设为首页收藏本站

ZMX - IT技术交流论坛 - 无限Perfect,追求梦想 - itzmx.com

 找回密码
 注册论坛

QQ登录

只需一步,快速开始

新浪微博账号登陆

只需一步,快速开始

用百度帐号登录

只需两步,快速登录

搜索
查看: 2301|回复: 2

tracker服务器udp监控存活方案 监控宝Binary(C Arrays)格式,阿里云监控16进制格式数据包

[复制链接]
 成长值: 48

签到天数: 4510 天

[LV.Master]伴坛终老

发表于 2018/4/14 17:08 | 显示全部楼层 |阅读模式 |Google Chrome 65.0.3325.181|Windows 10
天涯海角搜一下: 百度 谷歌 360 搜狗 有道 雅虎 必应 即刻
tracker服务器udp监控存活方案 监控宝Binary(C Arrays)格式,阿里云监控16进制格式数据包
1.png
UDP请求内容写,选Binary格式,阿里云监控选文本格式
  1. 0x00, 0x00, 0x04, 0x17, 0x27, 0x10, 0x19, 0x80,
  2. 0x00, 0x00, 0x00, 0x00, 0x32, 0xb3, 0x1f, 0xaf };
复制代码

回应为
  1. 0x00, 0x00, 0x00, 0x00, 0x32, 0xb3, 0x1f, 0xaf };
复制代码



2018年12月10日20:08:57
补充,阿里云监控现在改版了,监控选16进制格式,响应必须填写
  1. 请求
  2. 00000417271019800000000032b31faf
  3. 响应
  4. 0000000032b31faf
复制代码


http监控推荐
  1. http://tracker1.itzmx.com:8080/announce?info_hash=%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11%11
复制代码


欢迎光临IT技术交流论坛:http://bbs.itzmx.com/
回复

使用道具 举报

 成长值: 48

签到天数: 4510 天

[LV.Master]伴坛终老

发表于 2018/11/15 06:38 | 显示全部楼层 |Google Chrome 70.0.3538.102|Windows 10
封包对比,两次采用相同的tracker服务器,相同种子,hash值:c989dba95de52ce5babd684b36a7f8141cc0f0fc
测试1
  1. char peer0_0[] = { /* Packet 75 */
  2. 0x00, 0x00, 0x04, 0x17, 0x27, 0x10, 0x19, 0x80,
  3. 0x00, 0x00, 0x00, 0x00, 0x32, 0xb3, 0x1f, 0xaf };
  4. char peer1_0[] = { /* Packet 82 */
  5. 0x00, 0x00, 0x00, 0x00, 0x32, 0xb3, 0x1f, 0xaf,
  6. 0x42, 0xdb, 0x35, 0xd2, 0xac, 0x58, 0x43, 0xc7 };
  7. char peer0_1[] = { /* Packet 83 */
  8. 0x42, 0xdb, 0x35, 0xd2, 0xac, 0x58, 0x43, 0xc7,
  9. 0x00, 0x00, 0x00, 0x01, 0x0c, 0x52, 0xe0, 0x85,
  10. 0xc9, 0x89, 0xdb, 0xa9, 0x5d, 0xe5, 0x2c, 0xe5,
  11. 0xba, 0xbd, 0x68, 0x4b, 0x36, 0xa7, 0xf8, 0x14,
  12. 0x1c, 0xc0, 0xf0, 0xfc, 0x2d, 0x71, 0x42, 0x34,
  13. 0x31, 0x33, 0x30, 0x2d, 0x73, 0x5f, 0x34, 0x4d,
  14. 0x38, 0x61, 0x48, 0x7a, 0x4c, 0x21, 0x44, 0x28,
  15. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  16. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  17. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  18. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  19. 0xb7, 0xb4, 0xb5, 0xdf, 0x00, 0x00, 0x00, 0xc8,
  20. 0x56, 0xce, 0x02, 0x09, 0x2f, 0x61, 0x6e, 0x6e,
  21. 0x6f, 0x75, 0x6e, 0x63, 0x65 };
  22. char peer1_1[] = { /* Packet 86 */
  23. 0x00, 0x00, 0x00, 0x01, 0x0c, 0x52, 0xe0, 0x85,
  24. 0x00, 0x00, 0x1c, 0x3d, 0x00, 0x00, 0x00, 0x01,
  25. 0x00, 0x00, 0x00, 0x11, 0x6f, 0x1b, 0x8f, 0xd8,
  26. 0x3a, 0x98, 0xdd, 0xe3, 0x26, 0x5a, 0x47, 0x42,
  27. 0xda, 0xa1, 0x71, 0xf3, 0x56, 0xcf, 0xc0, 0x9d,
  28. 0xd0, 0x26, 0x56, 0xce, 0xaf, 0x9b, 0x3b, 0xbc,
  29. 0x56, 0xcf, 0xaf, 0x98, 0x3d, 0x50, 0x2b, 0xc7,
  30. 0x80, 0x01, 0xcb, 0x17, 0x56, 0xce, 0x79, 0x0b,
  31. 0xbd, 0x99, 0x00, 0x00, 0x77, 0x7b, 0xc5, 0x0a,
  32. 0x68, 0x8a, 0x74, 0x19, 0x60, 0x57, 0x1a, 0xe1,
  33. 0x72, 0x1a, 0x77, 0x5a, 0x52, 0x10, 0x6f, 0x3a,
  34. 0xa8, 0xea, 0x56, 0xcf, 0x6f, 0x3a, 0xa8, 0xea,
  35. 0x56, 0xce, 0x6f, 0x3a, 0xa8, 0xea, 0x00, 0x00,
  36. 0x5b, 0x79, 0xff, 0xd6, 0x56, 0xce, 0x56, 0x6b,
  37. 0x6e, 0xd3, 0x56, 0xce, 0x2b, 0xf1, 0x30, 0xd6,
  38. 0x56, 0xce, 0x24, 0x65, 0xc7, 0xdb, 0x83, 0x53 };
复制代码


