xmrpeers/man/peers.ip.collect.Rd

55 lines
1.8 KiB
Text
Raw Permalink Normal View History

2024-11-08 19:29:39 +00:00
% Generated by roxygen2: do not edit by hand
% Please edit documentation in R/ip.R
\name{peers.ip.collect}
\alias{peers.ip.collect}
\title{Collect connected peers' IP addresses}
\usage{
peers.ip.collect(
csv.file = "xmr-peers-ip.csv",
unrestricted.rpc.url = "http://127.0.0.1:18081",
malicious.ips = NULL,
top.subnet.mask = 24,
n.top.subnets = 10,
poll.time = 30
)
}
\arguments{
\item{csv.file}{The name of the CSV file to write to and read from. If it
already exists, data will be appended to it and the whole file will be
used to compute top subnet information.}
\item{unrestricted.rpc.url}{URL and port of the \code{monerod} unrestricted RPC.
Default is \verb{http://127.0.0.1:18081}}
\item{malicious.ips}{A character vector of IP addreses that are suspected
to be malicious.}
\item{top.subnet.mask}{Numeric value. The IP address subnet mask to print
summary information about.}
\item{n.top.subnets}{Number of subnets to print summary information about.}
\item{poll.time}{How often, in seconds, to collect data from the local
monero node. Default is 30 seconds.}
}
\value{
NULL (invisible)
}
\description{
Collects IP addreses of peers that the local node has
established outbound connections to. The time and set of IP addreses are
saved to a CSV file. These IP addreses are checked against an optional
set of suspected malicious IP addresses. Information about the share of
outbound connections to suspected maclicious IP addreses is printed.
IP addresses are grouped by subnet and information is printed to check for
possible "subnet saturation" by malicious entities. This function is an
infinite loop. \code{ctrl + c} to interrupt the function.
}
\examples{
\dontrun{
suspected.malicious.ips <- readLines(
2024-11-08 19:29:39 +00:00
"https://raw.githubusercontent.com/Boog900/monero-ban-list/refs/heads/main/ban_list.txt")
peers.ip.collect(malicious.ips = suspected.malicious.ips)
}
}