mirror of
https://github.com/Rucknium/xmrpeers.git
synced 2024-12-22 11:39:23 +00:00
840e915e8f
Useful for retrospectively analyzing intentional or unintentional double-spend attempts
54 lines
1.8 KiB
R
54 lines
1.8 KiB
R
% Generated by roxygen2: do not edit by hand
|
|
% Please edit documentation in R/ip.R
|
|
\name{peers.ip.collect}
|
|
\alias{peers.ip.collect}
|
|
\title{Collect connected peers' IP addresses}
|
|
\usage{
|
|
peers.ip.collect(
|
|
csv.file = "xmr-peers-ip.csv",
|
|
unrestricted.rpc.url = "http://127.0.0.1:18081",
|
|
malicious.ips = NULL,
|
|
top.subnet.mask = 24,
|
|
n.top.subnets = 10,
|
|
poll.time = 30
|
|
)
|
|
}
|
|
\arguments{
|
|
\item{csv.file}{The name of the CSV file to write to and read from. If it
|
|
already exists, data will be appended to it and the whole file will be
|
|
used to compute top subnet information.}
|
|
|
|
\item{unrestricted.rpc.url}{URL and port of the \code{monerod} unrestricted RPC.
|
|
Default is \verb{http://127.0.0.1:18081}}
|
|
|
|
\item{malicious.ips}{A character vector of IP addreses that are suspected
|
|
to be malicious.}
|
|
|
|
\item{top.subnet.mask}{Numeric value. The IP address subnet mask to print
|
|
summary information about.}
|
|
|
|
\item{n.top.subnets}{Number of subnets to print summary information about.}
|
|
|
|
\item{poll.time}{How often, in seconds, to collect data from the local
|
|
monero node. Default is 30 seconds.}
|
|
}
|
|
\value{
|
|
NULL (invisible)
|
|
}
|
|
\description{
|
|
Collects IP addreses of peers that the local node has
|
|
established outbound connections to. The time and set of IP addreses are
|
|
saved to a CSV file. These IP addreses are checked against an optional
|
|
set of suspected malicious IP addresses. Information about the share of
|
|
outbound connections to suspected maclicious IP addreses is printed.
|
|
IP addresses are grouped by subnet and information is printed to check for
|
|
possible "subnet saturation" by malicious entities. This function is an
|
|
infinite loop. \code{ctrl + c} to interrupt the function.
|
|
}
|
|
\examples{
|
|
\dontrun{
|
|
suspected.malicious.ips <- readLines(
|
|
"https://raw.githubusercontent.com/Boog900/monero-ban-list/refs/heads/main/ban_list.txt")
|
|
peers.ip.collect(malicious.ips = suspected.malicious.ips)
|
|
}
|
|
}
|