原始值
  1. 00000417271019800000000032b31faf
  2. 0000000032b31faf42db35d2ac5843c7
  3. 42db35d2ac5843c7000000010c52e085c989dba95de52ce5babd684b36a7f8141cc0f0fc2d7142343133302d735f344d3861487a4c2144280000000000000000000000000000000000000000000000000000000000000000b7b4b5df000000c856ce02092f616e6e6f756e6365
  4. 000000010c52e08500001c3d00000001000000116f1b8fd83a98dde3265a4742daa171f356cfc09dd02656ceaf9b3bbc56cfaf983d502bc78001cb1756ce790bbd990000777bc50a688a741960571ae1721a775a52106f3aa8ea56cf6f3aa8ea56ce6f3aa8ea00005b79ffd656ce566b6ed356ce2bf130d656ce2465c7db8353
复制代码


测试2
  1. char peer0_0[] = { /* Packet 9 */
  2. 0x00, 0x00, 0x04, 0x17, 0x27, 0x10, 0x19, 0x80,
  3. 0x00, 0x00, 0x00, 0x00, 0x8f, 0xde, 0x12, 0x60 };
  4. char peer1_0[] = { /* Packet 11 */
  5. 0x00, 0x00, 0x00, 0x00, 0x8f, 0xde, 0x12, 0x60,
  6. 0x42, 0xdb, 0x35, 0xd2, 0xac, 0x58, 0x43, 0xc7 };
  7. char peer0_1[] = { /* Packet 12 */
  8. 0x42, 0xdb, 0x35, 0xd2, 0xac, 0x58, 0x43, 0xc7,
  9. 0x00, 0x00, 0x00, 0x01, 0xaa, 0x88, 0x50, 0xed,
  10. 0xc9, 0x89, 0xdb, 0xa9, 0x5d, 0xe5, 0x2c, 0xe5,
  11. 0xba, 0xbd, 0x68, 0x4b, 0x36, 0xa7, 0xf8, 0x14,
  12. 0x1c, 0xc0, 0xf0, 0xfc, 0x2d, 0x71, 0x42, 0x34,
  13. 0x31, 0x33, 0x30, 0x2d, 0x73, 0x5f, 0x34, 0x4d,
  14. 0x38, 0x61, 0x48, 0x7a, 0x4c, 0x21, 0x44, 0x28,
  15. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  16. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  17. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  18. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  19. 0xb7, 0xb4, 0xb5, 0xdf, 0x00, 0x00, 0x00, 0xc8,
  20. 0x56, 0xce, 0x02, 0x09, 0x2f, 0x61, 0x6e, 0x6e,
  21. 0x6f, 0x75, 0x6e, 0x63, 0x65 };
  22. char peer1_1[] = { /* Packet 14 */
  23. 0x00, 0x00, 0x00, 0x01, 0xaa, 0x88, 0x50, 0xed,
  24. 0x00, 0x00, 0x1c, 0x6a, 0x00, 0x00, 0x00, 0x01,
