_number >= count:
break
if deadline and self.total_time >= deadline:
break if delay == None:
delay = 0 # Pause for the remainder of the MAX_SLEEP period (if applicable)
if (MAX_SLEEP > delay):
time.sleep((MAX_SLEEP - delay) / 1000.0) self.print_exit()
if self.quiet_output:
return self.response def do(self):
"""
Send one ICMP ECHO_REQUEST and receive the response until self.timeout
"""
try: # One could use UDP here, but it's obscure
if self.udp:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.getprotobyname("udp"))
else:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.getprotobyname("icmp"))
except socket.error, (errno, msg):
if errno == 1:
# Operation not permitted - Add more information to traceback
etype, evalue, etb = sys.exc_info()
evalue = etype(
"%s - Note that ICMP messages can only be send from processes running as root." % evalue
)
raise etype, evalue, etb
raise # raise the original error send_time = self.send_one_ping(current_socket)
if send_time == None:
return
self.send_count += 1 receive_time, packet_size, ip, ip_header, icmp_header = self.receive_one_ping(current_socket)
current_socket.close() if receive_time:
self.receive_count += 1
delay = (receive_time - send_time) * 1000.0
self.total_time += delay
if self.min_time > delay:
self.min_time = delay
if self.max_time < delay:
self.max_time = delay self.print_success(delay, ip, packet_size, ip_header, icmp_header)
return delay
else:
self.print_failed() def send_one_ping(self, current_socket):
"""
Send one ICMP ECHO_REQUEST
"""
# Header is type (8), code (8), checksum (16), id (16), sequence (16)
checksum = 0 # Make a dummy header with a 0 checksum.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) padBytes = []
startVal = 0x42
for i in range(startVal, startVal + (self.packet_size)):
padBytes += [(i & 0xff)] # Keep chars in the 0-255 range
data = bytes(padBytes) # Calculate the checksum on the data and the dummy header.
checksum = calculate_checksum(header + data) # Checksum is in network order # Now that we have the right checksum, we put that in. It's just easier
# to make up a new header than to stuff it into the dummy.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) packet = header + data send_time = default_timer() try:
current_socket.sendto(packet, (self.destination, 1)) # Port number is irrelevant for ICMP
except socket.error as e:
self.response.output.append("General failure (%s)" % (e.args[1]))
current_socket.close()
return return send_time def receive_one_ping(self, current_socket):
"""
Receive the ping from the socket. timeout = in ms
"""
timeout = self.timeout / 1000.0 while True: # Loop while waiting for packet or timeout
select_start = default_timer()
inputready, outputready, exceptready = select.select([current_socket], [], [], timeout)
select_duration = (default_timer() - select_start)
if inputready == []: # timeout
return None, 0, 0, 0, 0 receive_time = default_timer() packet_data, address = current_socket.recvfrom(ICMP_MAX_RECV) icmp_header = self.header2dict(
names=[
"type", "code", "checksum",
"packet_id", "seq_number"
],
struct_format="!BBHHH",
data=packet_data[20:28]
) if icmp_header["packet_id"] == self.own_id: # Our packet
ip_header = self.header2dict(
names=[
"version", "type", "length",
"id", "flags", "ttl", "protocol",
"checksum", "src_ip", "dest_ip"
],
struct_format="!BBHHHBBHII",
data=packet_data[:20]
)
packet_size = len(packet_data) - 28
ip = socket.inet_ntoa(struct.pack("!I", ip_header["src_ip"]))
# XXX: Why not ip = address[0] ???
return receive_time, packet_size, ip, ip_header, icmp_header timeout = timeout - select_duration
if timeout <= 0:
return None, 0, 0, 0, 0 def ping(hostname, timeout=1000, count=3, packet_size=55, udp=False,*args, **kwargs):
p = Ping(hostname, timeout, packet_size, *args, **kwargs)
return p.run(count) def allIP():
#return ["8.8.8.8","a8.8.4.4"]
r=[]
try:
import urllib2
hdr = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.64 Safari/537.11',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.3',
'Accept-Encoding': 'none',
'Accept-Language': 'en-US,en;q=0.8',
'Connection': 'keep-alive'}
req=urllib2.Request("https://www.ss-link.info/all",headers=hdr) s=urllib2.urlopen(req).read()
r=s.split()
except Exception,e:
print "Network Error",e
return r totalCount=5
def mycompare(x,y):
x1 = float(x.avg_rtt)+x.packet_lost*1000.0/totalCount
y1 = float(y.avg_rtt)+y.packet_lost*1000.0/totalCount
return int( 1000*(x1-y1) )
if __name__ == "__main__":
ips=allIP()
print "Start ..."
results=[]
for ip in ips:
r=None
try:
r=ping(ip,count=totalCount)
except Exception,e:
print e
if r:
print r.destination_ip,"..."
if r.avg_rtt == None: r.avg_rtt = 2000
results.append(r)
print ""
print "The most fast IP:"
results = sorted( results, cmp=mycompare )
for r in results:
print r.destination_ip,"AVG",r.avg_rtt,"LOST",r.packet_lost*1.0/totalCount

