用小工具ping.py测试距离您最快的节点
#!/usr/bin/env python
# coding: utf-8 """
A pure python ping implementation using raw sockets. Note that ICMP messages can only be send from processes running as root
(in Windows, you must run this script as 'Administrator'). Bugs are naturally mine. I'd be glad to hear about them. There are
certainly word - size dependencies here. :homepage: https://github.com/socketubs/Pyping/
:copyleft: 1989-2011 by the python-ping team, see AUTHORS for more details.
:license: GNU GPL v2, see LICENSE for more details.
""" import os
import select
import signal
import socket
import struct
import sys
import time if sys.platform.startswith("win32"):
# On Windows, the best timer is time.clock()
default_timer = time.clock
else:
# On most other platforms the best timer is time.time()
default_timer = time.time # ICMP parameters
ICMP_ECHOREPLY = 0 # Echo reply (per RFC792)
ICMP_ECHO = 8 # Echo request (per RFC792)
ICMP_MAX_RECV = 2048 # Max size of incoming buffer MAX_SLEEP = 1000 def calculate_checksum(source_string):
"""
A port of the functionality of in_cksum() from ping.c
Ideally this would act on the string as a series of 16-bit ints (host
packed), but this works.
Network data is big-endian, hosts are typically little-endian
"""
countTo = (int(len(source_string) / 2)) * 2
sum = 0
count = 0 # Handle bytes in pairs (decoding as short ints)
loByte = 0
hiByte = 0
while count < countTo:
if (sys.byteorder == "little"):
loByte = source_string[count]
hiByte = source_string[count + 1]
else:
loByte = source_string[count + 1]
hiByte = source_string[count]
sum = sum + (ord(hiByte) * 256 + ord(loByte))
count += 2 # Handle last byte if applicable (odd-number of bytes)
# Endianness should be irrelevant in this case
if countTo < len(source_string): # Check for odd length
loByte = source_string[len(source_string) - 1]
sum += ord(loByte) sum &= 0xffffffff # Truncate sum to 32 bits (a variance from ping.c, which
# uses signed ints, but overflow is unlikely in ping) sum = (sum >> 16) + (sum & 0xffff) # Add high 16 bits to low 16 bits
sum += (sum >> 16) # Add carry from above (if any)
answer = ~sum & 0xffff # Invert and truncate to 16 bits
answer = socket.htons(answer) return answer def is_valid_ip4_address(addr):
parts = addr.split(".")
if not len(parts) == 4:
return False
for part in parts:
try:
number = int(part)
except ValueError:
return False
if number > 255:
return False
return True def to_ip(addr):
if is_valid_ip4_address(addr):
return addr
return socket.gethostbyname(addr) class Response(object):
def __init__(self):
self.max_rtt = None
self.min_rtt = None
self.avg_rtt = None
self.packet_lost = None
self.ret_code = None
self.output = [] self.packet_size = None
self.timeout = None
self.destination = None
self.destination_ip = None class Ping(object):
def __init__(self, destination, timeout=1000, packet_size=55, own_id=None, quiet_output=True, udp=False):
self.quiet_output = quiet_output
if quiet_output:
self.response = Response()
self.response.destination = destination
self.response.timeout = timeout
self.response.packet_size = packet_size self.destination = destination
self.timeout = timeout
self.packet_size = packet_size
self.udp = udp if own_id is None:
self.own_id = os.getpid() & 0xFFFF
else:
self.own_id = own_id try:
# FIXME: Use destination only for display this line here? see: https://github.com/jedie/python-ping/issues/3
self.dest_ip = to_ip(self.destination)
if quiet_output:
self.response.destination_ip = self.dest_ip
except socket.gaierror as e:
self.print_unknown_host(e)
else:
self.print_start() self.seq_number = 0
self.send_count = 0
self.receive_count = 0
self.min_time = 999999999
self.max_time = 0.0
self.total_time = 0.0 #-------------------------------------------------------------------------- def print_start(self):
msg = "\nPYTHON-PING %s (%s): %d data bytes" % (self.destination, self.dest_ip, self.packet_size)