  25. 0x00, 0x00, 0x00, 0x11, 0x6f, 0x1b, 0x8f, 0xd8,
  26. 0x3a, 0x98, 0xdd, 0xe3, 0x26, 0x5a, 0x47, 0x42,
  27. 0xda, 0xa1, 0x71, 0xf3, 0x56, 0xcf, 0xc0, 0x9d,
  28. 0xd0, 0x26, 0x56, 0xce, 0xaf, 0x9b, 0x3b, 0xbc,
  29. 0x56, 0xcf, 0xaf, 0x98, 0x3d, 0x50, 0x2b, 0xc7,
  30. 0x80, 0x01, 0xcb, 0x17, 0x56, 0xce, 0x79, 0x0b,
  31. 0xbd, 0x99, 0x00, 0x00, 0x77, 0x7b, 0xc5, 0x0a,
  32. 0x68, 0x8a, 0x74, 0x19, 0x60, 0x57, 0x1a, 0xe1,
  33. 0x72, 0x1a, 0x77, 0x5a, 0x52, 0x10, 0x6f, 0x3a,
  34. 0xa8, 0xea, 0x56, 0xcf, 0x6f, 0x3a, 0xa8, 0xea,
  35. 0x56, 0xce, 0x6f, 0x3a, 0xa8, 0xea, 0x00, 0x00,
  36. 0x5b, 0x79, 0xff, 0xd6, 0x56, 0xce, 0x56, 0x6b,
  37. 0x6e, 0xd3, 0x56, 0xce, 0x2b, 0xf1, 0x30, 0xd6,
  38. 0x56, 0xce, 0x24, 0x65, 0xc7, 0xdb, 0x83, 0x53 };
复制代码


原始值
  1. 0000041727101980000000008fde1260
  2. 000000008fde126042db35d2ac5843c7
  3. 42db35d2ac5843c700000001aa8850edc989dba95de52ce5babd684b36a7f8141cc0f0fc2d7142343133302d735f344d3861487a4c2144280000000000000000000000000000000000000000000000000000000000000000b7b4b5df000000c856ce02092f616e6e6f756e6365
  4. 00000001aa8850ed00001c6a00000001000000116f1b8fd83a98dde3265a4742daa171f356cfc09dd02656ceaf9b3bbc56cfaf983d502bc78001cb1756ce790bbd990000777bc50a688a741960571ae1721a775a52106f3aa8ea56cf6f3aa8ea56ce6f3aa8ea00005b79ffd656ce566b6ed356ce2bf130d656ce2465c7db8353
复制代码


[发帖际遇]: 小樱 捡了钱没交公 威望 降了 1 . 幸运榜 / 衰神榜
欢迎光临IT技术交流论坛:http://bbs.itzmx.com/
回复 支持 反对

使用道具 举报

签到天数: 9 天

[LV.3]偶尔看看II

发表于 2018/11/17 15:41 | 显示全部楼层 |Firefox 55.0|Windows 10
我试试,测试一下,嘻嘻
欢迎光临IT技术交流论坛:http://bbs.itzmx.com/
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册论坛 新浪微博账号登陆用百度帐号登录

本版积分规则

手机版|Archiver|Mail me|网站地图|IT技术交流论坛 ( 闽ICP备13013206号-7 )

GMT+8, 2024/5/10 16:11 , Processed in 0.155730 second(s), 24 queries , MemCache On.

Powered by itzmx! X3.4

© 2011- sakura

快速回复 返回顶部 返回列表