SILENT KILLERPanel

Current Path: > > usr > lib64 > python2.7 > Demo > > sockets


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //usr/lib64/python2.7/Demo//sockets

NameTypeSizeLast ModifiedActions
README File 628 bytes April 19 2020 21:13:39.
broadcast.py File 283 bytes April 19 2020 21:13:39.
broadcast.pyc File 547 bytes April 10 2024 04:58:46.
broadcast.pyo File 547 bytes April 10 2024 04:58:46.
echosvr.py File 738 bytes April 10 2024 04:57:37.
echosvr.pyc File 827 bytes April 10 2024 04:58:46.
echosvr.pyo File 827 bytes April 10 2024 04:58:46.
finger.py File 1259 bytes April 10 2024 04:57:37.
finger.pyc File 1162 bytes April 10 2024 04:58:46.
finger.pyo File 1162 bytes April 10 2024 04:58:46.
ftp.py File 3928 bytes April 19 2020 21:13:39.
ftp.pyc File 2954 bytes April 10 2024 04:58:46.
ftp.pyo File 2954 bytes April 10 2024 04:58:46.
gopher.py File 9783 bytes April 10 2024 04:57:37.
gopher.pyc File 10323 bytes April 10 2024 04:58:47.
gopher.pyo File 10323 bytes April 10 2024 04:58:47.
mcast.py File 2214 bytes April 10 2024 04:57:37.
mcast.pyc File 2169 bytes April 10 2024 04:58:47.
mcast.pyo File 2169 bytes April 10 2024 04:58:47.
radio.py File 287 bytes April 19 2020 21:13:39.
radio.pyc File 471 bytes April 10 2024 04:58:46.
radio.pyo File 471 bytes April 10 2024 04:58:46.
rpython.py File 713 bytes April 10 2024 04:57:37.
rpython.pyc File 982 bytes April 10 2024 04:58:47.
rpython.pyo File 982 bytes April 10 2024 04:58:47.
rpythond.py File 1213 bytes April 10 2024 04:57:37.
rpythond.pyc File 1335 bytes April 10 2024 04:58:47.
rpythond.pyo File 1335 bytes April 10 2024 04:58:47.
telnet.py File 3009 bytes April 10 2024 04:57:37.
telnet.pyc File 2149 bytes April 10 2024 04:58:47.
telnet.pyo File 2149 bytes April 10 2024 04:58:47.
throughput.py File 2084 bytes April 10 2024 04:57:37.
throughput.pyc File 2473 bytes April 10 2024 04:58:47.
throughput.pyo File 2473 bytes April 10 2024 04:58:47.
udpecho.py File 1467 bytes April 10 2024 04:57:37.
udpecho.pyc File 2027 bytes April 10 2024 04:58:47.
udpecho.pyo File 2027 bytes April 10 2024 04:58:47.
unicast.py File 230 bytes April 19 2020 21:13:39.
unicast.pyc File 456 bytes April 10 2024 04:58:46.
unicast.pyo File 456 bytes April 10 2024 04:58:46.
unixclient.py File 232 bytes April 19 2020 21:13:39.
unixclient.pyc File 424 bytes April 10 2024 04:58:46.
unixclient.pyo File 424 bytes April 10 2024 04:58:46.
unixserver.py File 414 bytes April 19 2020 21:13:39.
unixserver.pyc File 593 bytes April 10 2024 04:58:46.
unixserver.pyo File 593 bytes April 10 2024 04:58:46.

Reading File: //usr/lib64/python2.7/Demo//sockets/mcast.py

#! /usr/bin/python2.7
#
# Send/receive UDP multicast packets.
# Requires that your OS kernel supports IP multicast.
#
# Usage:
#   mcast -s (sender, IPv4)
#   mcast -s -6 (sender, IPv6)
#   mcast    (receivers, IPv4)
#   mcast  -6  (receivers, IPv6)

MYPORT = 8123
MYGROUP_4 = '225.0.0.250'
MYGROUP_6 = 'ff15:7079:7468:6f6e:6465:6d6f:6d63:6173'
MYTTL = 1 # Increase to reach other networks

import time
import struct
import socket
import sys

def main():
    group = MYGROUP_6 if "-6" in sys.argv[1:] else MYGROUP_4

    if "-s" in sys.argv[1:]:
        sender(group)
    else:
        receiver(group)


def sender(group):
    addrinfo = socket.getaddrinfo(group, None)[0]

    s = socket.socket(addrinfo[0], socket.SOCK_DGRAM)

    # Set Time-to-live (optional)
    ttl_bin = struct.pack('@i', MYTTL)
    if addrinfo[0] == socket.AF_INET: # IPv4
        s.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, ttl_bin)
    else:
        s.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_MULTICAST_HOPS, ttl_bin)

    while True:
        data = repr(time.time())
        s.sendto(data + '\0', (addrinfo[4][0], MYPORT))
        time.sleep(1)


def receiver(group):
    # Look up multicast group address in name server and find out IP version
    addrinfo = socket.getaddrinfo(group, None)[0]

    # Create a socket
    s = socket.socket(addrinfo[0], socket.SOCK_DGRAM)

    # Allow multiple copies of this program on one machine
    # (not strictly needed)
    s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)

    # Bind it to the port
    s.bind(('', MYPORT))

    group_bin = socket.inet_pton(addrinfo[0], addrinfo[4][0])
    # Join group
    if addrinfo[0] == socket.AF_INET: # IPv4
        mreq = group_bin + struct.pack('=I', socket.INADDR_ANY)
        s.setsockopt(socket.IPPROTO_IP, socket.IP_ADD_MEMBERSHIP, mreq)
    else:
        mreq = group_bin + struct.pack('@I', 0)
        s.setsockopt(socket.IPPROTO_IPV6, socket.IPV6_JOIN_GROUP, mreq)

    # Loop, printing any data we receive
    while True:
        data, sender = s.recvfrom(1500)
        while data[-1:] == '\0': data = data[:-1] # Strip trailing \0's
        print (str(sender) + '  ' + repr(data))


if __name__ == '__main__':
    main()

SILENT KILLER Tool