if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) def print_unknown_host(self, e):
msg = "\nPYTHON-PING: Unknown host: %s (%s)\n" % (self.destination, e.args[1])
if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) sys.exit(-1) def print_success(self, delay, ip, packet_size, ip_header, icmp_header):
if ip == self.destination:
from_info = ip
else:
from_info = "%s (%s)" % (self.destination, ip) msg = "%d bytes from %s: icmp_seq=%d ttl=%d time=%.1f ms" % (packet_size, from_info, icmp_header["seq_number"], ip_header["ttl"], delay) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg)
#print("IP header: %r" % ip_header)
#print("ICMP header: %r" % icmp_header) def print_failed(self):
msg = "Request timed out." if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 1
else:
print(msg) def print_exit(self):
msg = "\n----%s PYTHON PING Statistics----" % (self.destination) if self.quiet_output:
self.response.output.append(msg)
else:
print(msg) lost_count = self.send_count - self.receive_count
#print("%i packets lost" % lost_count)
lost_rate = float(lost_count) / self.send_count * 100.0 msg = "%d packets transmitted, %d packets received, %0.1f%% packet loss" % (self.send_count, self.receive_count, lost_rate) if self.quiet_output:
self.response.output.append(msg)
self.response.packet_lost = lost_count
else:
print(msg) if self.receive_count > 0:
msg = "round-trip (ms) min/avg/max = %0.3f/%0.3f/%0.3f" % (self.min_time, self.total_time / self.receive_count, self.max_time)
if self.quiet_output:
self.response.min_rtt = '%.3f' % self.min_time
self.response.avg_rtt = '%.3f' % (self.total_time / self.receive_count)
self.response.max_rtt = '%.3f' % self.max_time
self.response.output.append(msg)
else:
print(msg) if self.quiet_output:
self.response.output.append('\n')
else:
print('') #-------------------------------------------------------------------------- def signal_handler(self, signum, frame):
"""
Handle print_exit via signals
"""
self.print_exit()
msg = "\n(Terminated with signal %d)\n" % (signum) if self.quiet_output:
self.response.output.append(msg)
self.response.ret_code = 0
else:
print(msg) sys.exit(0) def setup_signal_handler(self):
signal.signal(signal.SIGINT, self.signal_handler) # Handle Ctrl-C
if hasattr(signal, "SIGBREAK"):
# Handle Ctrl-Break e.g. under Windows
signal.signal(signal.SIGBREAK, self.signal_handler) #-------------------------------------------------------------------------- def header2dict(self, names, struct_format, data):
""" unpack the raw received IP and ICMP header informations to a dict """
unpacked_data = struct.unpack(struct_format, data)
return dict(zip(names, unpacked_data)) #-------------------------------------------------------------------------- def run(self, count=None, deadline=None):
"""
send and receive pings in a loop. Stop if count or until deadline.
"""
if not self.quiet_output:
self.setup_signal_handler() while True:
delay = self.do() self.seq_number += 1
if count and self.seq_number >= count:
break
if deadline and self.total_time >= deadline:
break if delay == None:
delay = 0 # Pause for the remainder of the MAX_SLEEP period (if applicable)
if (MAX_SLEEP > delay):
time.sleep((MAX_SLEEP - delay) / 1000.0) self.print_exit()
if self.quiet_output:
return self.response def do(self):
"""
Send one ICMP ECHO_REQUEST and receive the response until self.timeout
"""
try: # One could use UDP here, but it's obscure
if self.udp:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.getprotobyname("udp"))
else:
current_socket = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.getprotobyname("icmp"))
except socket.error, (errno, msg):
if errno == 1:
# Operation not permitted - Add more information to traceback
etype, evalue, etb = sys.exc_info()
evalue = etype(
"%s - Note that ICMP messages can only be send from processes running as root." % evalue
)
raise etype, evalue, etb
raise # raise the original error send_time = self.send_one_ping(current_socket)