  

小工具ping.py是用Python语言开发的,可以运行在Windows, Linux, Mac OS等平台。下载请点击这里。ping.py自动从www.ss-link.com网站获取所有可用的节点,然后对每个节点发送5个ICMP ping,按平均响应时间和丢包率排序,给出结果。ping.py需要管理员权限运行,因为发送ICMP是需要管理员权限的。

在Linux和Mac OS下使用这个工具的方法是运行命令:sudo python ping.py

在Windows下需要先下载安装Python 2.7,下载Python请点击这里,64位的Windows选择Windows x86-64 MSI installer,32位的选择Windows x86 MSI installer。安装Python建议默认安装即可,默认是安装在C:\Python27 目录下。小工具ping.py建议也放到C:\Python27 目录下。按照下面的步骤运行。

用管理员模式运行cmd。在Windows的菜单的搜索框中输入cmd,会搜索出“命令提示符”,旁边是一个黑色小窗口的图标,类似。在这个小图标上点击鼠标右键,选择“以管理员身份运行”,如图

然后出现cmd黑色窗口,请注意窗口的左上角应该有“管理员”字样,这样表示是用的管理员身份运行的。在这个窗口执行如下两个命令“cd C:\Python27” 和“python ping.py”,注意不要带双引号,如果ping.py保存到了别的地方比如D:\tools 那么需要修改第二个命令为“python D:\tools\ping.py”

这个命令需要几分钟才能运行完成,完成后输出的“The most fast IP:”后面的部分,越靠前的IP速度越快。

005_ss-link.info的ping探测工具的更多相关文章

  1. 蓝牙设备探测工具blueranger

    蓝牙设备探测工具blueranger   blueranger是Kali Linux预安装的一款蓝牙探测工具.该工具通过向指定设备发送蓝牙L2CAP协议的ping包,创建连接.由于大部分蓝牙设备对pi ...

  2. linux 局域网探测工具nmap

    NMap,也就是Network Mapper,是Linux下的网络扫描和嗅探工 具包,其基本功能有三个, 一是探测一组主机是否在线: 其次是扫描主机端口,嗅探所提供的网络服务: 还可以推断主机所用的操 ...

  3. Linux探测工具BCC(网络)

    Linux探测工具BCC(网络) 承接上文,本节以ICMP和TCP为例介绍与网络相关的部分内容. 目录 Linux探测工具BCC(网络) Icmp的探测 TCP的探测 Icmp的探测 首先看下促使我学 ...

  4. 双心ping GUI工具1.0

    双心ping GUI工具1.0该软件利用WindowsAPI提供了图形界面的ping程序,同时还可以调用DOS下的ping命令.ping成功后自动加入网址列表框及同目录下的列表文件Pinglist.i ...