if send_time == None:
return
self.send_count += 1 receive_time, packet_size, ip, ip_header, icmp_header = self.receive_one_ping(current_socket)
current_socket.close() if receive_time:
self.receive_count += 1
delay = (receive_time - send_time) * 1000.0
self.total_time += delay
if self.min_time > delay:
self.min_time = delay
if self.max_time < delay:
self.max_time = delay self.print_success(delay, ip, packet_size, ip_header, icmp_header)
return delay
else:
self.print_failed() def send_one_ping(self, current_socket):
"""
Send one ICMP ECHO_REQUEST
"""
# Header is type (8), code (8), checksum (16), id (16), sequence (16)
checksum = 0 # Make a dummy header with a 0 checksum.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) padBytes = []
startVal = 0x42
for i in range(startVal, startVal + (self.packet_size)):
padBytes += [(i & 0xff)] # Keep chars in the 0-255 range
data = bytes(padBytes) # Calculate the checksum on the data and the dummy header.
checksum = calculate_checksum(header + data) # Checksum is in network order # Now that we have the right checksum, we put that in. It's just easier
# to make up a new header than to stuff it into the dummy.
header = struct.pack(
"!BBHHH", ICMP_ECHO, 0, checksum, self.own_id, self.seq_number
) packet = header + data send_time = default_timer() try:
current_socket.sendto(packet, (self.destination, 1)) # Port number is irrelevant for ICMP
except socket.error as e:
self.response.output.append("General failure (%s)" % (e.args[1]))
current_socket.close()
return return send_time def receive_one_ping(self, current_socket):
"""
Receive the ping from the socket. timeout = in ms
"""
timeout = self.timeout / 1000.0 while True: # Loop while waiting for packet or timeout
select_start = default_timer()
inputready, outputready, exceptready = select.select([current_socket], [], [], timeout)
select_duration = (default_timer() - select_start)
if inputready == []: # timeout
return None, 0, 0, 0, 0 receive_time = default_timer() packet_data, address = current_socket.recvfrom(ICMP_MAX_RECV) icmp_header = self.header2dict(
names=[
"type", "code", "checksum",
"packet_id", "seq_number"
],
struct_format="!BBHHH",
data=packet_data[20:28]
) if icmp_header["packet_id"] == self.own_id: # Our packet
ip_header = self.header2dict(
names=[
"version", "type", "length",
"id", "flags", "ttl", "protocol",
"checksum", "src_ip", "dest_ip"
],
struct_format="!BBHHHBBHII",
data=packet_data[:20]
)
packet_size = len(packet_data) - 28
ip = socket.inet_ntoa(struct.pack("!I", ip_header["src_ip"]))
# XXX: Why not ip = address[0] ???
return receive_time, packet_size, ip, ip_header, icmp_header timeout = timeout - select_duration
if timeout <= 0:
return None, 0, 0, 0, 0 def ping(hostname, timeout=1000, count=3, packet_size=55, udp=False,*args, **kwargs):
p = Ping(hostname, timeout, packet_size, *args, **kwargs)
return p.run(count) def allIP():
#return ["8.8.8.8","a8.8.4.4"]
r=[]
try:
import urllib2
hdr = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.64 Safari/537.11',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.3',
'Accept-Encoding': 'none',
'Accept-Language': 'en-US,en;q=0.8',
'Connection': 'keep-alive'}
req=urllib2.Request("https://www.ss-link.info/all",headers=hdr) s=urllib2.urlopen(req).read()
r=s.split()
except Exception,e:
print "Network Error",e
return r totalCount=5
def mycompare(x,y):
x1 = float(x.avg_rtt)+x.packet_lost*1000.0/totalCount
y1 = float(y.avg_rtt)+y.packet_lost*1000.0/totalCount
return int( 1000*(x1-y1) )
if __name__ == "__main__":
ips=allIP()
print "Start ..."
results=[]
for ip in ips:
r=None
try:
r=ping(ip,count=totalCount)
except Exception,e:
print e
if r:
print r.destination_ip,"..."
if r.avg_rtt == None: r.avg_rtt = 2000
results.append(r)
print ""
print "The most fast IP:"
results = sorted( results, cmp=mycompare )
for r in results:
print r.destination_ip,"AVG",r.avg_rtt,"LOST",r.packet_lost*1.0/totalCount

  

小工具ping.py是用Python语言开发的,可以运行在Windows, Linux, Mac OS等平台。下载请点击这里。ping.py自动从www.ss-link.com网站获取所有可用的节点,然后对每个节点发送5个ICMP ping,按平均响应时间和丢包率排序,给出结果。ping.py需要管理员权限运行,因为发送ICMP是需要管理员权限的。

在Linux和Mac OS下使用这个工具的方法是运行命令:sudo python ping.py

在Windows下需要先下载安装Python 2.7,下载Python请点击这里,64位的Windows选择Windows x86-64 MSI installer,32位的选择Windows x86 MSI installer。安装Python建议默认安装即可,默认是安装在C:\Python27 目录下。小工具ping.py建议也放到C:\Python27 目录下。按照下面的步骤运行。

用管理员模式运行cmd。在Windows的菜单的搜索框中输入cmd,会搜索出“命令提示符”,旁边是一个黑色小窗口的图标,类似。在这个小图标上点击鼠标右键,选择“以管理员身份运行”,如图

然后出现cmd黑色窗口,请注意窗口的左上角应该有“管理员”字样,这样表示是用的管理员身份运行的。在这个窗口执行如下两个命令“cd C:\Python27” 和“python ping.py”,注意不要带双引号,如果ping.py保存到了别的地方比如D:\tools 那么需要修改第二个命令为“python D:\tools\ping.py”

这个命令需要几分钟才能运行完成,完成后输出的“The most fast IP:”后面的部分,越靠前的IP速度越快。

005_ss-link.info的ping探测工具的更多相关文章

  1. 蓝牙设备探测工具blueranger

    蓝牙设备探测工具blueranger   blueranger是Kali Linux预安装的一款蓝牙探测工具.该工具通过向指定设备发送蓝牙L2CAP协议的ping包,创建连接.由于大部分蓝牙设备对pi ...

  2. linux 局域网探测工具nmap

    NMap,也就是Network Mapper,是Linux下的网络扫描和嗅探工 具包,其基本功能有三个, 一是探测一组主机是否在线: 其次是扫描主机端口,嗅探所提供的网络服务: 还可以推断主机所用的操 ...

  3. Linux探测工具BCC(网络)

    Linux探测工具BCC(网络) 承接上文,本节以ICMP和TCP为例介绍与网络相关的部分内容. 目录 Linux探测工具BCC(网络) Icmp的探测 TCP的探测 Icmp的探测 首先看下促使我学 ...

  4. 双心ping GUI工具1.0

    双心ping GUI工具1.0该软件利用WindowsAPI提供了图形界面的ping程序,同时还可以调用DOS下的ping命令.ping成功后自动加入网址列表框及同目录下的列表文件Pinglist.i ...

  5. SSH-Auditor:一款SSH弱密码探测工具

    SSH-Auditor:一款SSH弱密码探测工具 freebuf 2018-09-16  ssh-auditor是一款可帮助你探测所在网络中ssh弱密码的工具. 特性 以下操作ssh-auditor都 ...

  6. 网站防火墙探测工具Wafw00f

     网站防火墙探测工具Wafw00f 现在网站为了加强自身安全,通常都会安装各类防火墙.这些防火墙往往会拦截各种扫描请求,使得测试人员无法正确判断网站相关信息.Kali Linux提供了一款网站防火墙探 ...