  5. SSH-Auditor:一款SSH弱密码探测工具

    SSH-Auditor:一款SSH弱密码探测工具 freebuf 2018-09-16  ssh-auditor是一款可帮助你探测所在网络中ssh弱密码的工具. 特性 以下操作ssh-auditor都 ...

  6. 网站防火墙探测工具Wafw00f

     网站防火墙探测工具Wafw00f 现在网站为了加强自身安全,通常都会安装各类防火墙.这些防火墙往往会拦截各种扫描请求,使得测试人员无法正确判断网站相关信息.Kali Linux提供了一款网站防火墙探 ...

  7. 网站robots.txt探测工具Parsero

    网站robots.txt探测工具Parsero   robots.txt文件是网站根目录下的一个文本文件.robots.txt是搜索引擎中访问网站的时候要查看的第一个文件.当搜索引擎访问一个站点时,它 ...

  8. 几款 ping tcping 工具总结

    本文转载至:http://www.cnblogs.com/kerrycode/p/8092942.html ping 命令以前是一个很好用并且常用的网络测试工具,它是基于 ICMP 协议,但是出于网络 ...

  9. 10.21 nmap:网络探测工具和安全/端口扫描器

    nmap命令 是一款开放源代码的网络探测和安全审核工具,是Network Mapper的缩写.其设计目标是快速地扫描大型网络.nmap可以发现网络上有哪些主机,主机提供了什么服务(应用程序名称和版本号 ...

随机推荐

  1. 读C#程序(第三周)

    阅读下面程序,请回答如下问题: 问题1:这个程序要找的是符合什么条件的数? 问题2:这样的数存在么?符合这一条件的最小的数是什么? 问题3:在电脑上运行这一程序,你估计多长时间才能输出第一个结果?时间 ...

  2. JavaBeans与内省(Introspector)

    JavaBean与Introspector 反射和内省操作很多时候都是在以后要做框架的时候作用非常大.    现在你学的是面向对象编程,即:你所写代码都能够找到对应的类或接口,找到具体的方法写出对应的 ...

  3. 查看django版本的方法

    在cmd输入: python -m django --version django-admin --version

  4. Java设计模式之代理模式(静态代理和JDK、CGLib动态代理)以及应用场景

    我做了个例子 ,需要可以下载源码:代理模式 1.前言: Spring 的AOP 面向切面编程,是通过动态代理实现的, 由两部分组成:(a) 如果有接口的话 通过 JDK 接口级别的代理 (b) 如果没 ...

  5. oralce下载

    oracle的官网网址:oracle.com 打开之后选择中文 然后在页面的下方找到下载和试用链接 点击进入,选择数据库下载,在页面中找到如下部分点击进入即可下载对应版本的oracle

  6. BZOJ2460 Beijing2011元素(线性基+贪心)

    按价值从大到小考虑每个元素,维护一个线性基,如果向其中加入该元素的编号仍然构成线性基,则将其加入. 不会证明.当做线性基的一个性质吧. #include<iostream> #includ ...

  7. APIO模拟赛(HGOI20180909)

    想法:贪心. A.最大高度大的先剪 首先需要知道: 1.每个草最多剪1次 假设有个草剪了2次,显然可以放到最后一次剪得效果和剪2次的效果一样的, 为了少剪那么草最多剪去一次,从而,步数step> ...

  8. 【AGC006E】 Rotate 3x3

    Description ​ 题目链接 Solution ​ 显然每一列只能一起动,乱动则无解. ​ 对原网格按列黑白染色,显然每一列数只能在相同颜色之间交换,乱动则无解. ​ 之后考虑构造方案. ​ ...

  9. div 内table 居中实现代码

    有时候在一个div里面添加一个表格,如想让它居住排列,需要做如下的操作. css代码:   代码如下: #dlgReply { /*display: table-cell; text-align: c ...

  10. 78. Subsets(M) & 90. Subsets II(M) & 131. Palindrome Partitioning

    78. Subsets Given a set of distinct integers, nums, return all possible subsets. Note: The solution ...