  7. 网站robots.txt探测工具Parsero

    网站robots.txt探测工具Parsero   robots.txt文件是网站根目录下的一个文本文件.robots.txt是搜索引擎中访问网站的时候要查看的第一个文件.当搜索引擎访问一个站点时,它 ...

  8. 几款 ping tcping 工具总结

    本文转载至:http://www.cnblogs.com/kerrycode/p/8092942.html ping 命令以前是一个很好用并且常用的网络测试工具,它是基于 ICMP 协议,但是出于网络 ...

  9. 10.21 nmap:网络探测工具和安全/端口扫描器

    nmap命令 是一款开放源代码的网络探测和安全审核工具,是Network Mapper的缩写.其设计目标是快速地扫描大型网络.nmap可以发现网络上有哪些主机,主机提供了什么服务(应用程序名称和版本号 ...

随机推荐

  1. 在 IntelliJ IDEA 中配置 Spark(Java API) 运行环境

    1. 新建Maven项目 初始Maven项目完成后,初始的配置(pom.xml)如下: 2. 配置Maven 向项目里新建Spark Core库 <?xml version="1.0& ...

  2. vs2013安装过程及使用心得

    进入http://www.itellyou.cn/ 方法/步骤 1 1:点击中文简体 2:钩出前面的空格 3:点击详细信息 4:复制到网页进行搜索迅雷下载   等待下载完成之后,双击文件 我们双击文件 ...

  3. 团队项目作业五 - 旅游行业App分析

    随着经济的发展,不论是在工作中的男女老少,还是在校园中的童鞋,都喜欢在假期来一场说走就走的旅行,来缓解生活中的各种压力.当然,在国家面临经济转型的情况下,更多的将工业,农业转向服务型的旅游业,各个省市 ...

  4. SSH-keygen用法

    很多朋友在用github管理项目的时候,都是直接使用https url克隆到本地,当然也有有些人使用 SSH url 克隆到本地.然而,为什么绝大多数人会使用https url克隆呢? 这是因为,使用 ...

  5. Cuba项目从远程Git仓库下载步骤

    Cuba Studio 从Git远程仓库里下载代码,并且可以使用IDEA打开,需要注意的地方: 1.使用Git Gui克隆代码 也可以使用IDEA本身集成的Git下载,但是要保证:下载了项目以后,不能 ...

  6. set, unordered_set模板类

    template< class Key, class Hash = std::hash<Key>, class KeyEqual = std::equal_to<Key> ...

  7. 洛谷P4180 [BJWC2010]次小生成树(最小生成树,LCT,主席树,倍增LCA,倍增,树链剖分)

    洛谷题目传送门 %%%TPLY巨佬和ysner巨佬%%% 他们的题解 思路分析 具体思路都在各位巨佬的题解中.这题做法挺多的,我就不对每个都详细讲了,泛泛而谈吧. 大多数算法都要用kruskal把最小 ...

  8. BZOJ刷题指南(转)

    基础(65) 巨水无比(4):1214.3816:2B题:1000A+B:2462:输出10个1 模拟/枚举/暴力(15):4063傻子模拟:1968小学生暴力:1218前缀和暴力:3856读英文:4 ...

  9. 【bzoj2875】 Noi2012—随机数生成器

    http://www.lydsy.com/JudgeOnline/problem.php?id=2875 (题目链接) 题意 求${X_{n}}$. Solution 矩乘板子,这里主要讲下会爆lon ...

  10. C#代码连接Oracle数据库一段时间以后[connection lost contact]的问题

    最近在使用C#代码连接Oracle数据库,分为两部分,WCF的客户端与服务端.程序启动与运行都没有问题,部署到服务器上后,运行也没有问题.但是第二天再访问的时候,就会抛出下边所示的异常.这是怎么回事? ...